We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Skip to navigation Skip to content Network IntelligenceNetwork Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Newsletters
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Research » Page 3

  1. Home
  2. Research
  3. Page 3

Category: Research

Hacks Research Security Testing

Windows Kernel Exploitation

This write-up summarizes a workshop/humla conducted by Ashfaq Ansari on the basics of various kinds of attacks available for exploiting […]

January 29, 2016March 7, 2025
0
Compliance Research

Risks in Core Banking Migration

This article highlights some of the key risks in executing a successful core banking migration program. Many of these risk elements also relate to any large IT project, but are more aligned towards a core banking migration.

September 15, 2015
1
Compliance Research

Vendor Risk Assessment

Introduction Companies today have third party contracts with various vendors. Most of the process are outsourced to various companies. This […]

September 9, 2015
0
Reading Research

The Internet of Things and Smart Cities – Security and Privacy Aspects

The Internet of Things and Smart Cities – Security and Privacy Aspects In a world where the technology is constantly […]

July 30, 2015January 10, 2025
1
Case Studies Malware Analysis Research

Shellshock Exploitation: Using BeEF Framework

In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this […]

October 28, 2014March 18, 2025
2
Case Studies Malware Analysis Research

POODLE Advisory

What is POODLE? POODLE stands for Padding Oracle On Downgraded Legacy Encryption Vulnerability CVE: CVE-2014-3566 What is the attack? The […]

October 20, 2014April 1, 2025
0
Case Studies Hacks Research Secure Coding

Bourne Again Shell (Bash) Remote Code Execution Vulnerability

Introduction A remotely exploitable vulnerability was discovered by Stephane Chazelas of Akamai in the GNU Bash command shell. The vulnerability […]

September 26, 2014March 27, 2025
2
Case Studies Research Security Testing

ATM Application Whitelisting Security Assessment

During a recent engagement, we were asked to test the security level of an application white-listing solution deployed on the […]

September 22, 2014January 20, 2025
0
Fundamentals Reading Research

Metrics For Your Information Security Solutions

Recently, on one of the security mailing lists a query was posted as to what metrics should be produced from a […]

September 14, 2014January 10, 2025
1
Case Studies Research Web Application Security

Authorization Vulnerability in Yahoo! Pipes

Recently, I found an interesting issue qualifying on Yahoo! Pipes. But before going into the details of this specific issue, […]

July 3, 2014January 20, 2025
0
  • 3 / 7
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7

Sidebar

Recent Posts

  • Vulnerability Prioritization Is Broken: Here’s How We Fix It with Transilience AIMay 5, 2025
  • Measuring What Matters: Using Metrics to Master Vulnerability PrioritizationMay 5, 2025
  • Beyond the Noise: A Practical Guide to Mastering Vulnerability PrioritizationMay 5, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

cybersecurity Cyber Security hacking malware Malware Analysis Penetration Testing pentesting USA

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.  visualize, implement, sustain, and evolve your organization’s security posture.

Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Policies
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@networkintelligence.ai

Subscribe To Our Newsletter

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top