Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Research » Page 5

  1. Home
  2. Research
  3. Page 5

Category: Research

Case Studies Malware Analysis Mobile Research Secure Coding

Gone in 60s Malware Analysis Report

It is a common technique for criminals to target gaming applications as a propagation vector for malware distribution. Recently, I observed just such a malicious Android app, which acted as an interesting information stealer and then self-destructed. I took this case to investigate further as an interesting research.

October 5, 2013
3
Case Studies Opinion Research Secure Coding Sql Injection Survey Web Application Security

[Survey] Web Application Security – Getting Coders To Code Securely

Web Application security has become the biggest concern for almost all organizations who wish to bring their business to the Internet. There are various reasons […]

September 6, 2013January 10, 2025
0
Case Studies Hacks Research

Inside Dalai Lama Website Attacks: Analyzing The “Watering Hole Attacks”

Recently “watering hole attacks” are getting popular among the hacking groups for targeting large groups of victims who routinely visit a popular website or discussion […]

September 5, 2013January 10, 2025
0
Fundamentals Reading Research Tools

Information Rights Management – Addressing The Need

What is Information Rights Management? Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective […]

August 27, 2013January 22, 2025
0
Compromise Detection Fundamentals Incident Response Reading Research

Data Leakage Prevention – Securing The Data Spillage

What is Data Leakage Prevention? Data Leakage Prevention is the category of solutions which help an organization to apply controls for preventing the unwanted accidental […]

August 21, 2013January 22, 2025
0
Compromise Detection Hacks Research Secure Coding Web Application Security

Critical Joomla File Upload Vulnerability

I was reading the Joomla Update, http://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads A bug in Joomla Core and having the criticality is always awesome to see 🙂 I decided to […]

August 13, 2013
3
Compliance Research

HIPAA Compliance – Introduction & Pointers

Introduction Protecting the confidentiality, integrity and availability of patient information by healthcare organizations became a legal requirement via the Health Insurance Portability and Accountability Act, […]

August 5, 2013
2
Fundamentals Reading Research Social Engineering

Spear Phishing – Beware Of Your “Friend”

What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, text or tweet by an […]

August 1, 2013January 22, 2025
0
Incident Response Malware Analysis Reading Research

Advanced Persistent Threats – De-Mystifying The Jargon

Introduction Advanced Persistent Threats (APTs) are growing as a serious concern as they represent a threat to an organization’s intellectual property, financial assets and reputation. […]

July 17, 2013January 22, 2025
0
Research Uncategorized Web Application Security

OWASP Top 10 – 2013 Web Application Security Risks

OWASP TOP 10 list is being constantly updated every 3 years to keep pace with the current threat landscape for web application security. Key factors […]

July 4, 2013January 10, 2025
0
  • 5 / 7
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top