Skip to content
dotted-bg-white

HyperScale Blog

Cyber Security Updates, Know-Hows, Tips & Tricks and much more!

Megan SHAW 6 min read

How DNIF Makes it easy to analyse complex log data

Security incidents are becoming more common and complex, putting immense pressure on ...
Start Reading
Shomiron DAS GUPTA 6 min read

Why cost is a barrier to good THREAT detection

It was Q3 of 2018, when we were running surveys across the globe, talking to analysts and ...
Start Reading
Megan SHAW 4 min read

Cyber Attack on AIIMS: Crucial lessons to be learned

Cyber attacks have become an increasingly common threat to organizations around the ...
Start Reading
Megan SHAW 7 min read

What are the best measures to avoid APT attacks?

Advanced persistent threats (APTs) are cyber attacks that have the potential to cause the ...
Start Reading
Megan SHAW 3 min read

Steps to Develop custom rules and alerts based on MITRE ATT&CK techniques and tactics

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, ...
Start Reading
Megan SHAW 5 min read

Using MITRE ATT&CK to enhance threat hunting and incident response

The MITRE ATT&CK framework is a widely-used threat modeling and analysis framework ...
Start Reading
Megan SHAW 5 min read

What is ransomware and how does it work?

Ransomware is a type of malicious software or malware that restricts access to computer ...
Start Reading
Shomiron DAS GUPTA 6 min read

Opinion - Short term log retention has a problem

IMHO Retention of log events has not been discussed enough. In my interaction with ...
Start Reading
Megan SHAW 8 min read

Threat Hunting: Methodologies, Tools, and Tips

Threat hunting is the practice of proactively and continuously searching for cyber ...
Start Reading