Facebook Instagram Linkedin
  • Home
  • Active Directory Attack
  • Network Attack
  • SIEM
  • TOOLS
  • IOC
  • Mitre Att&ck
  • E-Mail Attack
  • Editors Pick
Search
Security Investigation Be the first to investigate
  • Home
  • Active Directory Attack
    • Threat Hunting Using Windows Security Log

      CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment

      OS Credential Dumping- LSASS Memory vs Windows Logs

      Credential Dumping using Windows Network Providers – How to Respond

      The Flow of Event Telemetry Blocking – Detection & Response

  • Network Attack
    • DNS sinkholes to Prevent Malware? How did it work?

      Threat Hunting using DNS logs – Soc Incident Response Procedure

      What is Port Forwarding and the Security Risks?

      Threat Hunting using Firewall Logs – Soc Incident Response Procedure

      Threat Hunting with Zeek – Log Types and Use cases

  • SIEM
    • The Most Important Data Exfiltration Techniques for a Soc Analyst to…

      Soc Interview Questions and Answers – CYBER SECURITY ANALYST

      Anatomy Of An Advanced Persistent Threat Group

      The Benefits of Cybersecurity Training Online for Remote Employees

      Cybersecurity Playbook for SOC

  • TOOLS
    • Pestudio: Initial Malware Assessment Made Simple

      How Attackers Manipulate LLMs in ML – Attack Vectors

      How to Remove Database Malware from Your Website

      PECmd – Windows Prefetch Analysis For Incident Responders

      How Brazilian students use AI

  • IOC
    • Phishing Scam Alert: Fraudulent Emails Requesting to Clear Email Storage Space…

      Vidar Infostealer Malware Returns with new TTPS – Detection & Response

      New WhiskerSpy Backdoor via Watering Hole Attack -Detection & Response

      RedLine Stealer returns with New TTPS – Detection & Response

      Understanding Microsoft Defender Threat Intelligence (Defender TI)

  • Mitre Att&ck
    • Threat Hunting Playbooks For MITRE TACTICS

      Masquerade Attack Part 2 – Suspicious Services and File Names

      Masquerade Attack – Everything You Need To Know in 2022

      MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses

      Mapping MITRE ATT&CK with Window Event Log IDs

  • E-Mail Attack
    • How DKIM SPF & DMARC Work to Prevent Email Spoofing and…

      How Email Encryption Protects Your Privacy

      How To Check Malicious Phishing Links

      Emotet Malware with Microsoft OneNote- How to Block emails based on…

      How DMARC is used to reduce spoofed emails ?

  • Editors Pick
Home Authors Posts by SOC CSIRT

SOC CSIRT

1193 POSTS 0 COMMENTS
Gym Management Software: A smart and Innovative solution for Gym Owners
Editors Pick

Gym Management Software: A smart and Innovative solution for Gym Owners

SOC CSIRT -
March 25, 2024
0
The Rise Of Ethically-Driven Tech Entrepreneurs
Editors Pick

The Rise Of Ethically-Driven Tech Entrepreneurs

SOC CSIRT -
March 22, 2024
0
Overcoming JavaScript-Rendered Content in Web Scraping
Editors Pick

Overcoming JavaScript-Rendered Content in Web Scraping

SOC CSIRT -
March 22, 2024
0
Benefits of Hiring .NET Developers
Editors Pick

Benefits of Hiring .NET Developers

SOC CSIRT -
March 22, 2024
0
Unlocking the Potential of Custom Legal Software in Streamlining Operations and Client Management for Law Firms
Editors Pick

Unlocking the Potential of Custom Legal Software in Streamlining Operations and Client Management for Law Firms

SOC CSIRT -
March 20, 2024
0
The Ultimate Guide to Staff Augmentation
Editors Pick

The Ultimate Guide to Staff Augmentation

SOC CSIRT -
March 20, 2024
0
Exploitation of control software vulnerabilities
Editors Pick

Exploitation of control software vulnerabilities

SOC CSIRT -
March 20, 2024
0
Striking a Balance: User Convenience vs. Watertight Security in Mobile Gaming Apps
Editors Pick

Striking a Balance: User Convenience vs. Watertight Security in Mobile Gaming Apps

SOC CSIRT -
March 20, 2024
0
Why does a business need a website?
Editors Pick

Why does a business need a website?

SOC CSIRT -
March 19, 2024
0
Why New Casinos Are Winning Over Gamers
Editors Pick

Why New Casinos Are Winning Over Gamers

SOC CSIRT -
March 19, 2024
0
1...868788...120Page 87 of 120
  • Latest Cyber Security News
  • AbuseIPDB
  • Web Archive
  • Sucuri Web Malware
  • About Us
  • Contact Us
  • Privacy Policy
© Newspaper WordPress Theme by TagDiv