BALAJI N
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
DEV-0270 Hacker Group Uses Windows BitLocker Feature to Encrypt Systems
The DEV-0270 (aka Nemesis Kitten), an Iranian state-sponsored hacker group has been uncovered abusing a Windows feature known as BitLocker.While Nemesis Kitten is one of the sub-groups of the Iranian threat actor group known as, PHOSPHORUS. The threat intelligence team...
p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Tool
P0f is an OS Fingerprinting and Forensics Tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in...
Understanding The Difference Between DDR and EDR
Cybersecurity is infamous for its acronyms. From APT to ZTNA, it is easy to get bogged down in the quagmire of jargon that, whether we like it or not, comes with the territory. This problem worsens when we come...
Copyright and Data Security in Digital Archives
Data is one of the most valuable assets in the modern world. It informs business decisions, helps diagnose illnesses, and aids in determining court cases. It's also a desirable target for cybercriminals. As a result, digital archiving has fast...
10 Most Secure Messaging Apps 2023
Private conversations are the most sensitive digital data and Secure Messaging Apps play a major role in privacy.We all know that we have secret communications that we desire to keep private! Whether it’s an awkward conversation, office news,...
Ransomware Attack Response and Mitigation Checklist
Ransomware is one of the fast-growing threats worldwide and it's considered as a leader of the Global cyberattack in recent days which cause some dangerous issues and losses in many organizations and individuals.Here is the Ransomware response Checklist for Attack...