SourabhprixitshankhyanIncident Management Lifecycle: A Comprehensive GuideIntroduction: In today’s fast-paced and technology-driven world, incidents are inevitable. From cybersecurity breaches to natural…Jun 5, 2023Jun 5, 2023
SourabhprixitshankhyanExploring C2 Servers: Command And Control Infrastructure in CybersecurityIntroduction: In the realm of cybersecurity, threat actors employ various techniques to compromise and control targeted systems. One key…May 20, 2023May 20, 2023
SourabhprixitshankhyanITGC. How to Audit?ITGC stands for Information Technology General Controls, which refers to a set of processes, policies, and procedures that are implemented…Jan 30, 2023Jan 30, 2023
SourabhprixitshankhyanWhat is Splunk? — Basic UnderstandingSo hi! In this article, we will understand the basic terminology of Splunk like what it is and how useful it is in the world of cyber…Apr 19, 2022Apr 19, 2022
SourabhprixitshankhyanCyber Kill Chain“The best way to protect from hacker is to think like a hacker.”Mar 25, 2022Mar 25, 2022