- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The Accidental Architects of Our Digital Defenses: A Tale of Curiosity, Pranks, and the Worm that Woke the Internet
Sometimes, our most innocent-looking small deeds can create unforeseen ripple effects that shape the future. Such was the case in the foundational days of cybersecurity. You will meet the unlikely pioneers whose innocent experiments that spiraled into unintended chaos and shaped the core concepts.
Before cybersecurity was a multi-billion dollar industry, it was a wild west where curious minds unleashed the first digital threats.
It is a constant, often invisible battleground against sophisticated threats. Yet, rewind a few decades, the internet was a newborn, trusting realm. Its guardians were few, and its vulnerabilities largely unknown.
When the Internet was in its innocent dawn. A handful of curious minds, some driven by academic pursuit, others by youthful mischief.... accidently laid the foundation for every firewall, antivirus program, and security protocol we now rely on.
Have you ever looked up answers to these interesting questions?
- What is the history of computer viruses?
- Who created the first computer virus?
- Who were the earliest creators of computer viruses and worms?
- Who are the pioneers of cybersecurity (even if accidental)?
- How did early computer viruses spread?
Let me bring some interesting information of few accidental architects. I hope you will enjoy it…
1. The Whispering Ghost of ARPANET – Bob Thomas and the First Stirrings (1971)
Read more: The Accidental Architects of Our Digital Defenses
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Recent major cyber-attack on the cloud
While planning this article on cloud security, a key question struck me: What is the most recent major cyber-attack on the cloud? My search led me to an alarming breach involving Oracle Cloud... A threat actor named rose87168 stolen 6 million records from Oracle Cloud’s SSO and LDAP.
It is a huge database which includes:
- JKS files,
- encrypted SSO passwords,
- key files,
- enterprise manager JPS keys.
Over 140,000 tenants have been affected by the breach. The threat actor name rose87168 is now urging companies to reach out and pay a specific “fee” in exchange for the removal of their stolen data.
He also created a page on X (formerly Twitter) and started following Oracle-related accounts (pages). As per rose87168, he also helped Oracle security team to fix the security issues. In return he wanted 20 million, but they ignored rose87168. Here are some Twitter messages shared by the threat actor.
I dug deeper and came across an interesting document. In connection with this data breach, a victim named 'Michael Toikach' has filed a lawsuit against Oracle Corporation. Here are some key highlights from the case.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Read more: Returning to my roots was more than a visit—it was a promise to give back
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
In the year 2019 the whole world affected by Coronavirus. During that time COVID-19 pandemic accelerated the move to the cloud significantly. Many companies were forced to implement remote work policies to run their business. This could be possible with the help of cloud technology. In the last few years... companies are showing their interest in adopting the cloud for their business.
Most organizations, particularly enterprises, have at least some of their workloads in the cloud. More businesses are embracing the cloud to keep up with the AI revolution. You will be surprised to know that more than 90% of organizations use the cloud. This market is expecting to reach one trillion dollars in the next 2-3 years.
More enterprises are exploring multi-cloud solutions over a single cloud provider.
Relying on a single cloud vendor can put their business in danger. Multicloud offers a range of opportunities to help organizations better serve their customers.
In the previous post I have discussed about Cybersecurity is an huge opportunity for IT professionals.
Here are some common use cases:
Disaster recovery
High priority task for the organization is to bring the business back in working condition after any sort of disaster. To achieve it multi-cloud can be handy. Multicloud allows you to back up critical applications or data on different vendors' clouds. In the event of a disaster or single vendor outage, you can rely on your other providers.
Low latency globally
In the digital era your clients can be worldwide. In case of a global organization, multicloud can help them better serve customers. By giving access to servers in diverse locations. May be near to the clients and providing better connections with low latency.
Regional requirements
When implementing a multi-cloud strategy... organizations must follow regional regulations, data sovereignty laws, and infrastructure requirements. Each region or country has its own rules. Related to data privacy, security, latency, compliance, and availability. Failing to adhere to these regulations... can result in legal penalties, data breaches, and service disruptions.
So organizations choose cloud providers as per their requirements.
There can be other benefits like better security controls, and compelling cost savings.
The IT Shift You Can’t Ignore:
Why 90% of Companies Choose Cloud!
Read more: The IT Shift You Can’t Ignore: Why 90% of Companies Choose Cloud!
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Cybersecurity is an huge opportunity for IT professionals. Let me give you a proof of it. Alphabet (Google) has acquired over 200 companies till date. Please pay attention to it acquisition done in March 2025. With its largest acquisition being the buy of Wiz (a cloud security company [wiz.io]), for $32 billion.
In the list of 3 top expensive companies first and third are in cybersecurity business. Google paid $32,000,000,000 ($32 billion) to WIZ Israel Company (Cloud Security) which is its highest buying cost ever.
I will dig deeper in cloud security later.
- First of all we will see some use case example of cloud.
- Why are more than 90% organizations using cloud?
- Little bit history of cloud computing.
- What is cloud computing?
Okay so let's start with some use case scenarios of cloud:
🛒 Scenario 1. The Local Grocery Store That Expanded Online
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

Data Analytics and Cybersecurity
Thus, you can safely say that Cybersecurity Analytics is concerned with the use of data analytics to achieve a cybersecurity objective. It is a powerful tool born of a deep understanding of data that can describe cybersecurity risks, diagnose vulnerabilities, predict future malicious behavior, and prescribe protective remedies.
What is cybersecurity analytics?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

What is Operational Security?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

What is Identity & Access Management (IAM)?
What Are The Key Components Of An IAM Platform?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

What is SDP?
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

But you need to have a look at your network traffic from various lenses. Traffic affects quality of your network, because an unusually high amount of traffic can result in slow download speeds or spotty Voice over Internet Protocol (VoIP) connections. Traffic is also related to security because an unusually high amount of traffic could be the sign of an attack.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM

What is Endpoint Security?
- What is SCADA (Supervisory Control And Data Acquisition)? How do SCADA systems work?
- What is LDAP? How does LDAP Authentication work? What Can You Do To Enhance LDAP Security?
- What is Remote Desktop Protocol? How Secure RDP is?
- What is LINK Aggregation? What is WAN Aggregation? How Does WAN Aggregation Work?
- What is Kerberos? How does KERBEROS Authentication work?
- What is ACL? How Do ACLs Work? What are the important components of ACLs?
- What is 802.1x authentication? What are key component of 802.1x Authentication? What is the security of 802.1x?
- What is FTP? What Are Various Types of FTP ? How to secure your FTP connections?
- What about Security of SD-WAN? 4-Major Security Concerns of SD-WAN
- What is Ethernet Switching? How Do Ethernet Switches Work?