Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Incident Response

  1. Home
  2. Incident Response

Category: Incident Response

Enhance your SOC with threat hunting.
Incident Response SOC

Elevate your SOC: Key Steps to Kickstart Threat Hunting

In today’s rapidly evolving cyber landscape, the traditional, reactive approach to security just doesn’t cut it anymore. For cyber professionals […]

17 May, 2025
DORA compliance: Key requirements, penalties, and steps to achieve compliance.
Incident Response Laws & Regulations

DORA explained: Requirements, penalties, and steps to complianceFeatured

What is DORA? DORA stands for the Digital Operational Resilience Act. It is the framework introduced by the European Commission […]

17 May, 2025
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Research Security Testing

Malware on Steroids Part 3: Machine Learning & Sandbox Evasion

Hey, It’s been a busy month for me and I was not able to save time to write the final […]

17 May, 2025
2
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Security Testing

Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment

Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things […]

17 May, 2025
Malware on Steroids 1
Anti-Forensics Hacks Incident Response Malware Analysis Penetration Testing Security Testing

Malware on Steroids – Part 1: Simple CMD Reverse Shell

The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the […]

17 May, 2025
Fundamentals Hacks Incident Response Malware Analysis Tools Uncategorized

Reverse Engineering For Beginners – XOR encryption – Windows x64

Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however […]

17 May, 2025
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 Basics – Linux on ARM64

As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited […]

17 May, 2025
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Windows

Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help […]

17 May, 2025
1
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Linux

Prologue The main focus of this blog is to give a push start to the beginners to get in the […]

17 May, 2025
3
Case Studies Compromise Detection DFIR Incident Response Network Forensics

Security Analytics Using ELK

Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]

17 May, 2025
  • 1
  • 2
  • 3

Sidebar

Recent Posts

  • Vulnerability Prioritization Is Broken: Here’s How We Fix It with Transilience AIMay 5, 2025
  • Measuring What Matters: Using Metrics to Master Vulnerability PrioritizationMay 5, 2025
  • Beyond the Noise: A Practical Guide to Mastering Vulnerability PrioritizationMay 5, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

cybersecurity Cyber Security hacking malware Malware Analysis Penetration Testing pentesting USA

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top