PinnedHarsh KahateGuarding Your Virtual Fortress : A step-by-step Guide to Install Wazuh on a Virtual Machine | Part…While I was trying to explore more and more things in the defensive security, I thought of learning in detail about SIEM and Wazuh. The…May 27, 20231May 27, 20231
PinnedHarsh KahateAll you need to know and do for becoming SOC 2 Type II CompliantWhy do you need a SOC 2 Type II report, what does it mean and how to get it?Jun 15Jun 15
PinnedHarsh KahateFrom Numbers to Impact: Making Sense of CVSS V4.0 Score with Practical ExamplesIn today’s ever-evolving cybersecurity landscape, prioritising vulnerabilities effectively is critical. The Common Vulnerability Scoring…Feb 251Feb 251
PinnedHarsh KahateUsing Steganography tools in LinuxBefore going towards the technical part of this article, let us understand what is meant by Steganography.Sep 17, 20222Sep 17, 20222
PinnedHarsh KahateInstalling Docker on Kali LinuxUnderstanding Docker + Installation on Kali LinuxAug 28, 20221Aug 28, 20221
Harsh KahateThe real meaning of OWASP Top 10 Mobile 2024 list from Security and Privacy ViewpointsRecently, the final list of top 10 mobile application vulnerabilities has been released by OWASP. The last one was released in 2016. The…Feb 10Feb 10
Harsh KahateA Deep Dive into Zero Trust ArchitectureAny organisation or business becomes successful only if it is trusted by its customers and investors. When it comes to organisations…Nov 5, 2023Nov 5, 2023
Harsh KahatePersonally Identifiable Information (PII) — Why so important and how to protect it?Recently, the Government of India brought the DPDP (Digital Personal Data Protection) act and since then, I have been reading a lot of…Sep 16, 2023Sep 16, 2023
Harsh KahateCool Linux CommandsSome days back when I was bored at work and trying to do some random things on my Linux terminal, I came across a very funny and unusual…Mar 5, 2023Mar 5, 2023
Harsh KahateHack Android Device using LinuxIn this article, we will be hacking an android device using Kali Linux. You need only a Linux based machine, a stable internet connection…Nov 2, 2022Nov 2, 2022