PinnedSathish SivaprakashCheck Which APT Group Targets your OrganizationToday we will see how to identify which APT Group is interested in your organization to attack.1 min read·May 24, 2022----
PinnedSathish SivaprakashMy Threat Intelligence HotlistToday I am going to share my threat intelligence bookmarks which I use daily for various reasons.1 min read·Jun 3, 2022--1--1
PinnedSathish SivaprakashSSDEEP — Fuzzy HashingWe all know how the hashing function works, they are different hashing we use like Md5, SHA1, SHA256 and SHA512 etc., when it is come to…3 min read·Jan 18, 2022--1--1
Sathish SivaprakashMindMap for Hunting C2'sShodan is the best service to search the C2 IP’s, so today i am going to share my MindMap which i created to record the shodan queries in…2 min read·Oct 12, 2022----
Sathish SivaprakashThird-Party Risk Assessment using MaltegoAs a Threat Intelligence Analyst we are required to monitor the third-party product used by our organization for any vulnerabilities which…2 min read·Aug 15, 2022--1--1
Sathish SivaprakashHow to identify your Email Credential Leaked Information2 min read·Jul 26, 2022----
Sathish SivaprakashKnow Your Threat Actor using Unit42 — ATOMWhile reading the threat news feeds today, I randomly visited one good online portal from Unit 42 team. which has good information about…2 min read·Jun 14, 2022----
Sathish SivaprakashCross Platform Threat Hunting Rule ConversationToday we are going to see how to convert the threat hunting rules from different formats.1 min read·Jun 8, 2022----
Sathish SivaprakashThePhish — TheHive — Cortex — MISP — Phishing AnalysisThePhish is an automated phishing email analysis tool based on TheHive, Cortex and MISP.8 min read·May 18, 2022--1--1
Sathish SivaprakashThreat Intelligence as a ServiceCyber-threat intelligence service integrates with combination of multiple open source and commercial threat intelligence to provide early…2 min read·Jan 6, 2022----