Blog & Insights

Stay informed with the latest insights, trends, and best practices in cybersecurity.

Domain Generation Algorithms: How I Learned to Stop Worrying and Love the Mathematical Formulae

Cybersecurity is an ever expanding field where more domains keep getting added as we progress with technology. These domains try to address very specific problems that may arise, for example Container Security or Application Security seek to address issues with Containers and Applications (Web/Android/iOS etc.) respectively. It is however important to remember that all of […]

sudosiddharths

Security Expert

SecurityAnalyticsSecurityOperations

APT41 – TOUGHPROGRESS Malware Analysis

I arrive at the office, make a cup of coffee and sit down to browse the latest Cybersecurity news. I have a daily brief to cover for the company where I talk about whatever is the most important, alarming or interesting news for the day. While browsing I see the mention of APT41 once again, […]

sudosiddharths

Security Expert

SecurityAnalyticsSecurityOperations

Kill the Threat: How the “Cyber Kill Chain” Helps You Stop Attacks Early

Today, in the digital world, cyber-attacks are no longer a matter of “if”, “but” “when”. Attacks happen every minute, from phishing to sophisticated ransomware campaigns. It is no longer sufficient to only respond to breaches. Cybersecurity professionals must understand “how” and “why” an attack occurs. This is where the “Cyber Kill Chain” comes into play—a […]

shailendrasachan

Security Expert

BestPracticesSecurityAnalyticsSecurityOperations

From Headlines to Slack: Automating Cyber Threat Intelligence Delivery

As a Cybersecurity Analyst, staying ahead of the ever-evolving threat landscape is a non-negotiable part of the job. But in a fast-paced environment, manually looking through multiple sources for the latest cybersecurity news can be inefficient and unsustainable. That’s what sparked the idea for the “Threat Intel Automation” project—an initiative to automate the entire process […]

shailendrasachan

Security Expert

AISecurityAnalyticsSecurityOperations

The Day I Became a Digital Beekeeper – Luring Real Threats into My Windows Honeypot

This is Part 2 of the “The Art of Digital Deception” series, where theory meets chaos. In this post, we go beyond the build. The honeypot was live—open to the world like digital flypaper—and within hours, it began drawing in curious crawlers, brute-force bots, and opportunistic threat actors from across the globe. From SSH brute-forcing […]

Rakshit Shetty

Security Expert

SecurityAnalyticsSecurityOperations

The Art of Digital Deception: How I Built and Baited a Windows Honeypot to Trap Real Attackers

This is a two-part blog series where I share my journey of turning a Windows machine into a publicly exposed honeypot designed to lure, log, and learn from real-world attackers. 🧠 Whether you’re a red teamer, defender, or just cyber-curious—this series offers a close-up look at the reality of life on the edge of the […]

Rakshit Shetty

Security Expert

SecurityAnalyticsSecurityOperations

The Levenshtein Mile

In the previous article we covered the topic of Domain Generation Algorithm (DGA) and our subsequent efforts to detect the same using the Shannon Entropy formula by using the randomness of the characters in the domain itself to detect a suspected malicious domain. In this blog we move onto another security evil which seems to […]

sudosiddharths

Security Expert

SecurityAnalyticsSecurityOperations

Reducing Data Lake Costs on AWS by 80%: A High-Level Strategy Guide

At DNIF Hypercloud, a cybersecurity company processing millions of security events per second, data is at the core of everything we do. Our workloads are incredibly data-intensive, which means managing our data lake infrastructure on AWS is crucial for both performance and cost efficiency. This blog post shares the key insights and strategies that enabled […]

Ashish Panda

Security Expert

AISecopsAWSCloudCostOptimizationCyberSecurityDataLakeEfficiencyKubernetesMDRSpotInstance

Launch Day – Bloo Systems Inc

It’s June 16, 2025 – today, we’re launching Bloo, a cybersecurity company born from a simple but frustrating truth: Despite decades of investment in tools, platforms, and MDR services, threat detection still fails when it matters most. The Gap We See Security teams don’t struggle because they lack alerts. They struggle because they lack assurance. […]

Shomiron Das Gupta

Founder, CEO

What’s in the name?

Bloo is inspired by the defenders. The name draws from Blue Teams, those who stand guard over infrastructure, data, and people. But it also nods to Blue Ocean Strategy: a belief that the best way forward isn’t to fight in saturated markets, but to build new paths through deep innovation and clarity of purpose. And […]

Shomiron Das Gupta

Founder, CEO

Company

Search

Tags

Stay Updated

Subscribe to our newsletter for the latest insights and updates in cybersecurity.