Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Case Studies

  1. Home
  2. Case Studies

Category: Case Studies

Case Studies Fundamentals

The Supply Chain Cybersecurity Saga: Challenges and SolutionsFeatured

According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers […]

February 28, 2022January 20, 2025
0
Case Studies Fundamentals Reading

Holiday wishes from the CEO’s Desk!

The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in […]

December 25, 2021
0
Case Studies Hacks Penetration Testing Security Testing Tools

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop […]

May 21, 2018January 21, 2025
17
Case Studies Compromise Detection DFIR Incident Response Network Forensics

Security Analytics Using ELK

Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]

April 2, 2018January 21, 2025
0
Case Studies Research Security Testing

Hardware Security Module (HSM) security testing checklist

One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use it to store your debit […]

August 15, 2016January 10, 2025
4
Case Studies Security Review

Security Review of Microsoft DirectAccess Implementation

This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess technology. Introduction of DirectAccess From […]

June 30, 2015January 10, 2025
0
Case Studies DFIR Malware Analysis

Anatomy of a Credit Card Stealing POS Malware

INTRODUCTION Point-of-sale (POS) is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the […]

March 3, 2015January 21, 2025
0
Case Studies Malware Analysis

Asus RT-N10 Plus Cross Site Scripting CVE-2015-1437

Overview ASUS Router RT-N10 Plus is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the result_of_get_changed_status.asp script. A remote authenticated attacker […]

February 16, 2015January 10, 2025
0
Case Studies Hacks Security Testing Web Application Security

The Lesser Known XE Attack

The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more like shortcuts to standard text […]

November 18, 2014
1
Case Studies Malware Analysis Research

Shellshock Exploitation: Using BeEF Framework

In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this vulnerability using the BeEF Framework. […]

October 28, 2014January 10, 2025
2
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top