Open in app

Sign In

Write

Sign In

Sathish Sivaprakash
Sathish Sivaprakash

71 Followers

Home

About

Pinned

Check Which APT Group Targets your Organization

Today we will see how to identify which APT Group is interested in your organization to attack. There are few requirements is required to identify this. Which region your organization is located ? Which type of industry / Sector ? In which region your providing services? In which sector your…

Threat Intelligence

1 min read

Check Which APT Group Targets your Organization
Check Which APT Group Targets your Organization
Threat Intelligence

1 min read


Pinned

My Threat Intelligence Hotlist

Today I am going to share my threat intelligence bookmarks which I use daily for various reasons. For example news feeds, IOC’s, Malware information and TTPs etc.., TI News Feeds List https://www.bleepingcomputer.com/ https://www.darkreading.com/ https://www.zdnet.com/topic/security/ https://www.theregister.com/security/ https://www.scmagazine.com/ https://www.cyberscoop.com/ https://blog.alyac.co.kr/category

Cybersecurity

1 min read

My Threat Intelligence Hotlist
My Threat Intelligence Hotlist
Cybersecurity

1 min read


Pinned

SSDEEP — Fuzzy Hashing

They are different hashing we use like Md5, SHA1, SHA256 and SHA512 etc., when it is come to malware detection most of the AV will detect based on the signatures, which contains hash information as a one of the key element for malwares. So, to avoid detecting from the AV…

Malware

3 min read

SSDEEP — Fuzzy Hashing
SSDEEP — Fuzzy Hashing
Malware

3 min read


Oct 12, 2022

MindMap for Hunting C2's

Shodan is the best service to search the C2 IP’s, so today i am going to share my MindMap which i created to record the shodan queries in the single page. We can use the search queries in shodan to get C2 infrastructure details to…

Threat Intelligence

2 min read

MindMap for Hunting C2's
MindMap for Hunting C2's
Threat Intelligence

2 min read


Aug 15, 2022

Third-Party Risk Assessment using Maltego

As a Threat Intelligence Analyst we are required to monitor the third-party product used by our organization for any vulnerabilities which is required to notified to security team. Also, we need to create the watchlist for those product and services to monitor the existing vulnerability list. I am searching for…

Cybersecurity

2 min read

Third-Party Risk Assessment using Maltego
Third-Party Risk Assessment using Maltego
Cybersecurity

2 min read


Jul 26, 2022

How to identify your Email Credential Leaked Information

Hello Everyone. We are going to see how to identify the email leaked information using some well known tools. I Hope you’re familiar with most of the tools which I am going to mention here. First https://haveibeenpwned.com/ The most popular tool, and you can use it in two ways. Like…

Threat Intelligence

2 min read

How to identify your Email Credential Leaked Information
How to identify your Email Credential Leaked Information
Threat Intelligence

2 min read


Jun 14, 2022

Know Your Threat Actor using Unit42 — ATOM

While reading the threat news feeds today, I randomly visited one good online portal from Unit 42 team. which has good information about the Threat Actor Profile and Malware information, so I thought to share some insight about Unit 42 ATOM here. Unit 42 is a threat intelligence team from…

Threat Intelligence

2 min read

Know Your Threat Actor using Unit42 — ATOM
Know Your Threat Actor using Unit42 — ATOM
Threat Intelligence

2 min read


Jun 8, 2022

Cross Platform Threat Hunting Rule Conversation

Today we are going to see how to convert the threat hunting rules from different formats. I am going to use the Sigma Rule is the base rule, because it is open and most of the rule author contributing more in Sigma Rule. Here is the below link, which has…

Threat Intelligence

1 min read

Cross Platform Threat Hunting Rule Conversation
Cross Platform Threat Hunting Rule Conversation
Threat Intelligence

1 min read


May 18, 2022

The Automated Phishing Analysis

ThePhish is an automated phishing email analysis tool based on TheHive, Cortex and MISP. In this article, i will show you how to deploy the automated phishing analysis tool in AWS using Lightsail. About ThePhish Tool, Any user can forward the suspicious email to the ThePhish for email analysis. ThePhish will also create…

Cyber

8 min read

ThePhish — TheHive — Cortex — MISP — Phishing Analysis
ThePhish — TheHive — Cortex — MISP — Phishing Analysis
Cyber

8 min read


Jan 6, 2022

Threat Intelligence as a Service

Cyber-threat intelligence service integrates with combination of multiple open source and commercial threat intelligence to provide early warnings to the organizations and customers. So cyber-threat intelligence is an information that can helps an organization to identify, assess, monitor, and respond to the cyber-threats. Intelligence TIaaS provide STRATEGIC INTELLIGENCE Customer specific advisory: Threat intelligence team…

Threat Intelligence

2 min read

Threat Intelligence as a Service
Threat Intelligence as a Service
Threat Intelligence

2 min read

Sathish Sivaprakash

Sathish Sivaprakash

71 Followers

Threat Intelligence Analyst and Security Automation | Located in Abu Dhabi, UAE.

Following
  • nancy

    nancy

  • Igor S. Bederov

    Igor S. Bederov

  • Anton Chuvakin

    Anton Chuvakin

  • David Merian

    David Merian

  • Kostas

    Kostas

See all (25)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams