Home
Active Directory Attack
Network Attack
SIEM
TOOLS
IOC
Mitre Att&ck
E-Mail Attack
Search
Sunday, August 14, 2022, 12:01 pm
Live IOC
Latest Cyber Security News
New CVE’s
Ransomware CVE ID
AbuseIPDB
Phishing Domain Search
Sucuri Web Malware
Urlabuse
WebPage Historic Checks
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Security Investigation
Home
Active Directory Attack
The Flow of Event Telemetry Blocking – Detection & Response
UEFI Persistence via WPBBIN – Detection & Response
Microsoft Notified Blueteam to Monitor Sqlps.exe and Powershell
Sysmon Event ID 13 to Detect Malicious Password-Protected File unlock and…
Windows Event ID 5379 to Detect Malicious Password-Protected File unlock
Network Attack
What is Port Forwarding and the Security Risks?
CVE-2021-4034 – Polkit Vulnerability Exploit Detection
DNSSEC – Domain Name System Security Extensions Explained
Detect Most Common Malicious Actions in the Linux Environment
How DNS Tunneling works – Detection & Response
SIEM
Anatomy Of The Ransomware Cybercrime Economy
Anatomy Of An Advanced Persistent Threat Group
Out-of-Band Application Security Testing – Detection and Response
Splunk Commands – BIN and its Arguments
Microsoft Cloud App Security Anomaly Detection Policies
TOOLS
Free Ransomware Decryption tool -No More Ransom
How to Remove Database Malware from Your Website
Most Common Malware Obfuscation Techniques
Web Malware Removal | How to Remove Malware From Your Website?
What is a WAF? | Web Application Firewall Explained
IOC
Cuba Ransomware Uses New RAT Malware
Public Exploit Available for Critical VMware Bug CVE-2022-31656
Chinese New Backdoor Deployed For Cyberespionage
Hackers Opted for New techniques after Microsoft disables Excel 4.0 macros
New Manjusaka Attack Framework Imitates Cobalt Strike
Mitre Att&ck
Masquerade Attack Part 2 – Suspicious Services and File Names
Masquerade Attack – Everything You Need To Know in 2022
MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses
Mapping MITRE ATT&CK with Window Event Log IDs
Advance Mitre Threat Mapping – Attack Navigator & TRAM Tools
E-Mail Attack
Hackers Use New Static Expressway Phishing Technique on Lucidchart
Weird Trick to Block Password-Protected Files to Combat Ransomware
Phishing with Reverse Tunnels and URL Shorteners – Detection & Response
How to spot a phishing email?
Google SMTP Relay Abused to Deliver Phishing Emails
Home
Tags
Event id 4648
Tag: event id 4648
Most Common Windows Event IDs to Hunt – Mind Map
BalaGanesh
-
November 3, 2021
0
Windows Management Instrumentation Attacks – Detection & Response
Anusthika Jeyashankar
-
November 1, 2021
0
Threat Hunting Using Windows EventID 4648 – Logon/Logoff
BalaGanesh
-
September 28, 2021
0
Threat Hunting Using Windows Security Log
Anusthika Jeyashankar
-
September 27, 2021
0
Recent Posts
The Flow of Event Telemetry Blocking – Detection & Response
August 1, 2022
UEFI Persistence via WPBBIN – Detection & Response
July 19, 2022
Microsoft Notified Blueteam to Monitor Sqlps.exe and Powershell
May 19, 2022
Sysmon Event ID 13 to Detect Malicious Password-Protected File unlock and...
May 12, 2022
Windows Event ID 5379 to Detect Malicious Password-Protected File unlock
May 10, 2022
Load more