Open-source intelligence techniques and visualization
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
Hunt the Haunt
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
What is Threat Hunting? Threat Hunting is a proactive approach to find the patterns of the existing malware in our network. As it’s a focused way to find the security…
In recent years, the Term “Threat Hunting” has become the most important component of Cyber Security Programs. Most Enterprises and Cyber Professionals have started to adopt the Threat hunting terminology…
What are fileless malware attacks? In the real world, living off the land means surviving only with the available resources that you can get from nature. In the technology world,…
Introduction: Evasion technique is where the malwares can bypass the security control devices without even getting detected by them and executes the successful exploitation on the targeted victims. The term…