Riya JainA Guide to Implement CIS Controls with PowerShellIn today’s interconnected world, cyber threats have become increasingly sophisticated, making it vital for organizations to adopt effective…Sep 24Sep 24
Riya JainLLMNR Poisoning: A Hidden Vulnerability in Windows NetworksIn today’s enterprise environments, Windows-based networks rely heavily on Active Directory (AD) for managing resources and administrative…Sep 13Sep 13
Riya JainWhat is the CSA STAR Program? A Comprehensive GuideThe CSA STAR (Security, Trust, Assurance, and Risk) program is an essential certification framework for cloud service providers (CSPs)…Sep 9Sep 9
Riya JainMaltego: A Technical Dive into the Ultimate Data Visualization ToolIn the realm of digital investigation and threat intelligence, the quest for comprehensive data visualization and analysis tools has been…Apr 2Apr 2
Riya JainSpiderFoot: A Comprehensive Guide to Installation and UsageSpiderFoot is a powerful open-source intelligence tool that enables users to gather information about a target by utilizing various data…Apr 2Apr 2
Riya JainFile Integrity Monitoring (FIM) in Wazuh: A Step-by-Step GuideWhy File Integrity Monitoring?Jan 29Jan 29
Riya JainStep-by-Step Guide: Installing Wazuh for Enhanced Security OperationsCrafting a Robust Statement of Purpose (SOP) for WazuhJan 29Jan 29
Riya JainPivoting techniques: Part 2This post will cover some useful tools and commands for tunneling and pivoting about pen testing.Dec 31, 2023Dec 31, 2023
Riya JainPivoting TechniquesIn the ever-evolving landscape of cybersecurity, threat actors are constantly finding new and sophisticated ways to exploit vulnerabilities…Dec 31, 2023Dec 31, 2023