Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Research » Page 6

  1. Home
  2. Research
  3. Page 6

Category: Research

Case Studies Research

New Realities In Aviation Security

Summary of the presentation and research done – By Hugo Teso According to Teso, there are two sub-parts when it comes to aviation systems and […]

June 27, 2013
0
Hacks Research

Authorization Bypass on LinkedIn

Summary: LinkedIn has a feature called Project wherein you can add project members from your connections. We were able to discover a way to view […]

April 10, 2013
0
DFIR Research

PCI DSS for Penetration Testing

Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your […]

April 3, 2013January 22, 2025
1
Case Studies Fundamentals Incident Response Research

Cyber Security In Civil Aviation

  From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new technology which will revolutionize present […]

April 2, 2013January 22, 2025
0
Hacks Malware Analysis Mobile Research Social Engineering

SMiShing – On My (An)droid

Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number to call or a website […]

December 12, 2012January 17, 2025
0
Fundamentals Research

Disable IIS 7.5 Banner Information

Below are the steps of how to fix the banner (version information) in IIS 7.5 Install the latest version of URLScan 3.1 (http://learn.iis.net/page.aspx/726/urlscan-overview/). Select the […]

October 18, 2012January 21, 2025
1
Case Studies Compromise Detection Malware Analysis Mobile Research Tools

Russian FruitNinja Backdoor Analysis

For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, it made a compelling case […]

October 9, 2012
2
DFIR Fundamentals Hacks Research Sql Injection Tools

Logging in MySQL

Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas […]

October 8, 2012January 21, 2025
1
Research Tools

Format Preserving Encryption – In the guise yet retrievable as it is

A recent dive into challenges faced from privacy compliance requirements unearthed an interesting patent. The unearthing of this new patent on the block came from the need of anonymizing data for several reasons including compliance (PCI DSS, German Data Privacy Law [BDSG], UK Data Privacy Act).

February 9, 2010January 21, 2025
0
Case Studies Hacks Incident Response Research

A Phishy Story

Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. Zillions of fishes falling prey […]

November 5, 2009January 8, 2025
0
  • 6 / 7
  • 1
  • 2
  • 3
  • …
  • 5
  • 6
  • 7

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top