877.791.9571 |

About the Author:

Rishi Narang is currently working as Security Consultant and pursuing MS in Cyber Security and Law. He has 7 years of experience which includes research on vulnerabilities, malware, protocol analysis, evolving attack vectors and signature development for network & host based IDS/IPS products. In the past, he has worked at Qualys, Deloitte & Touche and Trend Micro. He holds a B.Tech degree in Information Technology, CEH and CCNA certifications and has been a part of Red Hat & Ethical Hacking trainings. Among his key public disclosures, he has been responsible for LinkedIn vulnerability and first Google Chrome exploit. In the past, he has been a speaker at OWASP (Mumbai Chapter), Bangalore Cyber Security Summit and eSurakshit conferences. He has been an author for PenTest Magazine and prefers writing at his personal blog www.wtfuzz.com. You can also follow him on Twitter @rnarang.
trafficjam

Traffic Anomaly Detection – TCP and DNS

Ever since the computer and the critical data it holds came into headlines, so did the malicious programs, attacks and the threat landscape. We have thousands of cases of […]