Home
Active Directory Attack
Network Attack
SIEM
TOOLS
IOC
Mitre Att&ck
E-Mail Attack
Search
Thursday, June 30, 2022, 4:28 pm
Live IOC
Latest Cyber Security News
New CVE’s
Ransomware CVE ID
AbuseIPDB
Phishing Domain Search
Sucuri Web Malware
Urlabuse
WebPage Historic Checks
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Privacy Policy
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Security Investigation
Home
Active Directory Attack
Microsoft Notified Blueteam to Monitor Sqlps.exe and Powershell
Sysmon Event ID 13 to Detect Malicious Password-Protected File unlock and…
Windows Event ID 5379 to Detect Malicious Password-Protected File unlock
How FIDO Makes Passwordless Authentication Works
Time to re-evaluate your 2FA setup on Microsoft networks
Network Attack
What is Port Forwarding and the Security Risks?
CVE-2021-4034 – Polkit Vulnerability Exploit Detection
DNSSEC – Domain Name System Security Extensions Explained
Detect Most Common Malicious Actions in the Linux Environment
How DNS Tunneling works – Detection & Response
SIEM
Anatomy Of An Advanced Persistent Threat Group
Out-of-Band Application Security Testing – Detection and Response
Splunk Commands – BIN and its Arguments
Microsoft Cloud App Security Anomaly Detection Policies
Ngrok Threat Hunting: Detect Hackers at the End of the Tunnel
TOOLS
Free Ransomware Decryption tool -No More Ransom
How to Remove Database Malware from Your Website
Most Common Malware Obfuscation Techniques
Web Malware Removal | How to Remove Malware From Your Website?
What is a WAF? | Web Application Firewall Explained
IOC
Cutwail Malware Returns with New TTPS – Detection & Response
Agent Tesla Spyware new TTPS – Detection & Response
SocGholish Malware on The Rise – Detection & Response
Bumblebee malware loader is now active in the wild – Detection…
LockBit Ransomware Disturbed via Copyright Infringement Emails
Mitre Att&ck
Masquerade Attack – Everything You Need To Know in 2022
MITRE D3FEND Knowledge Guides to Design Better Cyber Defenses
Mapping MITRE ATT&CK with Window Event Log IDs
Advance Mitre Threat Mapping – Attack Navigator & TRAM Tools
What is the MITRE ATT&CK Framework? How Is It Useful
E-Mail Attack
Weird Trick to Block Password-Protected Files to Combat Ransomware
Phishing with Reverse Tunnels and URL Shorteners – Detection & Response
How to spot a phishing email?
Google SMTP Relay Abused to Deliver Phishing Emails
Email Header Analysis – Use Cases Including SPF, DKIM & DMARC
Home
Tags
Saitama backdoor
Tag: saitama backdoor
How the APT34 uses Saitama Backdoor for DNS tunnelling
Anusthika Jeyashankar
-
June 2, 2022
0
Recent Posts
Microsoft Notified Blueteam to Monitor Sqlps.exe and Powershell
May 19, 2022
Sysmon Event ID 13 to Detect Malicious Password-Protected File unlock and...
May 12, 2022
Windows Event ID 5379 to Detect Malicious Password-Protected File unlock
May 10, 2022
How FIDO Makes Passwordless Authentication Works
May 9, 2022
Time to re-evaluate your 2FA setup on Microsoft networks
May 5, 2022
Load more