Decoding Cybersecurity Roles: Analyst vs. Engineer vs. Researcher

Navigating the complex world of cybersecurity can be a daunting task, especially when it comes to understanding the different roles and their responsibilities. In this landscape, Security Analysts, Security Engineers, and Security Researchers are the front-runners, each contributing in a unique way. Let’s delve into these roles and break down their distinct key skills in …

Decoding Cybersecurity Roles: Analyst vs. Engineer vs. Researcher Read More »

How to Perform Forensic Investigation on an AWS Instance without a Public Key

Introduction Performing a forensic investigation on an AWS EC2 instance can become complicated if access to the instance is lost or the SSH key is unavailable. Recently, I came upon a case where I did not have the private key to the instance. The only details I had, were the AWS portal login and password. …

How to Perform Forensic Investigation on an AWS Instance without a Public Key Read More »

Preventing Direct IP Access in CloudFlare

Recently, I was going through my LinkedIn feed and I found a post by Jake M. In the post, the author suggests a way to bypass Cloudflare’s protection and directly access the origin server. They propose using the ‘Forgot Password’ feature of a web app to find the server’s IP address. If that fails, they …

Preventing Direct IP Access in CloudFlare Read More »

23/06/2023 – BUGSKAN Chronicles Part 1

Starting a startup is every geek’s dream. Admit it, we all want a “company” of our own. It’s like a brand we build for ourselves, just like every fashion designer dreams of their private label or every waiter dreams of his own restaurant. Dreaming isn’t bad – unless we have a dream, there’s no worth …

23/06/2023 – BUGSKAN Chronicles Part 1 Read More »

How to Become a Technopreneur

This photo captures a moment after a session on “How to Become a Technopreneur” conducted by me at GLS University. The session aimed to inspire and guide students interested in pursuing a career as a technopreneur. The students were enthusiastic and engaged throughout the session, asking questions and seeking advice on how to turn their …

How to Become a Technopreneur Read More »

Session – Securing Alibaba Cloud Platform

Alibaba Cloud is the latest entrant in IaaS and PaaS cloud platforms. It was recently launched in India after being successful in the Chinese subcontinent. On 28 July, we kickstarted the Alibaba community with an event highlighting the introduction of the Alibaba cloud. We had speakers like Romil Bheda, Suketu Vyas, Sanket Shah, Shyamal Pandya, …

Session – Securing Alibaba Cloud Platform Read More »

Meltdown and Spectre: Understanding the Biggest Cybersecurity Threats of 2018

The Meltdown and Spectre vulnerabilities, discovered in January 2018, were among the biggest cybersecurity threats of the year. In this blog post, we’ll provide a comprehensive analysis of these vulnerabilities and their impact. The Vulnerabilities Explained Meltdown and Spectre are hardware vulnerabilities that affect nearly all modern processors. Meltdown allows an attacker to access kernel …

Meltdown and Spectre: Understanding the Biggest Cybersecurity Threats of 2018 Read More »

The Equifax Data Breach: A Comprehensive Analysis

In 2017, Equifax, one of the largest credit reporting agencies in the world, suffered a massive data breach that exposed the personal information of millions of individuals. In this blog post, we’ll provide a comprehensive analysis of the Equifax data breach and its impact. The Breach Timeline The Key Players Equifax was the primary organization …

The Equifax Data Breach: A Comprehensive Analysis Read More »