Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

Pwn an iPhone to bank $1m, Check Point gripes about WhatsApp privacy again, Broadcom eats Symantec enterprise biz

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat Here’s a quick summary of some important infosec happenings from inside and outside the Black Hat USA conference in Las Vegas on Thursday.
Apple embiggens bug-bounty program
Apple’s security engineering boss Ivan Krstić told Black Hat attendees that Cupertino is expanding its […]

By |August 9th, 2019|Cyber News|

How powerful are Russian hackers? One new law could transform global crime operations

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat The introduction of Russia’s Sovereign Internet rules is having an impact on the way criminal hackers around the world do business.

This is according to security house IntSights, which says that the law, set to become official in a few […]

By |August 9th, 2019|Cyber News|

Transport for London Oyster system pulled offline after credential-stuffing crooks board customers’ accounts

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Exclusive Transport for London’s online Oyster travel smartcard system has been accessed by miscreants using stolen customer login credentials, The Reg can reveal, forcing IT bods to pull the website offline for a second day.

The UK capital’s transport authority has blamed the […]

By |August 9th, 2019|Cyber News|

WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat A Black Hat presentation on how to potentially hijack a 787 – by exploiting bugs found in internal code left lying around on a public-facing server – was last night slammed as “irresponsible and misleading” by Boeing.

At the […]

By |August 8th, 2019|Cyber News|

FBI, NSA to hackers: Let us be blunt. Weed need your help. We’ll hire you even if you’ve smoked a little pot in the past

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat America’s crime-fighters, desperate to recruit white-hat hackers to collar spies and cyber-crooks, have been quietly and slightly relaxing the ban on hiring anyone who has used illegal drugs.

Generally speaking, dabbling in any kind of substance abuse will rule […]

By |August 8th, 2019|Cyber News|

Hack computers to steal someone’s identity in China? Why? You can just buy one from a bumpkin for, like, $3k

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat Black Hat founder Jeff Moss opened this year’s shindig in Las Vegas with tales of quite how odd the hacking culture in China is.

You see, Moss also founded the DEF CON conference series, and has started running DEF […]

By |August 8th, 2019|Cyber News|

Hack-age delivery! Wardialing, wardriving… Now warshipping: Wi-Fi-spying gizmos may lurk in future parcels

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat IBM’s X-Force hacking team have come up with an interesting variation on wardriving – you know, when you cruise a neighborhood scouting for Wi-Fi networks. Well, why not try using the postal service instead, and called it “warshipping,” […]

By |August 8th, 2019|Cyber News|

Deja-wooo-oooh! Intel chips running Windows potentially vulnerable to scary Spectre variant

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Spectre – a family of data-leaking side-channel vulnerabilities arising from speculative execution that was disclosed last year and affects various vendors’ chips – has a new sibling that bypasses previous mitigations.

Designated CVE-2019-1125 and rated moderate in terms of severity, the issue […]

By |August 7th, 2019|Cyber News|

They say piracy killed the Amiga. Know what else it’s killing? Malware sales. Awww, diddums

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

BSides LV Life’s tough as a malware developer. If the cops or Feds don’t collar you, your fellow scumbags will screw you over – or perhaps both will happen.

In a presentation at the Bsides Las Vegas hacking conference today, Winnona […]

By |August 7th, 2019|Cyber News|

There’s fraud, and then there’s backdoor routers, fenced logins, malware, and bribing AT&T staff seven figures to unlock 2m phones

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

AT&T staff were bribed $1m to slip the codes to unlock two million smartphones to a gang operating out of Pakistan, US prosecutors have claimed.

When those telco workers took too long to cough up the codes, the crew bought […]

By |August 7th, 2019|Cyber News|