New eBook: Navigating The Digital Personal Data Protection Bill of India – 2023

New eBook: Navigating The Digital Personal Data Protection Bill of India – 2023
📚 Exciting News! Introducing our new eBook: "Navigating The Digital Personal Data Protection Bill of India - 2023" 🔒 Are you ready to tackle the complexities of the bill? Here's a guide breaking down the key aspects in a clear and understandable way from a technical implementation point of view. 🔑 What's Inside: - Demystifying the Bill's provisions and implications - Understanding exemptions and obligations - Actionable steps to ensure compliance

CERT-In: Guidelines on Information Security Practices for Government Entities.

CERT-In: Guidelines on Information Security Practices for Government Entities.
A quick appreciation note to CERT-In for the commendable work done regarding the "Guidelines on Information Security Practices for Government Entities." The comprehensive guidelines deserve recognition as they showcase a meticulous approach towards: Securing sensitive information within government entities. Fostering a culture of cybersecurity within government organizations. Commitment to strong leadership through a CISO and governance v...

Introducing our latest free e-book: ” Cybersecurity for Startups”.

As an entrepreneur, you are aware that information security is a challenge arising from building and growing a new business. Unfortunately, information security is often deprioritized over say product development or marketing. A single data breach can be disastrous for your company's reputation and finances. Together with Aalok Karnik, I've authored this e-book designed to help startups prioritize cybersecurity and develop a comprehensive security progr

Demystifying CERT-In directives (dated 28th April 2022)

Demystifying CERT-In directives (dated 28th April 2022)
[Download PDF] Introduction Cyber security has always been a hot topic area and it’s gaining momentum by leaps and bounds these days (which is great for information security professionals like us :D ). In all seriousness, “Data is the new Oil” and there are criminal agencies operating worldwide with impunity that harvest user data and sell it or use it for malicious/financial gain. CERT-In (under MeitY, Govt of India) has recently issued a much need

Microsoft Most Valuable Professional – MVP (again)

Microsoft Most Valuable Professional – MVP (again)
Super excited to be awarded by Microsoft for the 10th time in a row as Most Valuable Professional in the domain of "Enterprise Security" under the named award category of "Cloud and Datacenter Management". A decade is a good thing, right :) For the sake of clarity, It's awarded for non-commercial community contributions, commercially benefiting contributions are not counted It doesn't have to be saying good about Microsoft only, they are pre

Mont Blanc India – An interesting fraud or a real bad way of handling operations

Mont Blanc India – An interesting fraud or a real bad way of handling operations
UPDATE: Looking at the comments on this blog so far, it's definitely a scam, not a bad way of handling operations On the 9th December 2019, I received an SMS that genuinely piqued my interest. Ordinarily, I wouldn’t entertain any unsolicited offers but I am a luxury fountain pen fanboy, and Mont Blanc is a highly coveted name. Add to that, the SMS sender had a Sender-ID, (i.e. QP-MONTDE, QP-MONTBI etc.) which (I believe) is not very easy to...

Password analysis from 10,000 leaked Hotmail passwords

On 5th October theregister reported more than 10,000 password were leaked mysteriously on pastebin.com. See this tweetAs a followup study "Acunetix Web Application Security Blog" did an analysis on the kind of password people use.Some interesting findings are as follows-Statistics: The list initially contained 10,028 entries.There are 8931 (90%) unique passwords in the list. The longest password was 30 chars long: lafaroleratropezoooooooooooooo.The shortes

Cheat Sheets: Networking, Hacking, Security, Administration, Tools

Here is a bunch of CheatSheets which might be useful from time to time to use as a reference:# TCP/IP and tcpdump Cheat Sheet - SANS.org# Google Hacking and Defense Cheat Sheet - SANS.org# Intrusion Discovery Cheat Sheet Windows - SANS.org# Intrusion Discovery Cheat Sheet Linux - SANS.org# SQL Injection Cheat Sheet - ha.ckers.org# Cross Site Scripting Cheat Sheet - ha.ckers.org# Web application Cheat Sheet - secguru.com# Linux Security Quick Reference Guid...

UNtrusted Certificates from UNtrusted CA

Following HDMoore's twit I stumbled on this case of Man-in-the-middle attack with a valid SSL certificate from a shady reseller.Eddy Nigg was able to buy a certificate in the name of mozilla.com from a reseller of comodo named 'Certstar'.In response of this issue, comodo saysThat reseller's ability to sell Comodo certificates has been suspended while weinvestigate why they are apparently not fulfilling their contractual obligationsto us. We revoked your ce