Prasannakumar B MundasScenario: Detecting Insider Threats in AWS: A Real-World Example Using CloudTrail, GuardDuty, and…Here’s a hypothetical example of an insider threat attack in an AWS environment, showcasing how various AWS logging tools are utilized to…6d ago6d ago
Prasannakumar B MundasComprehensive Guide to Monitoring AWS with Logs: Key Strategies for 2024In an increasingly complex cloud environment, effective monitoring in AWS is crucial to secure data, maintain performance, and adhere to…6d ago6d ago
Prasannakumar B MundasProtecting Sensitive Data in the Digital Age: A Case Study in Cybersecurity FreelancingIn today’s digital landscape, information travels fast — too fast for comfort when it involves sensitive business data. Recently, I took…Oct 26Oct 26
Prasannakumar B MundasSecurity Monitoring Freelancing Project: Security Log Monitoring with ELK Stack for GCC Engineering…Last quarter, I have completed a cybersecurity freelancing project for a customer in the GCC region operating in the engineering…Oct 26Oct 26
Prasannakumar B MundasDark Web Data Leak: A Real-World Investigation and Remediation ApproachIntroductionOct 25Oct 25
Prasannakumar B MundasDetecting Ransomware using Kibana queriesHere are some common ransomware activities and example Kibana queries to detect them in Windows logs:Apr 14, 2023Apr 14, 2023
Prasannakumar B MundasThreat Hunting Playbook for Command and ControlObjective:Apr 14, 2023Apr 14, 2023