Chiragh Dewan

A creative problem-solving full-stack web developer with expertise in Information Security Audit, Web Application Audit, Vulnerability Assessment, Penetration Testing/ Ethical Hacking as well as previous experience in Artificial Intelligence, Machine Learning, and Natural Language Processing. He has also been recognised by various companies such as Facebook, Google, Microsoft, PayPal, Netflix, Blackberry, etc for reporting various security vulnerabilities. He has also given various talks on Artificial Intelligence and Cyber Security including at an TEDx event.
Chiragh Dewan

Average HCISSP salary [Updated 2021]

The HealthCare Information Security and Privacy Practitioner (HCISPP) is a certification offered by (ISC)2. It tests the knowledge in the areas of both pr

Notable computer forensics cases [updated 2019]

Cases involving computer forensics that made the news Michelle Theer (2000): On December 17th, 2000, John Diamond shot and killed Air Force Captain Mart

Mimikatz: Walkthrough [updated 2019]

Security researchers have been obsessed with Windows security since the beginning of time. Various tools have been released over the years which try to weake

Top 10 Open-Source Security Tools Released by Tech Giants

We have always wondered how tech giants have been able to keep their security so tight? Do they use the same tools that are available for the rest of us? Alt

Overview of Computer Forensics Linux Distributions

What is a Live CD? A live CD/DVD/Disk contains a complete bootable Operating System that runs in a computer’s memory, rather than loading from the hard disk.

The Top 10 Ways to Protect Your Intellectual Property from Unscrupulous Remote Employees

Over the last few years, the concept of Remote Work has attracted a lot of talented and motivated individuals. The idea of a 9-5 job vs. being location indep

Depth 1 - CTF Walkthrough

Depth 1 is a relatively new machine that surfaced on VulnHub on October 27th, 2017. It is created by Dan Lawson. It can be downloaded from https://www.vulnhu

Proteus: 1 - CTF Walkthrough

Proteus is a relatively new machine that came on VulnHub. Created by Ivanvza, it surfaced on June 7th, 2017. It can be downloaded from https://www.vulnhub.co

10 Digital Forensics Tools - The Lesser Known

For years Digital Forensics has played a significant role in the security domain. Being an integral part of the process, various tools have been developed ov

Pluck: 1 CTF Walkthrough

Pluck: 1 is a vulnerable machine created by Ryan Oberto. It surfaced on VulnHub on 11th March 2017. It can be downloaded from https://www.vulnhub.com/entry/p

Impact of Cyber Security on Start-ups

Image taken from The Fintech Times [pkadzone zone="main_top"] What is a start-up? A start-up is a young company that is still in its phase of developing. St

Metasploitable: 2 - walkthrough

Metasploitable: 2 surfaced on VulnHub on June 12th, 2012. Created by Metasploit, it can be found at https://www.vulnhub.com/entry/metasploitable-2,29/. It is