Blogs

Wazuh-Agent

গত পর্বে আমরা wazuh ইন্সটল করা শুরু থেকে দেখেছিলাম। এই পর্বে দেখব কিভাবে এজেন্ট অ্যাড করা যায়। এজেন্ট অ্যাড করার পর, প্রতিটি এজেন্ট এর লগ আমরা Dashboard এ দেখতে পারব, মনিটর করতে পারব। এজেন্ট হিসেবে আমরা server, personal computer, সবই অ্যাড করতে পারি। এবং যে কোনো অপারেটিং সিস্টেম কে অ্যাড করতে পারি। এই পর্বে আমরা খুবই […]

The Symphony of SIEM in t...

In the digital realm, where threats lurk like shadows, organizations require a vigilant sentinel to protect their precious assets. This sentinel is the Security Operations Center (SOC), a symphony of security tools and expertise that monitors, detects, and responds to cyberattacks. At the heart of the SOC lies a powerful maestro: Security Information and Event […]

How Equifax Faced Cyber a...

In 2017, the company Equifax (Equifax is an American credit reporting agency) was attacked by phishing. The attacker sent an email that appeared to be from a legitimate source, such as the CEO or a financial institution. The email contained a malicious link, which an employee clicked on. This allowed the attacker to gain access […]

Guarding Financial Fortun...

Introduction: In our intricate digital landscape, where threats lurk at every virtual corner, the financial sector stands as a beacon of hope and resilience against cyber adversaries. Today, we invite you to embark on a compelling journey through a genuine account of valor – one where a regional bank, awash in the financial currents, adeptly […]

Mydoom worm: The Most Des...

The Mydoom worm was a computer virus that was first released in 2004. It is considered to be the most destructive malware in history, causing an estimated $38 billion in damages. Mydoom spread rapidly through email and infected millions of computers. It was also capable of launching distributed denial-of-service (DDoS) attacks, which can take down […]

Wazuh Installation

প্রতিনিয়ত সাইবার অ্যটাকের সংখ্যা বৃদ্ধির ফলে আমাদের নিরাপত্তা ব্যবস্থার উন্নতির প্রয়োজনীয়তা উপলব্ধি করতে পারি। বর্তমান সাইবার ওয়ার্ল্ডে নিরাপদ থাকতে প্রয়োজন ‍সঠিক নিরাপত্তা ব্যবস্থা এবং মনিটরিং সিসটেম। একটি ইনফ্রাস্ট্রাকচার এর সিকিউরিটি মনিটরিং গুরুত্তপূর্ণ একটি কাজ। আমরা একটি Open-Source SIEM Solution ব্যবহার করে Log Analysis করব এবং এর Installation Process দেখব। এ পর্বে আমরা শুধু Wazuh ইনস্টলেশন […]

CCNA: All you need to kno...

The Cisco Certified Network Associate (CCNA) certification is a highly regarded certification in the networking industry. It is an entry-level certification that validates your skills in designing, configuring, and troubleshooting networks. In this article, we will discuss how to prepare for the CCNA exam, who can benefit from it, the cost of the exam, what […]

Vulners-Agent act as a SI...

Vulners Agent is a powerful software tool that can help security teams identify potential security threats and vulnerabilities within their network. The agent can be installed on various operating systems, including Windows, Linux, and macOS. In this article, we will focus on how the Vulners Agent can be used as a SIEM solution for Windows […]

Importance of SIEM Soluti...

Security Information and Event Management (SIEM) solutions are the first line of defense in securing today’s computing infrastructure. With the increasing frequency and sophistication of cyber threats, it’s imperative that organizations have a solution that provides real-time visibility. In this blog, we’ll explore the importance of SIEM solutions and why need to implement SIEM Solutions […]

What is Lorem Ipsum?

Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.