Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

Skype can’t fix a nasty security bug without a massive code rewrite

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: zdnet

A security flaw in Skype’s updater process can allow an attacker to gain system-level privileges to a vulnerable computer.

The bug, if exploited, can escalate a local unprivileged user to the full “system” level rights — granting them access to every corner of […]

By |February 17th, 2018|Cyber News|

iPhone Has a Killer Character Problem, and It’s Kicking Apple’s Brand

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credit: inc

If you have an iPhone, better be careful about any text your apps display. A new iOS bug discovered earlier this week by engineers at Aloha Browser will crash your Apple device, whether an iPhone, iPad, Mac, or Apple Watch, if the wrong character comes […]

By |February 17th, 2018|Cyber News|

Hack the Air Force 2.0 uncovers over 100 vulnerabilities

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: zdnet

The second Hack the Air Force bug bounty challenge, Hack the Air Force 2.0, has resulted in 106 vulnerabilities being reported and fixed.

On Thursday, bug bounty platform HackerOne revealed that the 20-day competition to find vulnerabilities in federal systems resulted in $103,883 in […]

By |February 17th, 2018|Cyber News|

US will impose costs on Russia for cyber ‘acts of aggression,’ White House cybersecurity czar says

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: cnbc

Russia will be made to pay for its acts of cyber aggression on the international stage, Rob Joyce, special assistant to the president and White House cybersecurity coordinator, told CNBC on Friday.

The act in question was the malware attack known as […]

By |February 17th, 2018|Cyber News|

Advanced SSH Tunneling: Taos Team

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Taos Team

First, a review of simple TCP SSH tunnels:
Many of us are quite familiar with the setup of SSH tunnels using the “-L” and “-R” options to do TCP port-forwarding — to access a web server behind a NAT and/or […]

By |February 12th, 2018|Cyber News|

Why is Cyber Threat Intelligence Sharing Important?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: infosecurity-magazine

The ever-accelerating flood of software vulnerabilities and innovative attack techniques leaves increasingly few organizations capable of defending themselves and safeguarding sensitive data in their care.

Information-sharing is a critical tool for network defenders because it allows them to avoid the missteps of […]

By |February 12th, 2018|Cyber News|

Cyber-attacks: ‘N150bn depositors’ monies at risk’

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: ABC News

Experts and top Nigerian government officials have said at least N150 billion will be lost to cyber criminals if they eventually carry out their plan to launch a massive robbery attack on the country this year.

Many Nigerians were jolted […]

By |February 12th, 2018|Cyber News|

Cyber security deployment guide to effectively safeguard systems & data

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: itproportal

Following are the cyber-security measures, in a step by step delineation, that can be deployed to safeguard systems and data.

Even the sturdiest of organisations host a probability of being sabotaged by the tiniest of cyber-attacks. An unforeseen virus slips through the […]

By |February 12th, 2018|Cyber News|

Check Yourself Before You Wreck Yourself: Cyber Threats in 2018

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: tnp

Over half of consumers in the region are concerned about the current state of cyber security and feel that businesses are not doing enough to thwart such attacks, according to a 2017 Limelight Networks study.

This year, there are four key areas […]

By |February 12th, 2018|Cyber News|

Cyber Security: Challenges And Potential For Indian Businesses

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: cxotoday

Cybersecurity is a hygiene factor today and will remain so in a world with pervasive Internet and IT systems across Industries. It is the responsibility of all stakeholders in an organization, not just the IT security department. In B2C services end-users/customers […]

By |February 12th, 2018|Cyber News|