
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
In this post, I will not include an exhaustive list of technical ransomware details, different malware strands, and business implications of this kind of crimeware.
I will focus, instead, on preventive measures to stop ransomware. Here they are:

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is a model of intrusion analysis built by analysts, asking the simple question, “What is the underlying method to our work?”

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
A lot of Exploit Kits (EKs) can be obtained commercially available on the darkweb. These are malicious code which can be embedded in a website. Many Exploit Kits are easy to use (even by those cybercriminals with little coding experience). They contain pre-packaged code that seeks to exploit out-of-date browsers, insecure applications, or vulnerable services, etc.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let us first understand what Buffers are…
A buffer is a sequential section of memory allocated to contain anything from a character string to an array of integers. Buffers are memory storage regions that temporarily hold data while it is being transferred from one location to another.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a Rootkit?
A rootkit is a malicious software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its software. A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers, password stealers, antivirus disablers, and bots for DDoS attacks. This software remain hidden in the computer and allow the attacker remote access to the computer.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
You have got a new IDS device installed...
Your IDS has started to see the traffic moving across your network...
Oh Yeh, your IDS has started generating Events...
What is next?

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Threat intelligence as an information security discipline that seeks to recognize and understand sophisticated cyber adversaries, specifically why and how they threaten data, networks, and business processes.”

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Successful attacks on computers/network systems rarely look like real attacks. It is only in hindsight that you would know that if an attack is actually happening. This is also the reason that somewhere we always need the human eye to catch it, although a lot of advancements are happening with Machine Learning and AI.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Handling a corporate security breach is likely to be one of the most intense moments of your security career. In this day and age, it is an accepted truth that all organizations will be breached at some point - what is important is how YOU handle it.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
If you happen to be someone who is actually on Network Infrastructure Job-role, but expected to look after the IT security needs of the organisation… If you constantly feel the lack of right budgetary allocations by the management to the IT security needs, then this post is for you.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Inadequate security and eager cybercriminals have led enterprise data breaches to increase at an alarming pace. Staggering numbers of affected customers — and huge financial losses to companies — continue to send shock waves through the business world, and threaten user trust. This global proliferation of cyber-attacks has resulted in one particular component of cryptography, i.e., ENCRYPTION, to become critical in the effort to safeguard sensitive data and intellectual property (IP).
- What is a Zero Trust Architecture and How can you build this?
- What is Session Hijacking and What CounterMeasures can you deploy?
- What is Red Teaming and what are the major benefits?
- Predictive Prioritization of Vulnerabilities and How does it work?
- Who is a Security Architect and How it is different from Security Auditor
- What is IBM Security Guardium? What does it Guard?
- How Does Intrusion Detection System Actually work? What are the Major Types of IDS?
- What is Elasticsearch Stack? How does Elasticsearch work?
- What is (Threat) Hunting Maturity Model?
- What are Application Layer DDoS Attacks?