DELTA SPIKE PTE LTD
1 Wallich Street, Guoco Tower, Level 14-01,
Singapore 078881 | Call +65 63 799 324
hello@deltaspike.io

shiranfli

What is Cyber Security?

The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.

read more

AlienVault OSSIM

The researcher’s at Cybereason Inc. has come across a new form of malware that steals user’s data of financial applications. The name of the malware is “Eventbot”.

read more

Cyber Kill Chain Methodology

To be secure in the cyber space any organization needs to have a proper security strategy which helps exposing sensitive data or prevent damaging the brand image. There are several models followed by security professionals in order to actively find if any malicious...

read more

CLICKJACKING

Be alert when you are using websites that contain many ads. Creating ads are the current trending way into tricking users to visit malicious pages.

read more

IT EXPERTS WARN OF PHONE HACKING

This includes top level politicians, senior officers of armed services, high profile government officials and all the other parties who deal with highly confidential information, they warned.“Sri Lanka,”

read more

ARE YOUR CREDIT AND DEBIT CARD DETAILS SECURE?

Using a credit or debit card is a trendy way to pay bills while reducing the risk of keeping your money in your pocket. But it is not as safe as you might assume when there are hackers who can take valuable information by just one swipe of the card.

read more

THINK BEFORE YOU CLICK

Cybercrime has risen over the years and continues to rise globally. It has become an enormous challenge in all areas including national security, public safety and personal privacy. From simple Facebook hacking to more largescale fraudulent activities cybercrimes have taken hit at everyone, at least once.

read more

WHAT IS A SECURITY OPERATIONS CENTER (SOC)

Information security changes constantly and at a rate beyond comprehension. Hackers too are increasingly becoming relentless, making responding to information security incidents an ever more complex challenge.

read more

TYPES OF CYBER ATTACKS

A Cyber-Attack is any kind of action that targets a Computer Information System and damages or steals the victims data. The data acquired is modified, damaged, sold or even held at ransom from the victim. The hacker does this through various types of Cyber-Attacks.

read more

SKIMMING IS THE NEW HACK

Sri Lanka isn’t slow to the hacking game. Alongside the rest of the world, Sri Lankan ATMS and its customers are victims to what the Cyber Security world likes to call, ATM Skimming. Heard about it?

read more

PORT SCANNING

Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.

read more

VULNERABILITY ASSESSMENT

Organizations use different channels to reach their customers. The company website being the primary means of reaching your existing customers and potential customers these days. From startups to multinationals, every organization has their own website.

read more

WHAT IS SQL INJECTION

SQL Injection (SQLi) is one of the most dangerous web-based vulnerabilities.

OWASP, a non-profit organization, dedicated to improving security of web applications, conducts a research and lists down the top 10 vulnerabilities each year.

read more

Benefits of Honeypots

In my previous blog I discussed Port Scanning. In this blog I would like to discuss another method used to protect servers from attackers using Network Honeypots. A Honeypot is a sweet looking server, at least it’s intended to look sweet to the attacker, similar to how bears view honey. Honeypot is an additional security protection that can be used alongside a firewall this will help to protect your network from hackers.

read more

Incident Management Process for an effective SOC

Organizations need to have a proper, focused, and a coordinated approach to responding to incidents. This includes a system for Occasion Response that outlines the correct way for implementing the Incident Response capability.

read more

They’re only human after all…

IBM states that 60% of all cyber attacks are a direct result of insider attacks – caused by employees within an organization with malicious intent. While you might be right in assuming that this will not be the case in your company, with only a few people having access to your systems, your employees can still be responsible for potential cyber attacks, unwillingly and unknowingly.

read more

DO’s and DON’Ts of Social Media Screening

After the initial screening is done and a few potential candidates are shortlisted, the next thing to tick off is the background checks. Companies usually refer to ex-employers and referees for validation. Most often than not we tend to look them up on LinkedIn to verify their corporate information

read more

What Is A Botnet?

Malicious actors build botnets by infecting connected devices with malware and then managing them using a command and control server. Botnet architecture has evolved over time. the bot herder (the person controlling the botnet) to perform all control from a remote location, which obfuscates their traffic.

read more

Social Engineering : Why You are at Risk

Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.

read more

Zero Trust Architecture 101

Networks were typically built up to guard information from external access, which is why firewalls and similar safeguards protect one’s network from unverified software and communications attempting the network.

read more

CSRF Protection 101

Cross Site Request Forgery (CSRF) is an attack where the hacker manipulates the user to carry out the attack by using the legitimate URL and the hosted website.

read more