Bigbasket data breach case study – Hacker leak records of 20 million users on the dark web

Hi, I am Ruda Barar...
I am an experienced cybersecurity professional, working at the intersection of security, businesses, technology and people. I am a trained & certified ethical hacker and security analyst from the EC-Council. I have cleared the CQI-IRCA Certified ISO/IEC 27001 Lead Auditor level and am an IRCA registered Auditor. I have also completed ISO/IEC 27002 Foundation certification. Furthermore, these industry qualifications are backed up by my education inclusive of a Master's degree in information security and a Bachelor's degree in information technology.
Key areas within information security where I have specific expertise, include privileged & regular identity access management, especially in context to Thycotic & Amazon Web Services. Also trained in access control, cloud governance principles, & networking fundamentals. I have also acquired professional training to understand the National Institute of Standards and Technology (NIST) privacy framework, PCI DSS: Payment Card Industry Data Security Standard, & the HIPAA data & information security framework.


EC-Council CEH Certified | CQI-IRCA Registered ISO 27001 Auditor | ECSA Trained | Master of Technology (M.Tech) in Information Security
My Credentials...
CEH is trusted by Fortune 500 Companies
























CEH is recognized by...
























EC-Council
The Rise of An Era: IOT & Cybersecurity
The Internet of Things (IoT) is rapidly gaining momentum in various industries. Various organizations have been introducing IoT technology to consumer electronics and home appliances, resulting in the smart kitchen, which is gaining popularity among consumers. Along with technological advancement, a corresponding advancement of consumer knowledge and awareness must also be an integral part of the IoT evolution. Currently, there seems to be a gap between where the consumers are and where they should be to effectively combat the increased onslaught of cyber-threats.
IOSR Journal of Computer Engineering (IOSR-JCE)
Security Suite for IT and Telecom Industries
Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more difficult. The solution in response to this threat is to provide a single aggregated view of all the threats observed in the network, to prioritize them so the worst are dealt first. It can happen only through “Security Suite”. It offers insight of Front-end-Perimeter protection(FEP), Advanced Breach Detection(ABD), Distributed Denial-of –Service(DDOS) protection. But, what when they are not accessed from the same simulator. This paper refers to the working of Security Suite in real time, to provide a more user friendly working and reduce the tedious task of switching between simulators. It states how the products of the organization and the Security Suite can go hand in hand.