Venkata Satish Guttula's Blog (4)

Want to stop your customers from getting duped by email spoofing? Implement DMARC now!!

It is more than a month since many of us travelled by air. But we can still remember how the security officer stopped us at the gate to check our tickets/boarding passes and…

Continue

Added by Venkata Satish Guttula on May 4, 2020 at 1:09pm — No Comments

Increase of the Phishing attacks in the COVID-19 situation

No alt text provided for this image

Novel CoronaVirus is not only posing a grave danger in the real world, but it is also posing a threat to the cyberworld. Cybercriminals are exploiting the public fears about this deadly virus using phishing attacks.

Phishing is a technique used by cybercriminals to send genuine-looking emails and make the user take actions. These actions can be replying with personal information or clicking…

Continue

Added by Venkata Satish Guttula on April 30, 2020 at 4:45pm — No Comments

Apache Struts Remote Code Execution Vulnerability on one of Indian Government sites

Apache Struts Remote Code Execution Vulnerability was discovered couple of years ago and it was used to breach high profile companies like Equifax. It was in news for quite a while for how the breach was (mis)handled by Equifax. It is a high severity vulnerability where many companies worked day and night to update their Apache Struts installations.

Buy today I discovered one of the Indian Government websites is launched with this critical Apache Struts Remote Code Execution…

Continue

Added by Venkata Satish Guttula on January 15, 2019 at 5:07pm — No Comments

[Interview] Avoiding Overreliance on Artificial Intelligence and Machine Learning

An effective incident response plan includes people, process and technology. While many processes and technologies are put in place, there is always a fear of the unknown. A good process includes looking out for zero day vulnerabilities ... and timely patching. This involves the people part, and we have many times seen that the human element is the weakest link in cybersecurity.

Take the example of the…

Continue

Added by Venkata Satish Guttula on January 9, 2019 at 9:30am — No Comments

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service