Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Cybersecurity 101
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Case Studies » Page 4

  1. Home
  2. Case Studies
  3. Page 4

Category: Case Studies

Case Studies Hacks Incident Response Research

A Phishy Story

Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. […]

17 May, 2025
Case Studies Malware Analysis Research

Deobfuscating Javascript Malware

Some days back I was greeted by a Google Safe browsing warning when I tried visiting a ‘known’ site. As […]

17 May, 2025
4
Case Studies

First conviction under IT Act

Finally, we have our first conviction under the IT Act 2000 in India. After more than a 100 cases being […]

17 May, 2025
Case Studies Fundamentals

Indian IT Act 2000 – An Insight

from NII Consulting The IT Act 2000 is a large repository of fine print fraught with judicial jargon and varying […]

17 May, 2025
1
Case Studies Disk Forensics Fundamentals

Bad Superblock, corrupt inode tables and loads of bad luck!

by Chetan Gupta, NII Consulting Well, last week was abuzz with activity when we had to recover data from a […]

17 May, 2025
1
Case Studies Network Forensics

Game One

by K. K. Mookhey, NII Consulting e4 It’s late at night, and the phone rings. This had better be a […]

17 May, 2025
2
  • 4 / 4
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • What Is a HITRUST Audit and Why It MattersJuly 17, 2025
  • HITRUST Requirements: Your Guide to CertificationJuly 11, 2025
  • HITRUST Certification Cost: What to Expect in 2025July 9, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

AI-Driven Defense Cloud Computing Cloud Infrastructure Cloud Security cybersecurity Cyber Security hacking Penetration Testing

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Protecting enterprises with intelligent cybersecurity: the power of technology, the precision of human insight.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top