

Security
Log4j Vulnerability Prevention, Detection, and Hunt Guide
Posted On Jan 07, 2022 | 5 Mins ReadOn Dec. 9, 2021, a remote code execution (RCE) vulnerability in Apache log4j 2 was traced. This was being exploited in the wild. Public proof of concept (PoC) code was released, and subsequent invest
Read MoreSecurity
Techniques in IT Security- An Overview
Posted On Mar 19, 2015 | 5 minIT security has always been a burning issue on the chief information officer’s (CIO) plate. We see websites, applications and emails being hacked to retrieve sensitive information pertaining to an
Read More
