SourabhprixitshankhyanIncident Management Lifecycle: A Comprehensive GuideIntroduction: In today’s fast-paced and technology-driven world, incidents are inevitable. From cybersecurity breaches to natural…7 min read·Jun 5, 2023----
SourabhprixitshankhyanExploring C2 Servers: Command And Control Infrastructure in CybersecurityIntroduction: In the realm of cybersecurity, threat actors employ various techniques to compromise and control targeted systems. One key…3 min read·May 20, 2023----
SourabhprixitshankhyanITGC. How to Audit?ITGC stands for Information Technology General Controls, which refers to a set of processes, policies, and procedures that are implemented…4 min read·Jan 30, 2023----
SourabhprixitshankhyanWhat is Splunk? — Basic UnderstandingSo hi! In this article, we will understand the basic terminology of Splunk like what it is and how useful it is in the world of cyber…2 min read·Apr 19, 2022----
SourabhprixitshankhyanCyber Kill Chain“The best way to protect from hacker is to think like a hacker.”4 min read·Mar 25, 2022----