Open in app

Sign In

Write

Sign In

Asjad Athick
Asjad Athick

30 Followers

Home

About

Pinned

Stuxnet — Reverse Engineering the most sophisticated Malware of its time

Background Let’s time travel back to January 2010. This was before the era of the whole Internet of Things (or Internet of Threats) debacle. This was when DDoS attacks peaked at around a measly 49 Gbps [1]. Before the whole WannaCry ransomware outbreak. Things were simple in 2010. …

Cybersecurity

6 min read

Stuxnet — Reverse Engineering the most sophisticated Malware of its time
Stuxnet — Reverse Engineering the most sophisticated Malware of its time
Cybersecurity

6 min read


Jan 11

iTWire — Constant Evolution is the Key to Protecting your Data from Threat Actors

GUEST OPINION by Asjad Athick, Principal Security Specialist at Elastic Whenever a major cybersecurity incident occurs, there are two things everyone asks. Could it have been prevented, and what did the victim of the attack do to minimise the damage? The left side of that equation, prevention, is critical and is…

Cybersecurity

5 min read

iTWire — Constant Evolution is the Key to Protecting your Data from Threat Actors
iTWire — Constant Evolution is the Key to Protecting your Data from Threat Actors
Cybersecurity

5 min read


Feb 3, 2021

Preventing “copy-paste compromises” (ACSC 2020–008) with Elastic Security

The Australian Cyber Security Centre (ACSC) recently published an advisory outlining tactics, techniques, and procedures (TTPs) used against multiple Australian businesses in a recent campaign by a state-based actor. The campaign — dubbed ‘copy-paste compromises’ because of its heavy use of open source proof of concept exploits — was first…

Elastic

6 min read

Preventing “copy-paste compromises” (ACSC 2020–008) with Elastic Security
Preventing “copy-paste compromises” (ACSC 2020–008) with Elastic Security
Elastic

6 min read


Jun 22, 2020

Monitoring your Amazon EKS Cluster with the Elastic Stack

To achieve unified observability, we need to gather all of the logs, metrics, and application traces from an environment. Storing them in a single datastore drastically increases our visibility, allowing us to monitor other distributed environments as well. In this blog, we will walk through one way to set up…

AWS

5 min read

Monitoring your Amazon EKS Cluster with the Elastic Stack
Monitoring your Amazon EKS Cluster with the Elastic Stack
AWS

5 min read


Mar 2, 2018

Highlights from the 2018 Gartner Data Analytics Summit — Sydney

Data is at the core of modern technology. A successful data program means access to intelligence driven cyber security, data governance based risk management, business relevant insights, resilient operations, just in time supply chain management… the list goes on. Here are the main ideas I went back to work with…

Big Data

5 min read

Highlights from the 2018 Gartner Data Analytics Summit — Sydney
Highlights from the 2018 Gartner Data Analytics Summit — Sydney
Big Data

5 min read


Sep 28, 2017

Key takeaways from the 2017 Gartner Security Summit — Sydney

I do apologise for all the buzzwords you’re going to read in this article. But then again, what’s the point of working in this industry if you can’t use buzzwords! Gartner held their premier Security and Risk Management Summit in late August and without doubt saw great attendance from all…

Internet Of Things

5 min read

Key takeaways from the 2017 Gartner Security Summit — Sydney
Key takeaways from the 2017 Gartner Security Summit — Sydney
Internet Of Things

5 min read

Asjad Athick

Asjad Athick

30 Followers

Consulting Engineer @Elastic. Enjoy playing with security and data related things on cloud stuff. https://asjad.io

Following
  • Sarah Cooper

    Sarah Cooper

  • Lak Lakshmanan

    Lak Lakshmanan

  • Netflix Technology Blog

    Netflix Technology Blog

  • Parsa Saljoughian

    Parsa Saljoughian

  • Inez

    Inez

See all (47)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams