Home
Active Directory Attack
Network Attack
SIEM
TOOLS
IOC
Mitre Att&ck
E-Mail Attack
Search
Monday, August 8, 2022, 7:15 pm
Live IOC
Latest Cyber Security News
New CVE’s
Ransomware CVE ID
AbuseIPDB
Phishing Domain Search
Sucuri Web Malware
Urlabuse
WebPage Historic Checks
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Security Investigation
Home
Active Directory Attack
The Flow of Event Telemetry Blocking – Detection & Response
UEFI Persistence via WPBBIN – Detection & Response
Microsoft Notified Blueteam to Monitor Sqlps.exe and Powershell
Sysmon Event ID 13 to Detect Malicious Password-Protected File unlock and…
Windows Event ID 5379 to Detect Malicious Password-Protected File unlock
Network Attack
What is Port Forwarding and the Security Risks?
CVE-2021-4034 – Polkit Vulnerability Exploit Detection
DNSSEC – Domain Name System Security Extensions Explained
Detect Most Common Malicious Actions in the Linux Environment
How DNS Tunneling works – Detection & Response
SIEM
Anatomy Of The Ransomware Cybercrime Economy
Anatomy Of An Advanced Persistent Threat Group
Out-of-Band Application Security Testing – Detection and Response
Splunk Commands – BIN and its Arguments
Microsoft Cloud App Security Anomaly Detection Policies
TOOLS
Free Ransomware Decryption tool -No More Ransom
How to Remove Database Malware from Your Website
Most Common Malware Obfuscation Techniques
Web Malware Removal | How to Remove Malware From Your Website?
What is a WAF? | Web Application Firewall Explained
IOC
Hackers Opted for New techniques after Microsoft disables Excel 4.0 macros
New Manjusaka Attack Framework Imitates Cobalt Strike
Qbot TTP Compilation – External Old Emails Hijacking to New Malicious…
Attackers Steal Internet bandwidth to Execute Proxyware
Threat Actors Leveraging Microsoft Applications via DLL SideLoading – Detection &…
Mitre Att&ck
Masquerade Attack Part 2 – Suspicious Services and File Names
Masquerade Attack – Everything You Need To Know in 2022
MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses
Mapping MITRE ATT&CK with Window Event Log IDs
Advance Mitre Threat Mapping – Attack Navigator & TRAM Tools
E-Mail Attack
Hackers Use New Static Expressway Phishing Technique on Lucidchart
Weird Trick to Block Password-Protected Files to Combat Ransomware
Phishing with Reverse Tunnels and URL Shorteners – Detection & Response
How to spot a phishing email?
Google SMTP Relay Abused to Deliver Phishing Emails
Home
Tags
How to open prefetch files
Tag: how to open prefetch files
PECmd – Windows Prefetch Analysis For Incident Responders
Harisuthan
-
November 29, 2021
0
Recent Posts
The Flow of Event Telemetry Blocking – Detection & Response
August 1, 2022
UEFI Persistence via WPBBIN – Detection & Response
July 19, 2022
Microsoft Notified Blueteam to Monitor Sqlps.exe and Powershell
May 19, 2022
Sysmon Event ID 13 to Detect Malicious Password-Protected File unlock and...
May 12, 2022
Windows Event ID 5379 to Detect Malicious Password-Protected File unlock
May 10, 2022
Load more