Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Cybersecurity 101
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Archives for Akshay Sudan

  1. Home
  2. Author: Akshay Sudan

Author: Akshay Sudan

Hacks Incident Response

Injection in ‘Export to Spreadsheet’ functionality

Comma separated vulnerability also known as Formula Injection/csv injection. Introduction: This document demonstrates the CSV injection a technique for exploiting […]

17 May, 2025
3
Compliance

ISO 27004 – Information Security Metrics Implementation

Introduction Compliance to the ISO 27001 standard and associated controls helps an organization to understand information security risks and develop […]

17 May, 2025
Compromise Detection Fundamentals

USB Forensics

In this article we will learn on how to do the forensic of USB devices, how to correlate the USB […]

17 May, 2025
4
Network Forensics

Importance of “thumbs.db” in digital forensic world

by Kush Wadhwa, NII Consulting Are you working as a cyber crime investigator and looking for something which can prove […]

17 May, 2025
8
Network Forensics

Volume Boot Sector Format of FAT

by Kush Wadhwa, NII Consulting There are times when you don’t have sufficient tools to understand the file system. At […]

17 May, 2025
9
Network Forensics

Recycle Bin Forensics

by Kush Wadhwa, NII Consulting Have you ever thought of what happens when you hit the delete button? Delete: When […]

17 May, 2025
6
Fundamentals

Understanding NTFS file system

by Kush Wadhwa, NII Consulting In this article I will cover the basic concepts of NTFS file system. In NTFS […]

17 May, 2025
Disk Forensics Fundamentals Tools

Data Carving Issues

by Chetan Gupta, NII Consulting Many a times as an investigator, I have to deal with the issue of carving […]

17 May, 2025
3
Case Studies Disk Forensics Fundamentals

Bad Superblock, corrupt inode tables and loads of bad luck!

by Chetan Gupta, NII Consulting Well, last week was abuzz with activity when we had to recover data from a […]

17 May, 2025
1
Disk Forensics Fundamentals

Hiding data with Host Protected Area (HPA) in Linux

By Kush Wadhwa, NII Consulting Have you ever thought of hiding data in such a manner that it cannot be […]

17 May, 2025
15
  • 1
  • 2

Sidebar

Recent Posts

  • What Is a HITRUST Audit and Why It MattersJuly 17, 2025
  • HITRUST Requirements: Your Guide to CertificationJuly 11, 2025
  • HITRUST Certification Cost: What to Expect in 2025July 9, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

AI-Driven Defense Cloud Computing Cloud Infrastructure Cloud Security cybersecurity Cyber Security hacking Penetration Testing

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Protecting enterprises with intelligent cybersecurity: the power of technology, the precision of human insight.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top