Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Blogging Blogs  >  Guides Blogs  >  Checkmate guides Blog  > 

2022-09-27 10:25
The war between Russia and Ukraine has commanded the world’s attention for several reasons — from impacting semiconductor supply chains to driving up the price of oil. But anothe… Read More
2022-09-12 17:43
As the Russia-Ukraine war wages on, Ukraine has decided to use controversial facial recognition technology (FRT) to identify dead Russian soldiers and inform their families and friends of th… Read More
2022-04-13 15:28
A summary of Article 6 requirements for Consumer Protection Regulation (CPR) by the Central Bank of UAE (CBUAE) With the ever-evolving digital landscape and advancements in technologies that… Read More
2022-02-11 20:01
Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always look for opportunitie… Read More
2021-12-25 11:54
The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in the number of cases worldwide. [more] The post Holiday w… Read More
2021-08-26 19:26
An Overview of the most dreaded ransomware in recent times Resurgence of Ransomware In April 2019, the Cybereason Nocturnus team encountered several target machines infected with a rans… Read More
2021-08-06 17:00
With more than 11,000 athletes from 206 countries participating, the world is watching the delayed Tokyo 2020 Olympic Games with great enthusiasm. But, unfortunately, while the Olympics show… Read More
2021-07-30 16:58
Introduction With each passing day, the world is waking up to new global cybersecurity challenges. The latest one was unearthed this month. Move over SolarWinds, Microsoft Exchange vulnerabi… Read More
2021-04-01 12:54
Note: This is a technical deep-dive into DearCry ransomware. If you want a preliminary analysis of the ransomware, you can find it here. The Network Intelligence team initiated a Static [mor… Read More
2021-04-01 10:57
Note: We have also done a technical analysis on DearCry. Read here.   It’s a warm summer morning. While sipping your morning coffee, you access the work email. But you’re [m… Read More
2020-10-27 19:44
You can read part-1 (Passive Subdomain Enumeration) here. Active sub-domain enumeration techniques Brute force or Dictionary Attacks Brute force means guessing possible combinations of the t… Read More
2020-09-24 19:07
What is sub-domain Enumeration? Subdomain enumeration is a process of finding subdomains for one or more domains. Why need sub-domain enumeration? Sub-domain enumeration helps to create a sc… Read More
2020-08-13 15:30
Introduction to DIFC Law No. 5 of 2020 Dubai International Financial Center (DIFC), Dubai’s financial services free zone, has issued a new Data Protection Law (DIFC Law No. 5 of [more]… Read More
2020-04-02 11:01
We wanted to reach out to you to make you aware of the very important topic of remote assessments during this unusual time of the coronavirus pandemic.  The PCI Council [more] The post… Read More
2020-01-23 11:21
What is CORS? CORS stands for Cross-Origin Resource Sharing, which manages cross-origin request. CORS is a mechanism that allows restricted resources (like images, scripts, data) to be reque… Read More
2019-12-20 10:20
Introduction Did you know? It is established that 1 out of every 4 medical devices is now connected. If we are to go to the hospital today, you would encounter [more] Read More
2019-12-03 06:31
In May 2018 when the General Data Protection Regulation (GDPR) came into effect, many organizations were not ready for it on the mistaken assumption that it does not apply to [more] Read More
2019-01-28 06:14
RBI Releases Guidelines on Tokenization for Card Transactions Reserve Bank of India has issued a directive under Section 10 (2) read with Section 18 of Payment and Settlement Systems Act, [m… Read More
2018-05-22 06:00
Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War Ransomware have gained much notoriety in recent times. Locky, Wannacary, [more] The pos… Read More
2018-04-02 12:30
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences and allowed me to see [more] The post S… Read More
2017-09-06 21:17
  ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible for processing incoming data. It [...] The po… Read More
2017-07-18 09:24
Amazon Web Services (AWS) is a secure cloud platform service which is hybrid of Infrastructure as a Service (IaaS), Platform as a Service(PaaS), and Software as a Service (SaaS). It offers v… Read More
2017-05-16 08:45
Before we start to configure our decoys and put it in our production environment, let’s take a look at what exactly it is and how it differs from the usual honeypot. Honeypots are vuln… Read More
2017-05-04 09:24
Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers have found relatively high degree of success by (spear) phish… Read More
2016-06-30 12:05
INTRODUCTION WhatsApp Messenger is an application used across various Mobile Platforms for instant messaging. It uses the internet to send and receive audios, videos, documents, location det… Read More
2016-04-19 09:35
Spam-blasting malware infects thousands of Linux and FreeBSD servers. – Ars Technica, Apr 30, 2015. Mumblehard Malware: Linux-Based Spam Generator Went Unnoticed for Five Years. &ndash&hell…Read More

Share the post

Checkmate

×

Subscribe to Checkmate

Get updates delivered right to your inbox!

Thank you for your subscription

×