Skip to content
dotted-bg-white

HyperScale Blog

Cyber Security Updates, Know-Hows, Tips & Tricks and much more!

Megan SHAWFeb 15, 2023 9:09:16 PM3 min read

Cyber Attack on AIIMS: Crucial lessons to be learned

Cyber attacks have become an increasingly common threat to organizations around the ...
Start Reading
Adarsh ShettySep 20, 2022 2:06:25 AM5 min read

Introduction to Sigma Rules

What are Sigma rules? Sigma is an open standard for signature rule format that allows you ...
Start Reading
Rakshit ShettyAug 25, 2022 2:37:26 AM3 min read

What is Magniber Ransomware and How to Detect it

Magniber is a ransomware program that infects systems by exploiting vulnerabilities in ...
Start Reading
Siddhant MishraAug 23, 2022 2:49:07 AM5 min read

Return of BlackByte Ransomware

On February 11, 2022, FBI and Unites States Secret Service (USSS) released a joint ...
Start Reading
Rachina PoojariAug 3, 2022 12:55:05 AM5 min read

Google Drive Monitoring with DNIF HYPERCLOUD

Google Workspace comprises a number of cloud-based productivity and collaboration tools ...
Start Reading
Adarsh ShettyApr 29, 2022 3:44:34 AM3 min read

Detecting Spring4Shell (CVE-2022-22965) Exploitation Using DNIF HYPERCLOUD

What is Spring4Shell? Spring4Shell is the name given to a critical remote code execution ...
Start Reading
Adarsh ShettyApr 25, 2022 3:32:47 AM2 min read

Understanding The Spring4Shell Vulnerability

What is Spring4Shell? Spring4Shell is the name given to a critical remote code execution ...
Start Reading
Megan SHAWMar 21, 2022 12:10:17 PM3 min read

Top Threat Detection Strategies for Fintech Companies

A recent trend has seen organisations leveraging cloud for their critical workloads. ...
Start Reading
Megan SHAWMar 13, 2022 6:12:14 AM3 min read

Four Lessons Learned From the Log4j Vulnerability

Log4j is a Java-based software library used for login purposes. It is widely used by ...
Start Reading