PinnedCheck Which APT Group Targets your OrganizationToday we will see how to identify which APT Group is interested in your organization to attack.May 24, 2022May 24, 2022
PinnedMy Threat Intelligence HotlistToday I am going to share my threat intelligence bookmarks which I use daily for various reasons.Jun 3, 20221Jun 3, 20221
PinnedSSDEEP — Fuzzy HashingWe all know how the hashing function works, they are different hashing we use like Md5, SHA1, SHA256 and SHA512 etc., when it is come to…Jan 18, 20221Jan 18, 20221
Increasing the knowledge of the kill chain Model — Unified Kill ChainWhat is Cyber Kill Chain?Jul 16Jul 16
Cybersecurity for Small BusinessesCybersecurity for small businesses is a critical topic as these businesses often lack the resources and expertise that larger organizations…Jun 21Jun 21
MindMap for Hunting C2'sShodan is the best service to search the C2 IP’s, so today i am going to share my MindMap which i created to record the shodan queries in…Oct 12, 2022Oct 12, 2022
Third-Party Risk Assessment using MaltegoAs a Threat Intelligence Analyst we are required to monitor the third-party product used by our organization for any vulnerabilities which…Aug 15, 20221Aug 15, 20221
Know Your Threat Actor using Unit42 — ATOMWhile reading the threat news feeds today, I randomly visited one good online portal from Unit 42 team. which has good information about…Jun 14, 2022Jun 14, 2022
Cross Platform Threat Hunting Rule ConversationToday we are going to see how to convert the threat hunting rules from different formats.Jun 8, 2022Jun 8, 2022