The content discusses various security challenges associated with Large Language Models (LLMs) and emphasizes the OWASP Top 10 framework for identifying vulnerabilities. It offers open-source detection tools and practical implementation tips to enhance LLM security, including regular audits, incident response planning, and ongoing team training, highlighting the importance of adaptability in security measures.
How to Monitor and Protect Your AWS Account from High Privilege and Disruptive API Calls?
Amazon Web Services (AWS) offers a wide range of API calls that allow users to control and manage their resources. However, some of these API calls are considered to be high privilege or disruptive, meaning that they can have a significant impact on your AWS account if used incorrectly. In this blog post, I will... Continue Reading →
Cyber Security Career Options and Getting Started – Part 1
The field of cybersecurity has garnered significant attention, prompting many professionals from various industries and graduates to inquire about how they can enter this domain and explore the different career options it offers. To address these questions comprehensively, this blog series will be divided into two parts. In Part 1, we will delve into the... Continue Reading →
How to monitor and detect malicious PowerShell scripts?
In today's threat landscape more and more threats like fileless malware and ransomware leverage PowerShell during the exploitation stage. In this post I have written some of the best ways to monitor and detect malicious PowerShell scripts. Let's begin with some of the best practices for using PowerShell in your environment Limit PowerShell to only... Continue Reading →
Top Breach and Attack Simulation Tools Reviewed
10 years ago, when Gartner defined SIEM (Security Information and Event Management) it was trending in the cybersecurity landscape, and every organization was looking for one. More players started coming in with different set of architecture and deployment based on organizations size and requirements. Even now there are new companies coming up with a new... Continue Reading →
How to protect your organization using Essential Eight mitigation strategy?
Australia Signal Directorate (ASD) and Australia Cyber Security Centre (ACSC) has defined a strategy called Essential Eight to help organizations mitigate threats and adversaries. These eight strategies are baselines and can be used as a starting point for organizations and then strengthen up the defense. In this post, I have explained the eight strategies and... Continue Reading →
How to reduce noise in your SIEM?
Your SIEM (Security Information and Event Management)'s ROI depends on how effectively you tune it. Data sources like Firewall, AD server, File server, generates millions of logs every day. Without proper audit policy and SIEM filters, 80% of logs are noise. If you do not tune it, you will not get real value from your... Continue Reading →
Events of Interest to monitor in Cisco ASA Firewall/IPS
When I receive a request to monitor critical events from a vendor, it becomes a cumbersome task to gather information about the vendor, log schema, and event types. This information is not readily available through a simple online search. To simplify the process, I am providing a consolidated list of Cisco ASA events that are... Continue Reading →
Active Directory Password Audit – Using Pwned Passwords
Active directory in Windows have some built in features to set restriction for passwords created in your environment. How cool would it be if we can compare the passwords used in your AD environment with the passwords disclosed in breach database? By doing this you can ensure that none of your users are using weak... Continue Reading →
Password hygiene. How to create strong passwords and manage them?
Every time when you sign up to a new service online, you would have to create a password. As a security measure, every site will ask you to create a strong password which is hard to guess, mix of alphanumeric, special characters, at least one uppercase letter and with least character limitation. On top of... Continue Reading →
