Posts by Parvinder Singh

Incident Response Simulation Quiz for Cybersecurity Analysts

Are you ready to put your incident response skills to the test as a cybersecurity trainee or a beginner? This simulation quiz which consists of eight question will present you with real-life practical hypothetical scenarios and challenges commonly encountered by cybersecurity analysts during security incidents. Let's see how well you handle these situations!

Tags:

quiz

6 Cybersecurity Essentials: Protecting Your Digital Life – Infographics

As a cybersecurity analyst, I daily come across online threats, which are usually phishing schemes and brute-force attacks. Remember the below 6 essential cybersecurity tips to protect your privacy and data from unauthorised access.. This infographic shows major essential cybersecurity practices that users can use to safeguard their digital assets from attackers. The above infographics ... Read more

Tags:

Top Major 5 Cybersecurity Tips Everyone Should Know

Cybersecurity is essential for every online user, it is fundamental to internet. According to research from the University of Maryland, on average, cybercriminals attack about 2,244 users daily, which equates to an attack every 39 seconds. Based on this report, one can conclude that over 800000 online users are targeted by threat actors each year. ... Read more

Tags:

Cybersecurity for Beginners: A Guide to Launch Your Career Safely

I am an IT professional who completed his Bachelor’s in Information Technology and has since been working in this industry. I’m very well versed in software testing and development, but I always wanted to pursue networking or cybersecurity. Last year, I finally took a breather and started looking into pathways that can give me a ... Read more

Tags:

certification / courses / cybersecurity / training

Healthcare Cybersecurity Trends: Trojan, Phishing & Ransomware Risks

As the digital world continues to evolve cybercriminals are also adapting their tactics. In the healthcare industry, where patient data’s highly sensitive it is crucial to understand and address cybersecurity threats. Recent insights, into trends in cybersecurity threats highlight patterns and challenges faced by healthcare organizations providing information on areas that require increased vigilance and ... Read more

Tags:

Phishing Dominance: Financial Sector Cyber Threats Revealed

In today’s changing world of cyber threats phishing stands out as a widespread danger especially for the financial services industry.  Recent data, from Cisco’s Cyber Security Threat Trends report highlights the frequency of phishing attacks in this sector emphasizing the importance of increased awareness and strong defense mechanisms.  As I delved into the information provided ... Read more

Tags:

Cybersecurity as a Service (CSaaS): Fortifying Digital Defenses

In an era of digital engagement and the significant boost in online transactions, it is essential for organizations, be they financial or non-financial, that measures should be taken to secure their users data and privacy. Cybersecurity as a Service (CSaaS) emerges as a valuable and pivotal solution from a small organization to a unicorn, as ... Read more

Tags:

How to analyse DNS traffic using Wireshark?

Packet capturing and analyzing network traffic is essential for organizations. As a Cybersecurity analyst, you have to examine, investigate, and block threats and unauthorized attacks using various SIEM tools and network analyzers – one of them is Wireshark. Analyzing DNS requests of your network using Wireshark involves capturing DNS traffic and then examining the relevant ... Read more

Tags:

Wireshark for Incident Response: Unveiling Threats in Real-Time

In layman’s terms, Wireshark is a potent tool that helps cybersecurity analysts to capture and inspect network traffic in real-time.  Suppose there’s a malicious attack attempt on an organization network and the intrusion detection system (IDS) flags a suspicious event. In such a crucial event, the cybersecurity incident response team needs to locate and stop ... Read more

Tags:

Wireshark Filters & Display Options: Precision in Network Analysis

As a cybersecurity analyst you need various tools to log activity and analyze network traffic. It is essential for cybersecurity professionals to view and analyze and view nework traffic with a granual and articulate approach – to thoroughly investigate any discrepancies and eradicate any issues and report malicious activity. Tools like Wireshark, Tcpdump, Capsa Free, ... Read more

Tags:

Mastodon for Cybersecurity Professionals: Leveraging the Platform for Knowledge Sharing

Cybersecurity is an ever-evolving landscape and is an essential domain of technology. For a cybersecurity professional, it is crucial to stay informed and connected with peers – and social networking seems to be an excellent avenue to collaborate with like-minded professionals.  While traditional social media platforms including X (formerly Twitter), Facebook, and Reddit – offer ... Read more

Tags:

iOS Wi-Fi MAC Vulnerability: Privacy Flaw Exposed

In the cybersecurity domain finding and investigating vulnerabilities within a network or your connected devices is an essential step toward fortifying your digital defense, be it for an employer, for your organization, or just for your personal privacy.  As I recently joined a cybersecurity internship program at a premiere cybersecurity institute, I investigate software and ... Read more

Tags:

Installing Polyglot for Secure Operations

Want to install a python NLP package known as Polyglot? Want to use polyglot for a school or business project to translate languages? Then follow the below instructions and check out how you can install and run Polyglot? I am using a MacBook Air “Big Sur” to do this….. So, all the screenshots and results are based ... Read more

Tags:

Securely Implementing Ruby on Rails & Ruby

In this article you will learn, how you can check if your MacBook Air or any other Mac device has already have Ruby pre-installed. You have to use the linux terminal of your MacBook to do that. And after checking the Ruby language version we will install Ruby on Rails and the more advanced developer ... Read more

Tags:

Mac OS change File Date: Cybersecurity Considerations

The below guide a very simple guide on how to change a file’s “date modified” and “date created” attributes on Mac OS. Note: I am using MacBook Air and current operating System is Big Sur. The below method will definitely work on the latest versions of Mac OS. Yotube video: These are default Date Format Keys:YYYY - For yearMM - Month of the year from 1-12DD - ... Read more

Tags:

Securing Your Data: Safely Deleting iCloud Photos

Want to delete Photos from iCloud and iPhone 15, iPhone 14, iPhone 13, iPhone SE, iPhone 12, iPhone X and iPad? Then follow the below guide to know the best way to remove and erase iCloud Photos permanently and free some storage space. If you are getting iCloud storage full messages then you can either ... Read more

Tags: