SHUBHENDU SHUBHAM

SHUBHENDU SHUBHAM @sivolko

About: Cyber Security Professional whileTime.now (hack);

Location:
Bangalore
Joined:
Dec 9, 2019

SHUBHENDU SHUBHAM
articles - 19 total

Resolving Docker Socket and Daemon Conflicts: Unifying CLI and Docker Desktop on kali Linux

If you're using Docker Desktop on Linux and facing issues like conflicting results between docker ps...

Learn More 0 0Mar 23

Missing Dark Mode in Wazuh ?

Working on Wazuh in a bright interface can sometimes strain your eyes, especially during those long...

Learn More 0 0Mar 23

Clear command not found inside docker container ?

if you're inside docker container using cli trying to modify files and wanna clear yout terminal ,...

Learn More 1 0Mar 20

Upgrading wazuh 4.11.0 using docker in single node

In Feb Wazuh released V4.11.0 let's understand what are the major updates and how to upgrade it using...

Learn More 1 0Mar 19

Fix It Before They Break It: The True Role of Vulnerability Management

Before we start let's understand a few keywords Vulnerability: Vulnerability is always defined by...

Learn More 0 0Mar 11

How to troubleshoot a Disconnected Wazuh Agent in a Docker Single-Node Environment?

In this blog post, we'll walk through the steps to troubleshoot and resolve a disconnected Wazuh...

Learn More 0 0Mar 6

Mitigating vs Eliminating Threats

In security industry I have often seen people getting confused or thinking both as same Mitigating...

Learn More 0 0Mar 1

Understanding OWASP Top 10 for LLMs: A Layman’s Guide

In the world of AI, Large Language Models (LLMs) like GPT-4 and (o) are becoming increasingly...

Learn More 0 0Feb 21

Why SysLogs over UDP is silly? Security POV

Before we start let's understand Logs in terms of Threat Modeling STRIDE framework. Here addressing...

Learn More 1 0Feb 17

"KQL Showdown: distinct vs project"

I'm writing this short blog while solving challenge at KC7 platform, this question hit me when to use...

Learn More 0 0Feb 16

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Before we start , just quick reminder it’s Threat Modeling not Modelling. Now let recall basic...

Learn More 0 0Feb 13

Why Current Methods Fail to Measure Real Vulnerability Risks?

In today's dynamic digital landscape, safeguarding data and infrastructure requires not just...

Learn More 0 0Feb 6

How to integrate Docker Scout with Azure Container Registry

Before starting, let’s understand what exactly is Docker Scout? Docker Scout is a container image...

Learn More 0 0Feb 5

Effortless Wazuh v4.10.0 upgrade using Docker

Upgrading your wazuh docker deployment to the latest version ensures you benift from the latest...

Learn More 0 0Feb 5

5 G : Era of Smart World

Large-scale convergence(LSC),is not about the convergence of different technologies. It is about deve...

Learn More 4 0May 12 '20

How to set Proxy for Docker Containers in Linux Machines?

In the era of automation everyone is deploying on Docker(52%) & Kubernetes (30%) globally. sound...

Learn More 3 0Apr 24 '20

How to install Docker in Parrot os ?

Following steps:- INSTALL DOCKER ENGINE add user to docker group for using docker command without...

Learn More 7 0Mar 26 '20

HOW TO USE GIT FOR WORDPRESS DEVELOPMENT???

Let's first understand GIT:- GIT : A BRIEF INTRODUCTION Git is a version control system.This versi...

Learn More 4 0Jan 5 '20

Top 10 Hottest Kubernetes tools and Technologies of 2019

Rancher K3 Red Hat codeReady WorkSpaces Styra DAS TrilioVault for kubernetes Pivotal Build Service K...

Learn More 6 0Jan 4 '20