Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Case Studies » Page 3

  1. Home
  2. Case Studies
  3. Page 3

Category: Case Studies

Case Studies Opinion Research Secure Coding Sql Injection Survey Web Application Security

[Survey] Web Application Security – Getting Coders To Code Securely

Web Application security has become the biggest concern for almost all organizations who wish to bring their business to the Internet. There are various reasons […]

September 6, 2013January 10, 2025
0
Case Studies Hacks Research

Inside Dalai Lama Website Attacks: Analyzing The “Watering Hole Attacks”

Recently “watering hole attacks” are getting popular among the hacking groups for targeting large groups of victims who routinely visit a popular website or discussion […]

September 5, 2013January 10, 2025
0
Case Studies

RBI Gopalakrishna Committee Report on IT

The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The […]

July 1, 2013January 22, 2025
0
Case Studies Research

New Realities In Aviation Security

Summary of the presentation and research done – By Hugo Teso According to Teso, there are two sub-parts when it comes to aviation systems and […]

June 27, 2013
0
Case Studies Fundamentals Incident Response Research

Cyber Security In Civil Aviation

  From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new technology which will revolutionize present […]

April 2, 2013January 22, 2025
0
Case Studies Compromise Detection Malware Analysis Mobile Research Tools

Russian FruitNinja Backdoor Analysis

For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, it made a compelling case […]

October 9, 2012
2
Case Studies

Does Your DLP Implementation Keep You Awake At Night?

With the boundary-less work culture of the 21st century, organizations have started to wake up to the fact that they cannot withhold information within the […]

September 5, 2012January 10, 2025
1
Case Studies DFIR Mobile Secure Coding

Risk Analysis of Android Based Appliance

Overview I had to do the risk analysis of the Android 2.2 – Froyo based appliance and check for any security flaws exist in it […]

November 24, 2011January 21, 2025
1
Case Studies Hacks Social Engineering

Social Engineering & "Influence", by Dr. Cialdini

Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing at various organizations. Coincidentally, I […]

June 3, 2010January 17, 2025
5
Case Studies Hacks

Hacking Microsoft Windows 2003 Server with Microsoft SQL Server 2005

This post is a complete switch over from my previous post on phishing modus operandi. A little background on the hack. I was doing an […]

December 8, 2009January 17, 2025
0
  • 3 / 4
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top