Facebook Instagram Linkedin
  • Home
  • Active Directory Attack
  • Network Attack
  • SIEM
  • TOOLS
  • IOC
  • Mitre Att&ck
  • E-Mail Attack
  • Editors Pick
Search
Security Investigation Be the first to investigate
  • Home
  • Active Directory Attack
    • The Flow of Event Telemetry Blocking – Detection & Response

      Threat Hunting Using Windows Security Log

      CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment

      OS Credential Dumping- LSASS Memory vs Windows Logs

      Credential Dumping using Windows Network Providers – How to Respond

  • Network Attack
    • What is Session Hijacking/Cookie Hijacking – DEMO

      How Does DGA Malware Operate And How To Detect In A…

      DNS sinkholes to Prevent Malware? How did it work?

      Threat Hunting using DNS logs – Soc Incident Response Procedure

      What is Port Forwarding and the Security Risks?

  • SIEM
    • What is Surface web, Deep web and Dark web

      Anatomy Of An Advanced Persistent Threat Group

      Comprehensive List of APT Threat Groups, Motives, and Attack Methods

      Anatomy Of The Ransomware Cybercrime Economy

      Soc Interview Questions and Answers – CYBER SECURITY ANALYST

  • TOOLS
    • How Small and Mid-Sized Businesses Are Using Cloud ERP to Punch…

      Essential Toolkits Every Security Operations Center Should Be Running Right Now

      Malicious JQuery & JavaScript – Threat Detection & Incident Response

      How to Detect Malware Hijacking Digital signatures

      How Attackers Manipulate LLMs in ML – Attack Vectors

  • IOC
    • Phishing Scam Alert: Fraudulent Emails Requesting to Clear Email Storage Space…

      Vidar Infostealer Malware Returns with new TTPS – Detection & Response

      New WhiskerSpy Backdoor via Watering Hole Attack -Detection & Response

      RedLine Stealer returns with New TTPS – Detection & Response

      Understanding Microsoft Defender Threat Intelligence (Defender TI)

  • Mitre Att&ck
    • Mapping MITRE ATT&CK with Window Event Log IDs

      MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses

      Threat Hunting Playbooks For MITRE TACTICS

      Masquerade Attack Part 2 – Suspicious Services and File Names

      Masquerade Attack – Everything You Need To Know in 2022

  • E-Mail Attack
    • BEC Targeting SMBs: Attack Patterns, Detection Techniques, and Incident Response

      How DKIM SPF & DMARC Work to Prevent Email Spoofing and…

      How Email Encryption Protects Your Privacy

      How To Check Malicious Phishing Links

      Emotet Malware with Microsoft OneNote- How to Block emails based on…

  • Editors Pick
Home Authors Posts by Harisuthan

Harisuthan

18 POSTS 0 COMMENTS
https://www.socinvestigation.com
A Cyber Security Aspirant Security Researcher | Red-Teamer |
MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses
Mitre Att&ck

MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses

Harisuthan -
August 12, 2025
0
PECmd – Windows Prefetch Analysis For Incident Responders
TOOLS

PECmd – Windows Prefetch Analysis For Incident Responders

Harisuthan -
January 27, 2025
0
Advance Mitre Threat Mapping – Attack Navigator & TRAM Tools
Mitre Att&ck

Advance Mitre Threat Mapping – Attack Navigator & TRAM Tools

Harisuthan -
November 22, 2021
0
What is the MITRE ATT&CK Framework? How Is It Useful
Mitre Att&ck

What is the MITRE ATT&CK Framework? How Is It Useful

Harisuthan -
October 22, 2021
0
Advanced Hunting to Find the Ransomware
Active Directory Attack

Advanced Hunting to Find the Ransomware

Harisuthan -
October 19, 2021
0
Hindsight – Browser Forensic Analyzer for Web Artifacts
TOOLS

Hindsight – Browser Forensic Analyzer for Web Artifacts

Harisuthan -
October 14, 2021
0
Logon Tracer – Investigate & Visualize Malicious Windows Logon
TOOLS

Logon Tracer – Investigate & Visualize Malicious Windows Logon

Harisuthan -
October 6, 2021
0
Types of SPLUNK Deployments and Configuration
SIEM

Types of SPLUNK Deployments and Configuration

Harisuthan -
October 1, 2021
0
Splunk Features – Quick Guide on Key Elements
SIEM

Splunk Features – Quick Guide on Key Elements

Harisuthan -
September 21, 2021
0
Splunk Architecture: Forwarder, Indexer, And Search Head
SIEM

Splunk Architecture: Forwarder, Indexer, And Search Head

Harisuthan -
September 8, 2021
0
12Page 1 of 2
  • Latest Cyber Security News
  • AbuseIPDB
  • Web Archive
  • Sucuri Web Malware
  • About Us
  • Contact Us
  • Privacy Policy
© Newspaper WordPress Theme by TagDiv