Sign in to view Ponmozhi’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Ponmozhi’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Tamil Nadu, India
Sign in to view Ponmozhi’s full profile
Ponmozhi can introduce you to 10+ people at A2MAC1 - Decode the future
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
4K followers
500+ connections
Sign in to view Ponmozhi’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Ponmozhi
Ponmozhi can introduce you to 10+ people at A2MAC1 - Decode the future
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Ponmozhi
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Ponmozhi’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
4K followers
-
Ponmozhi Gnanasekar shared thisCongratulate me on earning my ZDTA badge from Zscaler.Zscaler Digital Transformation Administrator was issued by Zscaler to Ponmozhi Gnanasekar.Zscaler Digital Transformation Administrator was issued by Zscaler to Ponmozhi Gnanasekar.
-
Ponmozhi Gnanasekar reposted thisPonmozhi Gnanasekar reposted thisWe are excited to share that Diligent Global has been officially certified as a Great Place to Work! A big thank you to our incredible team for making this possible. Together, we will continue to build a culture that fosters innovation, collaboration, and excellence. #DiligentGlobal #GreatPlaceToWork #TeamSuccess #CompanyCulture #Grateful #Achievement
-
Ponmozhi Gnanasekar reposted thisPonmozhi Gnanasekar reposted thisIf ignored service requests are your primary problem right now, you must switch to DiliGenie. DiliGenie’s platform immediately informs engineers about service requests and their priority. Therefore, your issues are resolved faster, without getting ignored. Book a Demo for Free! - https://lnkd.in/dKfHz5pn #ITSM #ServiceRequest #ServiceEngineers #ITServiceManagement #ITServices #DiliGenie #DiligentGlobal
-
Ponmozhi Gnanasekar reposted thisPonmozhi Gnanasekar reposted thisLooking for a Multifaceted ITSM Tool to Resolve Issues on Time? DiliGenie is Your Answer! DiliGenie Offers: 💻 Customized Dashboard 🎟️ Parent-child Ticketing Facility 📄 Root Cause Analysis Report 🤖 Genie Bot 📃 Configurable Catalog 🗓️ Change Calendar Apart from This, There are Features Like Knowledge Base, RAG Indicators & Integration with SIEM Tools! So Why the Wait? Start Your Free Trial Today: https://lnkd.in/dKfHz5pn #itsm #digitalinfrastructure #automation #itil #ittools #ittransformation #diligent #diliGenie #itsmtools #incidentcreation #parentchildticketing #incidentticket #RAGIndicator #SIEMTools #Knowledgebase
-
Ponmozhi Gnanasekar reposted thisPonmozhi Gnanasekar reposted thisGet to the root cause of your ITSM problem and solve them from core. DiliGenie's service engineers are here to resolve your tickets on time and ensure you can continue with your work with minimum downtime. Choose DiliGenie ITSM tool now and start your free trial today: https://lnkd.in/dKfHz5pn #DiliGenie #ITSMTool #Diligentglobal #ITServicemanagement #ITSM #Resolvetickets #IncidentManagement
-
Ponmozhi Gnanasekar reposted thisPonmozhi Gnanasekar reposted thisDiliGenie ITSM modules like role-based dashboards, tool integration, KB/KEDB, Incidents, Service Requests, Problems, Changes, and Project Management are unique and ensure your IT service management moves without obstacles. So rely on us and book a call for a free trial today! - https://lnkd.in/dPDTgmSC #itsm #digitalinfrastructure #automation #itil #ittools #ittransformation #diligent #diligenie #itsmtools #incidentcreation #incidentticket
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisOur Academy Students got Prizes in State level chess tournament held in Madurai
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisI’m happy to share that I have successfully completed the Qualys Certified Specialist in VMDR certification! #Qualys #CyberSecurity #VMDR #VulnerabilityManagement #ContinuousLearning Celebrating my new certification!
-
Ponmozhi Gnanasekar liked thisA critical reminder that even trusted AI tools can become attack vectors. The Claude Chrome Extension zero-click vulnerability is a perfect example of why third-party browser extensions must be part of your risk assessment and security reviews not an afterthought. Silent prompt injection with no user interaction is a serious threat vector. Glad it's patched, but the lesson is clear: AI security is everyone's responsibility. #CyberSecurity #AIRisk #RiskManagement #PromptInjection #InfoSecPonmozhi Gnanasekar liked this⚠️ Claude Chrome Extension 0-Click Vulnerability Enables Silent Prompt Injection Attacks | Source: https://lnkd.in/gFv8VKJU A critical zero-click vulnerability in Anthropic's Claude Chrome Extension exposed over 3 million users to silent prompt-injection attacks, allowing malicious websites to hijack the AI assistant without user interaction. The flaw, now patched, could have enabled attackers to steal Gmail access tokens, read Google Drive files, export chat history, and send emails all invisibly. The extension's messaging API accepts a message type called onboarding_task, which accepts a prompt parameter and forwards it directly to Claude for execution. #cybersecuritynews
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisAkamai Technologies at the Top 5 list of India's Top Workplaces in 2026 according to MarketingMind's recent survey. Our Peoples First approach which is inherent part of our DNA and our 100% flexibility (work from home or office) is what puts us apart. Join Us!
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisAt Diligent Global, we recently marked our celebration of International Women's Day by taking a moment to recognize the incredible women who contribute to our organization every day. Across teams and roles, their ideas, leadership, and commitment continue to shape our culture and drive progress. It’s these everyday contributions that strengthen not only our workplace, but the way we collaborate, innovate, and grow together. As the week unfolded, it gave us an opportunity to pause, appreciate, and acknowledge the many ways our colleagues continue to make a meaningful impact across the organization. #WomenInLeadership #WorkplaceCulture #DiversityAndInclusion #DiligentGlobal
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisExcited to share that I have stepped into the role of Deputy Manager at Mahindra and Mahindra Limited [Automotive and Farm Equipment Business] in CDMM DAC – ICE. Thankful for the opportunity and looking forward to taking on new challenges and responsibilities. Mamta Rani thank you for your onboarding support. #Mahindra #CareerMilestone #Growth #Togetherwerise
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisSeries 2 | Commitment This week, we’re listening to voices around one word that shows up in our work every day: "commitment." Not the kind that’s announced! The kind that’s practiced — in meeting deadlines, supporting teammates, and staying with a problem until it’s solved. Sharing perspectives from within the team on what commitment has looked like in their journey at Diligent Global.
-
Ponmozhi Gnanasekar liked thisPonmozhi Gnanasekar liked thisMost SOC teams still rely on domain reputation and URL analysis — but AITM phishing has changed the game. Modern adversaries use reverse proxy frameworks to perform session theft, not password theft. The phishing page may perfectly replicate the Microsoft login portal, but the real signal often lives inside the DOM object relationships. Fields like img.src, script.src, link.href, iframe.src, and even inline styling such as div.style reveal how the page dynamically assembles trust. Many AITM kits load legitimate Microsoft branding assets from real domains like logincdn.msauth.net while proxying authentication in the background. That combination — suspicious host + trusted external resource pairs — creates a powerful enrichment signal. Detection engineering must move beyond DNS and into DOM-aware host pair analysis to identify token harvesting and MFA-complete session hijacking. If you're not correlating DOM artifacts with sign-in telemetry, you're missing modern phishing. Here is the example below domain is crafted for AITM phishing where we could see the host pair and the cause. We see the child hostname field for the phish domain is microsoft domain "logincdn.msauth.net " aligned with the cause img.src. Parent hostname: (Phish Domain) relatorioth-4413245.jed[.]wafaicloud[.]com Child hostname: logincdn.msauth.net Cause: img.src
Experience & Education
-
A2MAC1 - Decode the future
****** ********
-
******** ******
******** **********
-
*********
***** ******** **********
-
******** *********** *******
******** ****** ********** *** *********** *********** First Class
-
-
********** *********** *******
********** ****** *********** *********** *** ************** *********** ***** *****
-
View Ponmozhi’s full experience
See their title, tenure and more.
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Courses
-
CISCO - Cyber Security Operations
-
-
CISCO- CCNA Switching & Routing
-
-
Cyber Security Advance Threat Intelligence
-
-
Cyber Security Analyst- CYSA+ Comptia
-
-
Fundamentals of Computer Hacking
-
-
ITIL Foundations
-
-
vulnerability management
-
Recommendations received
2 people have recommended Ponmozhi
Join now to viewView Ponmozhi’s full profile
-
See who you know in common
-
Get introduced
-
Contact Ponmozhi directly
Explore more posts
-
Orbus International
32K followers
Best Reasons to Choose Orbus for Penetration Testing Course Orbus offers a comprehensive penetration testing course in Kolkata for both IT professionals and beginners. Learn real-world ethical hacking skills, including how to identify, exploit, and fix security vulnerabilities based on modern cybersecurity threats. 👉 Read Full Blog: https://lnkd.in/gWZZZ8Pw
3
-
Cyber Warriors Middle East
571 followers
New Delhi | MSHTML Framework Vulnerability: A Rising Cyber Threat Cybersecurity experts are raising alarms regarding a newly identified vulnerability in the MSHTML framework, designated as CVE-2026-21513. This high-severity security flaw, which has a CVSS score of 8.8, is reported to be capable of bypassing security controls within the MSHTML framework. The implications could be […] https://lnkd.in/d-KzbH93 Cyber Warriors Middle East #CyberWarriorsMiddleEast #CyberWarriorsConclave #CWME #CWC #Cybersecurity #CyberThreats #MitigatingCyberAttacks #MiddleEast #UAE #Dubai
-
CYBERDUDEBIVASH Sentinel APEX™ | Global Threat Intelligence Platform
390 followers
🚨 𝗧𝗛𝗥𝗘𝗔𝗧 𝗔𝗗𝗩𝗜𝗦𝗢𝗥𝗬 | 𝗖𝗬𝗕𝗘𝗥𝗗𝗨𝗗𝗘𝗕𝗜𝗩𝗔𝗦𝗛 𝗦𝗲𝗻𝘁𝗶𝗻𝗲𝗹 𝗔𝗣𝗘𝗫 🔴 Severity: High 📌 Critical Grandstream Phone Vulnerability Exposes Calls to Interception ━━━━━━━━━━━━━━━━━━ Executive Impact This vulnerability presents potential enterprise risk exposure. Security teams should validate patch status and assess affected environments immediately. Read the complete intel report on - https://lnkd.in/gj96h4eW ━━━━━━━━━━━━━━━━━━ Intelligence Context CYBERDUDEBIVASH Sentinel APEX monitoring indicates active threat landscape relevance. Organizations with exposed services should review configurations and access controls. Technical Analysis & Indicators - https://lnkd.in/gj96h4eW ━━━━━━━━━━━━━━━━━━ Immediate Defensive Actions • Verify patch implementation • Review exposed services • Monitor suspicious authentication or privilege escalation activity • Validate access control configurations Assess the complete advisory on - https://lnkd.in/gj96h4eW ━━━━━━━━━━━━━━━━━━ 📊 Full Technical Report https://lnkd.in/gj96h4eW #CyberSecurity #ThreatIntelligence #CVE #EnterpriseSecurity #SOC #CyberDudeBivashSentinelAPEX
1
-
Erudite Risk
3K followers
Cyber cops bust inter-State fraud network arrest 81 cybercriminals In a multi-state operation, the Telangana Cyber Security Bureau (TGCSB) arrested 81 cybercriminals involved in a ₹95 crore fraud network spanning Maharashtra, Tamil Nadu, Karnataka, Kerala, and Andhra Pradesh. The operation lasted 25 days and dismantled a core organized fraud syndicate that used a commission model, offering up to 5% to 'mules' who lent their bank accounts for fraudulent money transfers. The arrests included 28 individuals from Kerala, 23 from Maharashtra, 13 from Karnataka, 10 from Andhra Pradesh, and seven from Tamil Nadu. Among those arrested were 17 identified as agents, 11 involved in cheque and cash withdrawals totaling ₹34.70 lakhs, and 53 mule account holders. The group included professionals from diverse backgrounds, such as a Bandhan Bank branch manager, an employee from IDFC Bank linked to 106 cases, a Federal Bank employee, an accountant from the Kilpauk Audit Office, and multiple graduates. Investigators found links to external operatives, prompting the issuance of look-out circulars against accomplices abroad. The police seized 84 mobile phones, 101 SIM cards, and 89 bank passbooks and cheque books used in the fraudulent schemes. The arrests were connected to 41 cases across seven TGCSB Cyber Crime Police Stations. Investigators identified 754 related crime links nationwide, with 128 connected to Telangana, confirming the extensive reach and impact of the fraud network. #AsiaRisk #CyberAttacksandDataLoss #India https://lnkd.in/eWSTDkCT
1
1 Comment -
GrayHat
60 followers
The CERT-In Cyber Security Audit Policy Guidelines (CIGU-2025-0002) provide a standardized framework for conducting cybersecurity audits across government, critical infrastructure, and regulated private entities in India. The guidelines mandate annual audits and special assessments in case of major incidents, focusing on technical, procedural, and governance-level controls. Audits must follow methodologies aligned with NIST, ISO 27001, OWASP, and CERT-In advisories, covering VAPT, cloud security, configuration reviews, and access controls. Reports must include risk-based findings, remediation plans, and be submitted within 30 days. Only CERT-In empanelled auditors are authorized, ensuring impartiality, confidentiality, and compliance with national cybersecurity objectives. #cybersecurity #CERT-In
-
MailArmor AI
560 followers
In this new field guide, “Top 5 Emerging Phishing Threats in India & How Businesses Can Stop Them in 2025,” Subhajeet Naha (27+ years in enterprise security, now leading Protecte Technologies) breaks down: 👉 The 5 fastest-evolving phishing patterns hitting Indian businesses 👉 A 30-day, India-ready defense plan using DMARC, passkeys, vendor verification, and mailbox-native, post-delivery security If you’re a founder, CISO, or IT leader responsible for protecting UPI rails and Microsoft 365/Google Workspace, this is one article you can’t afford to skip. 👉 Read the full guide and see how to cut phishing risk in weeks, not quarters. 👉 See the comment section for the link. #emailprotection #phishing #mailarmorai
3
1 Comment -
The420.in
3K followers
🚨 In Amroha, cybercriminals have cracked a new modus operandi: stealing Aadhaar & fingerprint data from registry sites, cloning SIMs, and accessing bank accounts without OTPs. Victims lost lakhs. Full Story: https://lnkd.in/gPVRZH7r #CyberFraud #DataBreach #SIMCloning #AadhaarSecurity #Amroha #DigitalThreat
3
-
Underscore Cybersecurity
952 followers
𝐌𝐨𝐬𝐭 𝐜𝐲𝐛𝐞𝐫 𝐛𝐫𝐞𝐚𝐜𝐡𝐞𝐬 𝐝𝐨𝐧’𝐭 𝐬𝐭𝐚𝐫𝐭 𝐰𝐢𝐭𝐡 𝐡𝐚𝐜𝐤𝐞𝐫𝐬. 𝐓𝐡𝐞𝐲 𝐬𝐭𝐚𝐫𝐭 𝐰𝐢𝐭𝐡 𝐛𝐥𝐢𝐧𝐝 𝐬𝐩𝐨𝐭𝐬. Blind spots in risk visibility. Blind spots in threat context. Blind spots in compliance assumptions. Cybersecurity fails when organizations are unaware of what they don’t see. 𝐴𝑡 𝑈𝑛𝑑𝑒𝑟𝑠𝑐𝑜𝑟𝑒 𝐶𝑦𝑏𝑒𝑟𝑠𝑒𝑐𝑢𝑟𝑖𝑡𝑦, 𝑤𝑒 𝑓𝑜𝑐𝑢𝑠 𝑜𝑛 𝑒𝑙𝑖𝑚𝑖𝑛𝑎𝑡𝑖𝑛𝑔 𝑏𝑙𝑖𝑛𝑑 𝑠𝑝𝑜𝑡𝑠 — 𝑠𝑦𝑠𝑡𝑒𝑚𝑎𝑡𝑖𝑐𝑎𝑙𝑙𝑦, 𝑚𝑒𝑎𝑠𝑢𝑟𝑎𝑏𝑙𝑦, 𝑐𝑜𝑛𝑡𝑖𝑛𝑢𝑜𝑢𝑠𝑙𝑦. 𝐅𝐨𝐥𝐥𝐨𝐰 Underscore Cybersecurity 𝐢𝐟 𝐲𝐨𝐮 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐜𝐥𝐚𝐫𝐢𝐭𝐲 𝐢𝐬 𝐭𝐡𝐞 𝐬𝐭𝐫𝐨𝐧𝐠𝐞𝐬𝐭 𝐝𝐞𝐟𝐞𝐧𝐬𝐞. Aditya kadiyan Gopal Maheshwari Munish Paul Sharma Babul Bhatt Mannu Kalra Sameer Mathur Sanjay Chhugani Amit Sharma Underscore Cybersecurity #CyberSecurity #RiskVisibility #FutureReady #ThreatIntelligence #Attacksurface #Attacksurfacemanagement
2
-
CCITIC
771 followers
🚨 CTI ALERT — Alleged sale of BreachForums' complete database ━━━━━━━━━━━━━━━━━━━━━━ A threat actor known as WHALEHUNTERS is claiming the sale of a full backup of BreachForums, dated March 10, 2026. What is alleged: ▸ Complete source code of the platform ▸ Databases containing information on over 346,000 users ▸ Associated datasets ━━━━━━━━━━━━━━━━━━━━━━ Why does this matter? BreachForums is one of the most prominent cybercriminal platforms globally. If this leak proves authentic, it could enable massive de-anonymization of threat actors — a significant leverage point for law enforcement and CTI teams alike. Estimated impact: medium to high — pending independent verification. ━━━━━━━━━━━━━━━━━━━━━━ The community is watching. Verification is ongoing. If you hold elements that could corroborate or disprove this claim, the usual channels are open. 🔍 ━━━━━━━━━━━━━━━━━━━━━━ Source: @VECERTRadar https://lnkd.in/eVguzvrT #CyberThreatIntelligence #CTI #BreachForums #DarkWeb #Cybersecurity #ThreatIntelligence #OSINT #DataBreach
3
-
CYBERLABS INDIA
251 followers
Strong cybersecurity professionals are built on system-level understanding. Before offensive security. Before threat hunting. Before advanced investigations. The foundation begins with how systems actually work. At Cyberlabs India, we train cybersecurity professionals to develop deep operational understanding across the environments that modern security teams depend on: ▪️ Linux environments ▪️ Windows internals ▪️ Command-line operations ▪️ OS permissions and privilege structures ▪️ Virtualization environments These are the same foundations tested every day by enterprise SOCs and security engineering teams across organizations such as IBM Security, Accenture, and Deloitte. Cybersecurity capability is not built by collecting certificates — it is built by mastering the systems behind them. If you are serious about building real cybersecurity capability, this is where the journey begins. Apply now: 🌐 https://lnkd.in/dQibfDyf #CyberSecurity #InfoSec #CyberDefense #SecurityEngineering #CyberSecurityCareers #CyberSecurityTraining #SOCAnalyst #CyberSecurityIndia #CyberProfessionals #CyberlabsIndia Guy Klisman Rami Siman-Tov CYBERLABS 💎 Najeeb Ibrahim Shmulik Yehezkel Ofir Semel
6
1 Comment -
Policy Icon Insurance Consultants
682 followers
Robust cybersecurity and regular audits are essential in today’s digital landscape. Cyber insurance adds an extra layer of protection, acting as a safety net when unforeseen incidents occur. Together, these three pillars—cybersecurity, audits, and insurance—safeguard enterprises against cyber frauds, data breaches, and other cyber threats, protecting both their reputation and financial stability. 📩 For expert guidance on safeguarding your business from cyber events, connect with Policy Icon Insurance Consultants at support@policyicon.in Shilpi Genani Mhapankar #CyberSecurity #CyberInsurance #CyberAudit #DataProtection #InfoSec #DigitalSafety #RiskManagement #BusinessSecurity #BreachPrevention #CyberResilience
2
1 Comment -
Cyber Cache
291 followers
📌Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing ==== The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities. "Initial access is achieved through spear-phishing emails," CYFIRMA said. "Linux BOSS environments are targeted via weaponized .desktop --- 📲 Follow us on ✈️ Telegram: https://t.me/cybercacheen 🐦 Twitter: https://x.com/cyberetweet 📺 YouTube for real-time updates and weekly CVE exploitation videos: https://lnkd.in/gh657MR9 🔗 Visit our blog to learn more: https://cybercache.cc #CyberSecurity #InfoSec #MalwareAnalysis #Botnet #IoTSecurity #LinuxSecurity #ThreatIntel #ZeroDat #CVE #NetworkSecurity #HackingNews #CyberThreats #CyberAwareness #Pentesting
-
AWS Security Digest
3K followers
The Future of CSPMs – Are They Keeping Up? By Chandrapal Badshah 🔍 Cloud Security Posture Management (CSPM) tools have been essential for cloud security, but are they falling behind modern attack techniques? Chandrapal Badshah breaks down where CSPMs struggle today and what must change for better security outcomes. 🚀 Key takeaways: ✅ Why traditional CSPMs miss real-world attack paths ✅ The need for context-aware risk analysis over static checks ✅ How AI/ML can enhance detection and remediation ✅ What next-gen CSPMs must deliver to remain effective If you depend on CSPMs for security, this analysis is a must-read. 🔗 Read here: https://lnkd.in/gE2HfwUi This was first mentioned in AWS Security Digest Issue #195: https://lnkd.in/gy5FYCEx
11
-
K2 Security
44 followers
Do not create threat detections for the sake of metrics! Unfortunately, alert fatigue and burnout are the real threats which most of the Security Operations Center face from within. Alert fatigue and burnout reduces the ability of security professionals to respond to threats. When SOC analysts are constantly bombarded with alerts which turn out to be false alarms, they become desensitized to the noise. Fatigue increases the risk that an analyst will miss or ignore a legitimate, critical threat because it is buried in the volume of false alerts, or they automatically assume it is just another false positive. The repetitive, high volume work of chasing down non-issues lead to frustration, stress, and burnout, which in turn causes high turnover of skilled security professionals. At K2 Security, we specialize in building custom detections which are relevant to organizations' current threat landscape, and drastically reducing false positives so the analysts can respond to threats in a timely manner. This improves their mean time to respond (MTTR), and their focus on real threats. Stop alert fatigue. Start catching threats. Build detections that matter. #SOC #Burnout #FalsePositives #AlertFatigue #DetectionEngineering #ThreatDetection #K2Security
4
-
Auriseg
15K followers
New Cybersecurity Audit Policy Alert 🔍 CERT-In’s updated guidelines are transforming how Indian enterprises tackle digital risks. Key highlights: ✅ Aligns with global standards (ISO, OWASP, CSA, OSSTMM) ✅ Ensures audit integrity with no pay conflicts ✅ Empanels certified experts for red team & vulnerability audits ✅ Introduces graded enforcement for compliance ✅ Promotes continuous threat monitoring & proactive risk mitigation C-Suite leaders, the onus is on you to embed these principles into your organizational DNA. Cyber resilience is no longer optional—it’s your responsibility. Read the full guidelines here: https://lnkd.in/guuVMpW3 #CyberSecurity #CERTIn #Auriseg #CISOGuide #DigitalTrust #RiskManagement #CyberResilience #AuditPolicy #InfoSecLeadership #CLevelSecurity #BoardroomSecurity #CyberCompliance #RedTeamAssessment #VulnerabilityAudit #DataProtection #GovernanceRiskCompliance #GRC #ISO27001 #OWASP #CIO #CTO #CISO #CyberAwareness #EnterpriseSecurity #IndiaCyberSecurity #CyberStrategy #TechLeadership #CyberAudit #BusinessContinuity #CyberSecurityStandards #CyberRiskFrameworks Srinivasan M S Saranya Srinivasan Siva Shankar Subramanian Sanjay Gopinathan Mukesh Sharma Rajasekharan Cheriyath .
16
1 Comment -
DIGITALEARN SOLUTION
8K followers
A firewall acts as a security gate between your internal network and the outside world. It monitors and controls data traffic based on predefined rules—deciding what’s safe to pass and what to block. Every packet of data is checked for compliance with security policies like IP, port, and protocol filtering. Only safe traffic is allowed through, protecting systems from unauthorized access and cyber threats. 🔗 Learn more now: https://rb.gy/p2gzml #Firewall #CyberSecurity #NetworkSecurity #InfoSec #CyberAwareness #DataProtection #ITSecurity #CyberDefense #NetworkProtection
3
-
FireCompass
5K followers
Emerging Hacking Techniques in CoinDCX Breach A recent breach at CoinDCX showcased advanced methods beyond typical exploits: 🔹 Redis cache credential extraction 🔹 SQL injection via vulnerable third-party API (CVE-2025-20281) 🔹 Scheduled cron-based exfiltration 🔹 Use of laundering tools like Tornado Cash These tactics highlight the growing sophistication of threat actors targeting crypto infrastructure. Read the full details here: https://hubs.la/Q03zsBnH0 #CyberSecurity #ThreatIntelligence #CoinDCX #CVE202520281 #RedisExploit #CryptoBreach #APIHacking #Infosec #FireCompass
2
-
CyBrief Private Limited
180 followers
📊 Alert volume ≠ SOC performance. Real SOC maturity shows in outcomes, not counts. ➡️ Detection Accuracy – How many alerts are true positives? ➡️ Response Speed – Time from detection to containment. ➡️ Analyst Efficiency – How many incidents closed per analyst per shift? ➡️ Threat Coverage – Mapping to MITRE ATT&CK coverage. ➡️ Customer / Stakeholder Feedback – Post-incident satisfaction or quality audits. 💡 SOC success = measurable impact, not just activity. #SOCMetrics #DetectionEngineering #InfosecIndia #CyBriefInsights
1
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More