Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Cybersecurity 101
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Case Studies

  1. Home
  2. Case Studies

Category: Case Studies

Case Studies Fundamentals

The Supply Chain Cybersecurity Saga: Challenges and SolutionsFeatured

According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The […]

17 May, 2025
Case Studies Fundamentals Reading

Holiday wishes from the CEO’s Desk!

The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has […]

17 May, 2025
Case Studies Hacks Penetration Testing Security Testing Tools

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to […]

17 May, 2025
17
Case Studies Compromise Detection DFIR Incident Response Network Forensics

Security Analytics Using ELK

Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]

17 May, 2025
Case Studies Research Security Testing

Hardware Security Module (HSM) security testing checklist

One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use […]

17 May, 2025
4
Case Studies Security Review

Security Review of Microsoft DirectAccess Implementation

This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess […]

17 May, 2025
Case Studies DFIR Malware Analysis

Anatomy of a Credit Card Stealing POS Malware

INTRODUCTION Point-of-sale (POS) is the place where a retail transaction is completed. It is the point at which a customer […]

17 May, 2025
Case Studies Malware Analysis

Asus RT-N10 Plus Cross Site Scripting CVE-2015-1437

Overview ASUS Router RT-N10 Plus is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the result_of_get_changed_status.asp […]

17 May, 2025
Case Studies Hacks Security Testing Web Application Security

The Lesser Known XE Attack

The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more […]

17 May, 2025
1
Case Studies Malware Analysis Research

Shellshock Exploitation: Using BeEF Framework

In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this […]

17 May, 2025
2
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • Robust Cyber Security Solutions to Prevent AttacksJune 19, 2025
  • Impact of AI on Cybersecurity JobsJune 18, 2025
  • Comprehensive Data Security Solutions for EnterprisesJune 18, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

AI-Driven Defense Cloud Computing Cloud Infrastructure Cloud Security cybersecurity Cyber Security hacking Penetration Testing

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top