Skip to content
dotted-bg-white

HyperScale Blog

Cyber Security Updates, Know-Hows, Tips & Tricks and much more!

Megan SHAW 6 min read

How DNIF Makes it easy to analyse complex log data

Security incidents are becoming more common and complex, putting immense pressure on ...
Start Reading
Megan SHAW 4 min read

Cyber Attack on AIIMS: Crucial lessons to be learned

Cyber attacks have become an increasingly common threat to organizations around the ...
Start Reading
Adarsh Shetty 7 min read

Introduction to Sigma Rules

What are Sigma rules? Sigma is an open standard for signature rule format that allows you ...
Start Reading
Rakshit Shetty 5 min read

What is Magniber Ransomware and How to Detect it

Magniber is a ransomware program that infects systems by exploiting vulnerabilities in ...
Start Reading
Siddhant Mishra 8 min read

Return of BlackByte Ransomware

On February 11, 2022, FBI and Unites States Secret Service (USSS) released a joint ...
Start Reading
Rachina Poojari 8 min read

Google Drive Monitoring with DNIF HYPERCLOUD

Google Workspace comprises a number of cloud-based productivity and collaboration tools ...
Start Reading
Adarsh Shetty 4 min read

Detecting Spring4Shell (CVE-2022-22965) Exploitation Using DNIF HYPERCLOUD

What is Spring4Shell? Spring4Shell is the name given to a critical remote code execution ...
Start Reading
Adarsh Shetty 4 min read

Understanding The Spring4Shell Vulnerability

What is Spring4Shell? Spring4Shell is the name given to a critical remote code execution ...
Start Reading
Megan SHAW 6 min read

Top Threat Detection Strategies for Fintech Companies

A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Start Reading
Megan SHAW 5 min read

Four Lessons Learned From the Log4j Vulnerability

Log4j is a Java-based software library used for login purposes. It is widely used by ...
Start Reading