We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Case Studies » Page 2

  1. Home
  2. Case Studies
  3. Page 2

Category: Case Studies

Case Studies Malware Analysis Research

POODLE Advisory

What is POODLE? POODLE stands for Padding Oracle On Downgraded Legacy Encryption Vulnerability CVE: CVE-2014-3566 What is the attack? The […]

17 May, 2025
Case Studies Web Application Security

Mitigating the Remote Code Execution in Bash

Introduction In the last post we saw how the recent bash vulnerability can be remotely exploited in a variety of […]

17 May, 2025
Case Studies Hacks Research Secure Coding

Bourne Again Shell (Bash) Remote Code Execution Vulnerability

Introduction A remotely exploitable vulnerability was discovered by Stephane Chazelas of Akamai in the GNU Bash command shell. The vulnerability […]

17 May, 2025
2
Case Studies Research Security Testing

ATM Application Whitelisting Security Assessment

During a recent engagement, we were asked to test the security level of an application white-listing solution deployed on the […]

17 May, 2025
Case Studies Research Web Application Security

Authorization Vulnerability in Yahoo! Pipes

Recently, I found an interesting issue qualifying on Yahoo! Pipes. But before going into the details of this specific issue, […]

17 May, 2025
Case Studies Compliance Laws & Regulations

IT Act 2000 – Penalties, Offences With Case Studies

Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating […]

17 May, 2025
6
Case Studies Hacks Research Secure Coding Web Application Security

Owning The Enterprise With HTTP PUT

During a routine penetration testing engagement, we found an IIS webserver with HTTP methods (verbs) like PUT and DELETE enabled […]

17 May, 2025
4
Case Studies Fundamentals Incident Response Research

Heartbleed Open SSL Bug FAQ & Advisory

Heartbleed Advisory & FAQ Please find below a quick FAQ on the Heartbleed vulnerability and what you can to address […]

17 May, 2025
Case Studies Research Wireless Security

Insecure Implementation of Guest Wireless Networks

Most large organizations provide wireless facilities for their guest, which may include vendors, consultants, business associates, employees from other regions […]

17 May, 2025
Case Studies Malware Analysis Mobile Research Secure Coding

Gone in 60s Malware Analysis Report

It is a common technique for criminals to target gaming applications as a propagation vector for malware distribution. Recently, I observed just such a malicious Android app, which acted as an interesting information stealer and then self-destructed. I took this case to investigate further as an interesting research.

17 May, 2025
3
  • 2 / 4
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • Vulnerability Prioritization Is Broken: Here’s How We Fix It with Transilience AIMay 5, 2025
  • Measuring What Matters: Using Metrics to Master Vulnerability PrioritizationMay 5, 2025
  • Beyond the Noise: A Practical Guide to Mastering Vulnerability PrioritizationMay 5, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

cybersecurity Cyber Security hacking malware Malware Analysis Penetration Testing pentesting USA

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top