Facebook Instagram Linkedin
  • Home
  • Active Directory Attack
  • Network Attack
  • SIEM
  • TOOLS
  • IOC
  • Mitre Att&ck
  • E-Mail Attack
  • Editors Pick
Search
Security Investigation Be the first to investigate
  • Home
  • Active Directory Attack
    • Threat Hunting Using Windows Security Log

      CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment

      OS Credential Dumping- LSASS Memory vs Windows Logs

      Credential Dumping using Windows Network Providers – How to Respond

      The Flow of Event Telemetry Blocking – Detection & Response

  • Network Attack
    • How Does DGA Malware Operate And How To Detect In A…

      DNS sinkholes to Prevent Malware? How did it work?

      Threat Hunting using DNS logs – Soc Incident Response Procedure

      What is Port Forwarding and the Security Risks?

      Threat Hunting using Firewall Logs – Soc Incident Response Procedure

  • SIEM
    • Soc Interview Questions and Answers – CYBER SECURITY ANALYST

      How to Detect Malware C2 with DNS Status Codes

      Ngrok Threat Hunting: Detect Hackers at the End of the Tunnel

      The Most Important Data Exfiltration Techniques for a Soc Analyst to…

      Anatomy Of An Advanced Persistent Threat Group

  • TOOLS
    • DeepBlueCLI – PowerShell Module for Threat Hunting

      Pestudio: Initial Malware Assessment Made Simple

      How Attackers Manipulate LLMs in ML – Attack Vectors

      How to Remove Database Malware from Your Website

      PECmd – Windows Prefetch Analysis For Incident Responders

  • IOC
    • Phishing Scam Alert: Fraudulent Emails Requesting to Clear Email Storage Space…

      Vidar Infostealer Malware Returns with new TTPS – Detection & Response

      New WhiskerSpy Backdoor via Watering Hole Attack -Detection & Response

      RedLine Stealer returns with New TTPS – Detection & Response

      Understanding Microsoft Defender Threat Intelligence (Defender TI)

  • Mitre Att&ck
    • MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses

      Threat Hunting Playbooks For MITRE TACTICS

      Masquerade Attack Part 2 – Suspicious Services and File Names

      Masquerade Attack – Everything You Need To Know in 2022

      Mapping MITRE ATT&CK with Window Event Log IDs

  • E-Mail Attack
    • How DKIM SPF & DMARC Work to Prevent Email Spoofing and…

      How Email Encryption Protects Your Privacy

      How To Check Malicious Phishing Links

      Emotet Malware with Microsoft OneNote- How to Block emails based on…

      How DMARC is used to reduce spoofed emails ?

  • Editors Pick
Home Authors Posts by SOC CSIRT

SOC CSIRT

1360 POSTS 0 COMMENTS
Plumber to the Rescue: Essential Solutions for Homeowners
Editors Pick

Plumber to the Rescue: Essential Solutions for Homeowners

SOC CSIRT -
July 23, 2024
0
Dumpster Rental Software and Streamlining Scheduling and Inventory Management
Editors Pick

Dumpster Rental Software and Streamlining Scheduling and Inventory Management

SOC CSIRT -
July 23, 2024
0
Mastering the Reels: Expert Tips for Navigating Online Slot Assistance
Editors Pick

Mastering the Reels: Expert Tips for Navigating Online Slot Assistance

SOC CSIRT -
July 22, 2024
0
Undead Reels: A Comparative Study of Zombie Slots and Traditional Themes in Player Preferences
Editors Pick

Undead Reels: A Comparative Study of Zombie Slots and Traditional Themes in Player Preferences

SOC CSIRT -
July 22, 2024
0
Dive Deep into Immersive Gameplay: Aqualung Slot Machine Graphics and Sound Effects
Editors Pick

Dive Deep into Immersive Gameplay: Aqualung Slot Machine Graphics and Sound Effects

SOC CSIRT -
July 22, 2024
0
Key events of the half of the 17th season of the Indian Premier League (IPL)
Editors Pick

Key events of the half of the 17th season of the Indian Premier League (IPL)

SOC CSIRT -
July 22, 2024
0
Is FM WhatsApp Banned?
Editors Pick

Is FM WhatsApp Banned?

SOC CSIRT -
July 22, 2024
0
The Role of Technology in Modern Lotteries: Enhancing Fairness and Accessibility
Editors Pick

The Role of Technology in Modern Lotteries: Enhancing Fairness and Accessibility

SOC CSIRT -
July 20, 2024
0
5 Best Websites to Order an Essay for 2024
Editors Pick

5 Best Websites to Order an Essay for 2024

SOC CSIRT -
July 20, 2024
0
Understanding the Cost of Downtime: Why Reliable Hosting Matters
Editors Pick

Understanding the Cost of Downtime: Why Reliable Hosting Matters

SOC CSIRT -
July 20, 2024
0
1...697071...136Page 70 of 136
  • Latest Cyber Security News
  • AbuseIPDB
  • Web Archive
  • Sucuri Web Malware
  • About Us
  • Contact Us
  • Privacy Policy
© Newspaper WordPress Theme by TagDiv