Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Research

  1. Home
  2. Research

Category: Research

misinformation
Research

The weaponisation of informationFeatured

This is one win India isn’t proud of. In July, our country earned the dubious distinction of being the top source of misinformation spread during […]

September 27, 2022
0
Reading Research

Kick-start your Cybersecurity career in 2022

The new year is always a great time to set new resolutions. And a great resolution is to do things that would help on the […]

December 17, 2021January 20, 2025
0
California-Consume-privacy-act
Compliance Laws & Regulations Research

The California Consumer Privacy Act

The California Consumer Privacy act In May 2018 when the General Data Protection Regulation (GDPR) came into effect, many organizations were not ready for it […]

December 3, 2019
0
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Research Security Testing

Malware on Steroids Part 3: Machine Learning & Sandbox Evasion

Hey, It’s been a busy month for me and I was not able to save time to write the final part of the series on […]

December 10, 2018January 21, 2025
2
Hacks Research

Password-less Remote Desktop Protocol (RDP) Session Hijacking

What is Remote Desktop Protocol (RDP) Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface […]

September 24, 2018January 18, 2025
0
Penetration Testing Research Tools

Bypassing Detection for a Reverse Meterpreter Shell

This post discusses the creation of an executable which spawns a reverse Meterpreter shell. All the tools used in this post are publicly available. In […]

June 11, 2018January 18, 2025
5
Research Tools Uncategorized

Ransomware Simulation

Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War Ransomware have gained much notoriety […]

May 22, 2018January 21, 2025
0
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 Basics – Linux on ARM64

As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]

April 30, 2018January 18, 2025
0
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Windows

Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]

April 23, 2018January 18, 2025
1
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Linux

Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]

April 23, 2018January 18, 2025
3
  • 1
  • 2
  • 3
  • …
  • 5
  • 6
  • 7

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top