Top 5 Threat Intelligence ToolsIf you’re working in cybersecurity, there are some fantastic platforms out there that can make your job a lot easier and more effective…Dec 20, 2024Dec 20, 2024
Mitigating Data Poisoning and Prompt Injection in AI WorkloadsUnderstanding Data Poisoning and Prompt Injection AttacksDec 9, 2024Dec 9, 2024
GPS Spoofing — Ability to Hack TimeGPS spoofing is a sophisticated form of cyberattack or interference in which a malicious actor sends deliberately deceptive GPS signals to…Aug 11, 2024Aug 11, 2024
Published inFAUN — Developer Community 🐾Transform AWS CloudTrail Events to readable alertsNote: The below blog has been created in collaboration with friend Manish GuptaMay 20, 2024May 20, 2024
Deploy to Remote EKS/K8s ClusterAssuming you have a EKS cluster up and running and a Jenkins setup. We will start by installing the required pluginsJan 11, 2024Jan 11, 2024
Planning for LakshadweepOctober to February is the best time to travel. During this time the humidity isn’t too high and the weather is quite pleasant.Jan 8, 2024Jan 8, 2024
Published inFAUN — Developer Community 🐾Report Cyber incidents to CERT-In within 6 Hours (MeitY)The Indian Computer Emergency Response Team (CERT-In) is the national agency for performing various functions in the area of cyber security…Jan 4, 2024Jan 4, 2024
Learn Docker using ChatGPTIf you have not heard of ChatGPT, check this link to give a try.Feb 15, 2023Feb 15, 2023
Published inFAUN — Developer Community 🐾Create Terraform AWS modules using ChatGPT — Bonus a Lambda FunctionIf you have not heard of ChatGPT, check this link to give a try.Feb 14, 2023Feb 14, 2023