<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"><channel><title>DrSuresh.NET</title><link>/</link><description></description><lastBuildDate>Thu, 12 Mar 2026 00:00:00 +0800</lastBuildDate><item><title>Investigating data leaks</title><link>/articles/dbreach.html</link><description>&lt;p&gt;This article provides a systematic method on investigating and confirming data leaks&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 12 Mar 2026 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2026-03-12:/articles/dbreach.html</guid><category>thoughts</category><category>dataleak</category><category>cybersecurity</category></item><item><title>Work vs Private life - Part 1 - Social Media</title><link>/articles/socmed25.html</link><description>&lt;p&gt;We are at the crossroads of defining boundaries between personal vs careeer. This article looks specifically at social media.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 02 Oct 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-10-02:/articles/socmed25.html</guid><category>Thoughts</category><category>socialmedia</category><category>content</category><category>cybersecurity</category></item><item><title>SAAS Security - Myth vs Reality</title><link>/articles/saas25.html</link><description>&lt;p&gt;With recent SAAS apps being breached, is security a given for SAAS?&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 04 Sep 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-09-04:/articles/saas25.html</guid><category>Thoughts</category><category>saas</category><category>salesforce</category><category>cybersecurity</category></item><item><title>Malaysia's Dual Data Governance - Critical Analysis</title><link>/articles/pdpriv.html</link><description>&lt;p&gt;This article looks into legal landscape of Malaysian data privacy&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 10 Jun 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-06-10:/articles/pdpriv.html</guid><category>Thoughts</category><category>privacy</category><category>datasharing</category><category>cybersecurity</category></item><item><title>Governing AI - ISO 42001 approach</title><link>/articles/iso42001.html</link><description>&lt;p&gt;This article looks into the approach of ISO42001 in governing AI&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 03 Jun 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-06-03:/articles/iso42001.html</guid><category>Thoughts</category><category>iso42001</category><category>ai</category><category>genai</category></item><item><title>Case Study - Maybank Phishing Incident</title><link>/articles/mayphish.html</link><description>&lt;p&gt;This case study examines the recent happening of a phishing incident at Maybank&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 12 May 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-05-12:/articles/mayphish.html</guid><category>CaseStudy</category><category>maybank</category><category>phishing</category><category>cybersecurity</category></item><item><title>Evolving Tactics - OAuth Token Abuse</title><link>/articles/oabuse.html</link><description>&lt;p&gt;This article looks into recent strategies of attackers abusing OAuth tokens&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 29 Apr 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-04-29:/articles/oabuse.html</guid><category>thoughts</category><category>oauth</category><category>cybersecurity</category></item><item><title>Communications, Data and Deep State (applies to Corp)</title><link>/articles/cdds25.html</link><description>&lt;p&gt;This article looks into the competition of establishing alternate secure lines of communications and technology platform&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Fri, 21 Feb 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-02-21:/articles/cdds25.html</guid><category>Thoughts</category><category>shadowtech</category><category>cybersecurity</category></item><item><title>Digitalisation - A lost and confused cause</title><link>/articles/digi25.html</link><description>&lt;p&gt;Digitalization is a mandatory CIO/CTO/CDO buzzword. But to what extend is it true?&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 20 Jan 2025 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2025-01-20:/articles/digi25.html</guid><category>thoughts</category><category>technology</category><category>malaysia</category></item><item><title>Secure BYoE</title><link>/articles/holsec.html</link><description>&lt;p&gt;This article looks into vacationing securely while doing BYOE&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Sat, 21 Dec 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-12-21:/articles/holsec.html</guid><category>thoughts</category><category>entertainment</category><category>byoe</category><category>cybersecurity</category></item><item><title>Is CyberSecurity supposed to be expensive?</title><link>/articles/cybercost.html</link><description>&lt;p&gt;This article examines the most common complaint about cybersecurity, being expensive&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 10 Dec 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-12-10:/articles/cybercost.html</guid><category>Thoughts</category><category>cost</category><category>cybersecurity</category></item><item><title>Handling passwords in 2024 and beyond</title><link>/articles/passwd24.html</link><description>&lt;p&gt;There is a new way on handling passwords, 2024 and beyond!&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 25 Sep 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-09-25:/articles/passwd24.html</guid><category>Controls</category><category>passwords</category><category>cybersecurity</category></item><item><title>Addendum 1 - Lebanon Attack Case Study</title><link>/articles/hezattack1.html</link><description>&lt;p&gt;Continuation from Case Study, expanding into what happened&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 19 Sep 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-09-19:/articles/hezattack1.html</guid><category>CyberWarfare</category><category>lebanon</category><category>techattack</category><category>cybersecurity</category></item><item><title>Case Study - Lebanon Pager Explosive attack</title><link>/articles/hezpager.html</link><description>&lt;p&gt;This article examines the recent pager explosion that happened in Lebanon&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 18 Sep 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-09-18:/articles/hezpager.html</guid><category>CyberWarfare</category><category>pager</category><category>lebanon</category><category>techattack</category><category>cybersecurity</category></item><item><title>Malaysia's Internet - the thorny issue of DNS blocking</title><link>/articles/dnsblock.html</link><description>&lt;p&gt;This article looks into the thorny aspect of dns blocking implemented in Malaysia&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 10 Sep 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-09-10:/articles/dnsblock.html</guid><category>thoughts</category><category>dnsblock</category><category>cybersecurity</category></item><item><title>Managing Professional Relationships - Bank Balance Approach</title><link>/articles/mprel.html</link><description>&lt;p&gt;This article looks into using the bank balance approach in managing professional relationships&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 27 Aug 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-08-27:/articles/mprel.html</guid><category>Relationships</category><category>relationships</category><category>psychology</category></item><item><title>Understanding human relationships - Part 1</title><link>/articles/rela1-24.html</link><description>&lt;p&gt;This article looks into demystifying human relationships in simplistic manner&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 07 Aug 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-08-07:/articles/rela1-24.html</guid><category>Relationships</category><category>relationship</category><category>psychology</category><category>cybersecurity</category></item><item><title>Adopting Zero Trust in an Enterprise Environment</title><link>/articles/zt2004.html</link><description>&lt;p&gt;This article looks into adopting zero trust into enterprise environment&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 18 Jun 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-06-18:/articles/zt2004.html</guid><category>Infrastructure</category><category>zero trust</category><category>cybersecurity</category></item><item><title>Advanced Persistent Threat - Detection and Response Strategies</title><link>/articles/aptrr24.html</link><description>&lt;p&gt;This article looks into detection and resposne strategies against APT attacks&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 01 May 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-05-01:/articles/aptrr24.html</guid><category>APT</category><category>apt</category><category>cybersecurity</category></item><item><title>Cybersecurity as a Business Enabler: Beyond Risk Management</title><link>/articles/bussec24.html</link><description>&lt;p&gt;This article looks into the bigger picture of CyberSecurity for Business&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 16 Apr 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-04-16:/articles/bussec24.html</guid><category>Thoughts</category><category>riskmgmt</category><category>cybersecurity</category></item><item><title>Blockchain Security: Myths, Realities, and Future Applications</title><link>/articles/bcsec24.html</link><description>&lt;p&gt;This article looks into blockchain security&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 19 Mar 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-03-19:/articles/bcsec24.html</guid><category>Thoughts</category><category>blockchain</category><category>cybersecurity</category></item><item><title>Understanding the Global Cybersecurity Regulations and Compliance Landscape</title><link>/articles/csreg24.html</link><description>&lt;p&gt;This article look into global impact of regulatory against cybersecurity&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 06 Mar 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-03-06:/articles/csreg24.html</guid><category>Thoughts</category><category>regulatory</category><category>cybersecurity</category></item><item><title>Navigating Recent Challenges with Ivanti Pulse Secure: A Deep Dive for Cybersecurity Professionals</title><link>/articles/ivanti-24.html</link><description>&lt;p&gt;This article looks into the recent debacle with Ivanti.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 29 Feb 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-02-29:/articles/ivanti-24.html</guid><category>Thoughts</category><category>ivanti</category><category>cybersecurity</category></item><item><title>Exploit Development and Vulnerability Research: Ethics and Techniques</title><link>/articles/exp24.html</link><description>&lt;p&gt;This article looks into exploit development and vulnerability research&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 20 Feb 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-02-20:/articles/exp24.html</guid><category>Thoughts</category><category>exploits</category><category>cybersecurity</category></item><item><title>Integrating cybersecurity with business continuity</title><link>/articles/bcp-sec.html</link><description>&lt;p&gt;This article looks into integrating BCP with Cybersecurity&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 13 Feb 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-02-13:/articles/bcp-sec.html</guid><category>Thoughts</category><category>bcp</category><category>cybersecurity</category></item><item><title>Cybersecurity Metrics and KPIs for Effective Management</title><link>/articles/seckpi.html</link><description>&lt;p&gt;This article looks into cyber security metrics and KPI&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 06 Feb 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-02-06:/articles/seckpi.html</guid><category>MiddleManagement</category><category>metrics</category><category>kpi</category><category>cybersecurity</category></item><item><title>The Day the Network Cracked: A Red Teamer's Tale of Tactics and Triumph</title><link>/articles/rt-ops.html</link><description>&lt;p&gt;This article looks into red teaming cyber operations&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 30 Jan 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-01-30:/articles/rt-ops.html</guid><category>RedTeam</category><category>redteam</category><category>cybersecurity</category></item><item><title>The Mergers and Acquisitions Tightrope Walk: Why Cybersecurity is Your Invisible Safety Net</title><link>/articles/cs-mna.html</link><description>&lt;p&gt;This article looks into the cybersecurity aspects of M&amp;amp;A&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 23 Jan 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-01-23:/articles/cs-mna.html</guid><category>MergersAcquisitions</category><category>mna</category><category>cybersecurity</category></item><item><title>The Hidden Costs of Convenience - A Privacy Audit of Truecaller and Whoscall</title><link>/articles/3ptcaller.html</link><description>&lt;p&gt;This article looks into the use of third party apps to identify caller such as Whoscall or TrueCaller&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 18 Jan 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-01-18:/articles/3ptcaller.html</guid><category>privacy</category><category>privacy</category><category>calleridentifier</category><category>cybersecurity</category></item><item><title>The Financial Impacts of Cybersecurity Breaches: A Comprehensive Overview</title><link>/articles/breach-finance.html</link><description>&lt;p&gt;This article looks into the debate between to do or not to do for cyber investments&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 16 Jan 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-01-16:/articles/breach-finance.html</guid><category>Thoughts</category><category>finance</category><category>breach</category><category>cybersecurity</category></item><item><title>Cyber TechTalk - Latest trends in Cryptography and Encryption Technologies 2024</title><link>/articles/ctt-crypto24.html</link><description>&lt;p&gt;This article  looks into the current trends in cryptography&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 09 Jan 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-01-09:/articles/ctt-crypto24.html</guid><category>Cryptography</category><category>cryptography</category><category>cybersecurity</category></item><item><title>Middle Management Musing - Emerging Cyber Threats 2024</title><link>/articles/mm-emerging-2k24.html</link><description>&lt;p&gt;This article looks into middle management emerging cyber threat management for 2024&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 01 Jan 2024 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2024-01-01:/articles/mm-emerging-2k24.html</guid><category>Top5</category><category>threats</category><category>emerging</category><category>cybersecurity</category></item><item><title>Cyber Breach Incident Response: Data Breach Edition - An ISO-Based Approach</title><link>/articles/breach-ih.html</link><description>&lt;p&gt;This article looks into incident handling when dealing with data breaches&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 19 Dec 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-12-19:/articles/breach-ih.html</guid><category>Breach</category><category>breach</category><category>iso</category><category>cybersecurity</category></item><item><title>Leadership in Crisis: Managing Cybersecurity Breaches at the Executive Level</title><link>/articles/breachleader.html</link><description>&lt;p&gt;This article looks into maintaing and being a leader while handling a cyber crisis&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 12 Dec 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-12-12:/articles/breachleader.html</guid><category>Thought</category><category>leadership</category><category>crisis</category><category>breaches cybersecurity</category></item><item><title>Case Study - OCBC Singapore Phishing Incident</title><link>/articles/ocbc1.html</link><description>&lt;p&gt;This article presents the case study on OCBC phishing incident&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 28 Nov 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-11-28:/articles/ocbc1.html</guid><category>Breaches</category><category>ocbc</category><category>cybersecurity</category></item><item><title>Unveiling the Shadows: A Deep Dive into SIEM Rule Evasion in Cybersecurity</title><link>/articles/siem1.html</link><description>&lt;p&gt;This article looks into threat actor methods in evading SIEM&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 21 Nov 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-11-21:/articles/siem1.html</guid><category>concepts</category><category>siem</category><category>evasion</category><category>cybersecurity</category></item><item><title>Dark Web and Cybercrime: A Closer Look at the Underbelly of the Internet</title><link>/articles/darkweb1.html</link><description>&lt;p&gt;This article stares into the dark web abyss&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 14 Nov 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-11-14:/articles/darkweb1.html</guid><category>darkweb</category><category>darkweb</category><category>cybersecurity</category></item><item><title>The Luno Malaysia Case: A Wake-Up Call for Crypto Security</title><link>/articles/luno1.html</link><description>&lt;p&gt;This article looks into Luno's Session court ruling&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 09 Nov 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-11-09:/articles/luno1.html</guid><category>Lawsuit</category><category>luno</category><category>cybersecurity</category></item><item><title>Okta and the bus</title><link>/articles/okta2.html</link><description>&lt;p&gt;This article is about Okta's incident investigation of recent breach&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 07 Nov 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-11-07:/articles/okta2.html</guid><category>Breaches</category><category>okta</category><category>cybersecurity</category></item><item><title>SEC lays down the law on Solarwinds CISO</title><link>/articles/secsl.html</link><description>&lt;p&gt;This article looks at the SEC taking action against Solarwinds CISO&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 31 Oct 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-10-31:/articles/secsl.html</guid><category>Breaches</category><category>solarwinds</category><category>sec</category><category>cybersecurity</category></item><item><title>Okta breached - again!</title><link>/articles/okta1.html</link><description>&lt;p&gt;This article looks into Okta breach that happened October 2023&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 24 Oct 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-10-24:/articles/okta1.html</guid><category>Breaches</category><category>okta</category><category>cybersecurity</category></item><item><title>Cisco IOS XE CVS 10 vulnerability</title><link>/articles/iosxe1.html</link><description>&lt;p&gt;This article looks into actively exploited Cisco XE vulnerability&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 19 Oct 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-10-19:/articles/iosxe1.html</guid><category>Breach</category><category>cisco</category><category>iosxe</category><category>cvs10</category><category>cybersecurity</category></item><item><title>HTTP2 Rapid Reset - bug that almost broke Internet</title><link>/articles/http2rr.html</link><description>&lt;p&gt;This article looks into the most recent bug on HTTP2 Rapid Reset&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 17 Oct 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-10-17:/articles/http2rr.html</guid><category>Threats</category><category>http2</category><category>rapidreset</category><category>cybersecurity</category></item><item><title>Multiple SEA govt targetted in APT attack - Q3 2023</title><link>/articles/sea-apt-1.html</link><description>&lt;p&gt;This article looks into the targetted campaign against SEA govt in Q3 2023&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 03 Oct 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-10-03:/articles/sea-apt-1.html</guid><category>Breaches</category><category>apt</category><category>sea</category><category>cybersecurity</category></item><item><title>New Apple Zero day and MITM affecting Apple devices/users</title><link>/articles/a0d1.html</link><description>&lt;p&gt;This articles looks into the most recent zero day affecting Apple devices, identified by CitizenLabs&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 26 Sep 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-09-26:/articles/a0d1.html</guid><category>Breaches</category><category>apple</category><category>zeroday cybersecurity</category></item><item><title>Cryptography and Quantum Computing</title><link>/articles/qcrypto1.html</link><description>&lt;p&gt;This article talks about Quantum Computing and Cryptography&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 12 Sep 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-09-12:/articles/qcrypto1.html</guid><category>Cryptography</category><category>quantumcrypto</category><category>cybersecurity</category></item><item><title>Case Study - Malaysia Airline's Concentration Risk</title><link>/articles/masbfs.html</link><description>&lt;p&gt;This case study examines the recent issue with MAS and BFS&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 07 Sep 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-09-07:/articles/masbfs.html</guid><category>RiskManagement</category><category>risk</category><category>cybersecurity</category></item><item><title>BYOVD - Bring Your Own Vulnerable Driver</title><link>/articles/byovd.html</link><description>&lt;p&gt;This articles  blablabla&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 05 Sep 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-09-05:/articles/byovd.html</guid><category>threats</category><category>byovd</category><category>cybersecurity</category></item><item><title>Kerberos and Forging Tickets (2023)</title><link>/articles/kerberos2023.html</link><description>&lt;p&gt;This articles Kerberos implementation in Microsoft Active Directory and forging tickets&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 29 Aug 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-08-29:/articles/kerberos2023.html</guid><category>Concepts</category><category>kerberos</category><category>cybersecurity</category></item><item><title>Still changing passwords regularly?</title><link>/articles/passwd.html</link><description>&lt;p&gt;This article looks at the relevance of frequent password changes&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 22 Aug 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-08-22:/articles/passwd.html</guid><category>controls</category><category>passwords</category><category>cybersecurity</category></item><item><title>Downfall of Intel Chips</title><link>/articles/downfall.html</link><description>&lt;p&gt;A new vulnerabolity affecting CPUs are discussed in this article&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 15 Aug 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-08-15:/articles/downfall.html</guid><category>Hardware</category><category>hardware</category><category>cybersecurity</category></item><item><title>Storm in a teacup - 0508</title><link>/articles/storm0558.html</link><description>&lt;p&gt;This articles looks into the recent revelation on Microsoft's Storm0508 attack&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 10 Aug 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-08-10:/articles/storm0558.html</guid><category>Breach</category><category>storm0558</category><category>apt</category><category>china</category><category>microsoft cybersecurity</category></item><item><title>True C vs False C - Case study on the role CISO - Part 4</title><link>/articles/tc4.html</link><description>&lt;p&gt;This multi part article looks into the argument whether CISO is a True C or a False C role&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 08 Aug 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-08-08:/articles/tc4.html</guid><category>Thoughts</category><category>ciso</category><category>cybersecurity</category></item><item><title>True C vs False C - Case study on the role CISO - Part 3</title><link>/articles/tc3.html</link><description>&lt;p&gt;This multi part article looks into the argument whether CISO is a True C or a False C role&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 01 Aug 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-08-01:/articles/tc3.html</guid><category>Thoughts</category><category>ciso</category><category>cybersecurity</category></item><item><title>True C vs False C - Case study on the role CISO - Part 2</title><link>/articles/tc2.html</link><description>&lt;p&gt;This multi part article looks into the argument whether CISO is a True C or a False C role&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 25 Jul 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-07-25:/articles/tc2.html</guid><category>Thoughts</category><category>ciso</category><category>cybersecurity</category></item><item><title>True C vs False C - Case study on the role CISO - Part 1</title><link>/articles/tc1.html</link><description>&lt;p&gt;This multi part article looks into the argument whether CISO is a True C or a False C role&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 17 Jul 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-07-17:/articles/tc1.html</guid><category>Thoughts</category><category>ciso</category><category>cybersecurity</category></item><item><title>CISO on crosshair</title><link>/articles/cisocr.html</link><description>&lt;p&gt;This article looks into increasing liability of CISO in the industry.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 04 Jul 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-07-04:/articles/cisocr.html</guid><category>Thoughts</category><category>ciso</category><category>cybersecurity</category></item><item><title>Digital Asset Series: Cyber Risk Management for Trustees</title><link>/articles/datcr.html</link><description>&lt;p&gt;This articles looks into a framework to establish cyber risk management for digital asset trustees&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 28 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-28:/articles/datcr.html</guid><category>DigitalAssets</category><category>riskmgmt</category><category>cybersecurity</category></item><item><title>Zero Days, Breaches and Reprise</title><link>/articles/zbi.html</link><description>&lt;p&gt;This thought piece is reflected on current affairs&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 27 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-27:/articles/zbi.html</guid><category>Thoughts</category><category>zerodays</category><category>breach cybersecurity</category></item><item><title>Digital Assets: Custodian vs Trustee[]()</title><link>/articles/daintro.html</link><description>&lt;p&gt;This articles into digital asset custodians and the importants of its cyber risk management&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 22 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-22:/articles/daintro.html</guid><category>DigitaAsset</category><category>riskmgmt</category><category>cybersecurity</category></item><item><title>Barracuda ESG vulnerability</title><link>/articles/barracudaesg.html</link><description>&lt;p&gt;This article examines the recently released vulnerability affecting Barracude ESG&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 20 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-20:/articles/barracudaesg.html</guid><category>Breach</category><category>barracuda</category><category>esg</category><category>cybersecurity</category></item><item><title>Case Study - MySejahtera Data Breach</title><link>/articles/mysj.html</link><description>&lt;p&gt;This article is the case study for the MySejahtera data breach&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 13 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-13:/articles/mysj.html</guid><category>Breach</category><category>mysj</category><category>pandemic</category><category>cybersecurity</category></item><item><title>ASEAN publicly vulnerable devices</title><link>/articles/ss1.html</link><description>&lt;p&gt;This articles looks into the recent ShadowServer report on ASEAN publicly vulnerable devices&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 12 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-12:/articles/ss1.html</guid><category>Infrastructure</category><category>shadowserver</category><category>asean</category><category>cybersecurity</category></item><item><title>MOVEit Transfer Zero Day and Cl0p</title><link>/articles/clop1.html</link><description>&lt;p&gt;Continuing from previous week, further analysis of the zero day and ransomware group Cl0p&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 08 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-08:/articles/clop1.html</guid><category>Breach</category><category>ransomware</category><category>cybersecurity</category></item><item><title>Zero Day MOVEit exploited in the wild (CVE-2023-34362)</title><link>/articles/moveit.html</link><description>&lt;p&gt;This articles goes into a recent zero day affecting MOVEit Transfer solution.&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 06 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-06:/articles/moveit.html</guid><category>Breach</category><category>zeroday</category><category>cybersecurity</category></item><item><title>BNM updates its RMIT</title><link>/articles/rmit.html</link><description>&lt;p&gt;This articles looks at recent changes that was made to Malaysia's RMIT&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 01 Jun 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-06-01:/articles/rmit.html</guid><category>Regulatory</category><category>bnm</category><category>malaysia</category><category>rmit cybersecurity</category></item><item><title>Volt Typhoon - Attack against US</title><link>/articles/volt.html</link><description>&lt;p&gt;This articles looks into nation state threat actor Volt Typhoon&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 30 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-30:/articles/volt.html</guid><category>APT</category><category>apt</category><category>china</category><category>cybersecurity</category></item><item><title>MSI/Intel Boot Guard private key leak</title><link>/articles/bootguard.html</link><description>&lt;p&gt;This article looks into the recent MSI/Intel BootGuard key leak&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 25 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-25:/articles/bootguard.html</guid><category>KeyCompromise</category><category>msi</category><category>intel</category><category>keyleak</category><category>cybersecurity</category></item><item><title>Ledger - from security to insecurity</title><link>/articles/ledger.html</link><description>&lt;p&gt;Ledger recently made changes to its well known hardware wallet used to secure cryptocurrency/&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 23 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-23:/articles/ledger.html</guid><category>Hardware</category><category>hardware</category><category>wallet</category><category>cybersecurity</category></item><item><title>Dragos Cyber Breach</title><link>/articles/dragos.html</link><description>&lt;p&gt;Dragos, a cybersecurity specialist has been breached. This is the incident/&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 17 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-17:/articles/dragos.html</guid><category>Breach</category><category>breach</category><category>cybersecurity</category></item><item><title>Solarwinds, the gift that keeps giving</title><link>/articles/solarwinds052023.html</link><description>&lt;p&gt;Solarwinds revisited - May 2023&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 15 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-15:/articles/solarwinds052023.html</guid><category>Breach</category><category>solarwinds</category><category>breach</category><category>cybersecurity</category></item><item><title>Russian FSB cyber operations - Snake malware (DNS/Crypto)</title><link>/articles/fsbsnakeenc.html</link><description>&lt;p&gt;We review recently exposed Russion FSB cyber operations, looking into the aspects of Cryptography and DNS covert channel&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Wed, 10 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-10:/articles/fsbsnakeenc.html</guid><category>NationState</category><category>apt</category><category>ru</category><category>fsb</category><category>cybersecurity</category></item><item><title>Uber CISO narrowly avoids jail</title><link>/articles/uberciso.html</link><description>&lt;p&gt;This article is about Uber CISO convicted&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 08 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-08:/articles/uberciso.html</guid><category>Legal</category><category>ciso</category><category>legal</category><category>cybersecurity</category></item><item><title>Long live Passwords! Google introduces Passkeys</title><link>/articles/long-live-passwords-google-introduces-passkeys.html</link><description>&lt;p&gt;Google introduces passkeys, signalling the end of passwords&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Thu, 04 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-04:/articles/long-live-passwords-google-introduces-passkeys.html</guid><category>Controls</category><category>google</category><category>passkey</category><category>cybersecurity</category></item><item><title>Top 5 Cybersecurity Threats - 2023</title><link>/articles/top-5-2023.html</link><description>&lt;p&gt;This articles reviews the 2023 top 5 cyber security threats&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 02 May 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-05-02:/articles/top-5-2023.html</guid><category>Threats</category><category>top5threats</category><category>cybersecurity</category><category>threats</category></item><item><title>Spectrum of Breach</title><link>/articles/spectrum-of-breach.html</link><description>&lt;p&gt;This articles introduces the concept on Spectrum of Breach&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Tue, 25 Apr 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-04-25:/articles/spectrum-of-breach.html</guid><category>Concept</category><category>spectrumofbreach</category><category>cybersecurity</category></item><item><title>Analysis of GoAnywhere breach</title><link>/articles/analysis-of-goanywhere-breach.html</link><description>&lt;p&gt;This articles looks into the recent breach involving the use of the GoAnywhere software&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 10 Apr 2023 01:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-04-10:/articles/analysis-of-goanywhere-breach.html</guid><category>Breach</category><category>GoAnywhere</category><category>cybersecurity</category><category>breach</category></item><item><title>BlackCat/ALPHV Ransomware</title><link>/articles/blackcat-alphv.html</link><description>&lt;p&gt;This articles talks about the recent advisory on BlackCat/ALPHV ransomware based FBI and reproduced by local CERT&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Mon, 10 Apr 2023 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2023-04-10:/articles/blackcat-alphv.html</guid><category>Threats</category><category>blackcat</category><category>alphv</category><category>ransomware</category><category>cybersecurity</category></item><item><title>The CISO Series - Who CISO's fear most?</title><link>/articles/wcfm.html</link><description>&lt;p&gt;This articles dwelves into the question of who CISO fears most&lt;/p&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dr. Suresh Ramasamy</dc:creator><pubDate>Fri, 15 Oct 2021 00:00:00 +0800</pubDate><guid isPermaLink="false">tag:None,2021-10-15:/articles/wcfm.html</guid><category>Thoughts</category><category>ciso</category><category>cybersecurity</category></item></channel></rss>