THREAT INTELLIGENCE

Threat intelligence is information that informs enterprise defenders of adversarial elements to stop them. It is information that is relevant to the organization, has business value, and is actionable. In this presentation, following are the covered elements: What is Threat Intelligence Cyber Security Mindmap Threat Agents Threat Intel Categories Threat Int Use Cases Important Assets…

TESTIMONIALS

Dear All, Humbled and Thanks all for the recommendations and the review. Its been great learning as well by sharing the thoughts knowledge. Sharing some testimonials and hope more acquire down : To be Cont…

SMARTPHONE FORENSICS – 2

Greetz to dear reader’s, Digital Forensics (4n6)🕵️‍♂️ itself as one of the emerging domain in information security. And Smartphone forensics is one of them, It is a subset of digital forensics and refers to the investigation and acquisition of artefacts in mobile phones 📲 When we talking about mobile phone forensics then it depends on…

FILELESS MALWARE ATTACKS : INTRO

FILELESS MALWARE ATTACKS Unlike attacks carried out using traditional malware, fileless malware attacks don’t entail attackers installing software on a victim’s machine. This means that there’s NO signature for antivirus software to detect, greatly decreasing the effectiveness of these programs in detecting fileless malware attacks. And these attacks are almost 10 times more likely to…

PENTESTING RESOURCES

Sharing free resources on pentesting (penetration testing, PT) It is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. 1: Davy Rogers made a list of YouTube videos from many different creators and put it in a loosely structured order to cover the basics of pentesting…

CYBERSECURITY CERTIFICATIONS -1

Dear Readers 🙏, The Demand for Cyber Security Professionals Is Strong.  Whether you’re just starting off in the cyber-security field or are already working as a security professional, there are many certifications for you to consider across various specializations and difficulty levels. Before jumping to the certifications let’s having look of cyber security mind-map: Top…

WHY OPEN SOURCE THREAT INTELLIGENCE

A file hash is smoking gun for forensic investigators, Break Down the Open Source Intelligence Knowledge Stack Other sites dedicated to compiling information about indicators from the atomic to the behavioral include: Team Cymru’s Community Services portal: This portal includes IP reputation lookup and malware hash analysis. Threatminer: Search by domains, hashes, user-agent strings and…

CYBER THREAT INTELLIGENCE PLATFORMS (TIPS)

ENISA has released the first comprehensive study on Cyber Threat Intelligence Platforms (TIPs) focused on the needs of TIP users, developers, vendors, and the security research community. So lets brief, what is Threat intelligence platform : Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real…

FORENSICS BRUNCH 2

Without a doubt, technology is advancing at an increasingly rapid pace. It’s all about today’s Digital Security and increasing Cyber-Crime information. If you want to play a role in fighting these cybercrime threats, then you’ll want to know how to become a digital forensic examiner. Sharp knowledge and Computer soundness may lead you ahead and…

EQUIFAX DATA BREACH

Equifax Hackers Demanding $2.6 Mln in Bitcoin, Or Else Expose 143 million Americans Private Info Equifax data breach may affect nearly half the US population. Three Equifax execs sold $1.8 million of stock days after breach discovery. But before it was made public. Equifax Inc. is a consumer credit reporting agency in the United States,…

OIL & GAS ENERGY INDUSTRIES: CYBER THREATS

Cyber Domain “Fifth Domain of Warfare” 🌍 Cyber-attacks on the energy sector, and on oil and gas facilities, have increased in the past five years along with the associated costs. The scale and severity of attacks on industrial cyber systems are growing. For the oil and gas sector – like other sectors – it continues…

FORENSICS BRUNCH 1

Greetings : Sharing some resources 1: Digital Forensic Challenge Images (Datasets) https://www.ashemery.com/dfir.html 2: Hidden Networks: Detecting Hidden Networks created with USB Devices https://drive.google.com/drive/folders/0ByczHyAbM7lDLVlfRGhDWHJadzA?usp=sharing 3: Gordon Fraser’s paper, which walks through the IR process after an attack on “A fictitious organization, Winterfell” #SANS https://www.sans.org/reading-room/whitepapers/incident/practical-incident-response-network-based-attack-37920 4: Six Skills Required For A Career In Digital Forensics https://www.forbes.com/sites/laurencebradford/2017/04/29/6-skills-required-for-a-career-in-digital-forensics/#65e5deb87fa6 5:…

एक सैनिक की जुबानी : ARMY

एक सैनिक की जुबानी Sabse pahle mera desh, Sharing one OT post. #Jai_Hind हम दोनों ने 18 की उम्र में घर छोड़ा, तुमने JEE पास की मेने Army के लिए Test पास की तुम्हे IIT मिली, मुझे Army   तुमने डिग्री हांसिल की, मेने कठोर प्रशिक्षण,   तुम्हारा दिन सुबह 7 से शुरू होकर शाम…

FORENSICS TUTORIAL-1

Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines and faces similar issues. Although…

FORENSICS BRUNCH 0

Some Important resources might helpful. Forensics week Update 1 : Spot faked photos using digital forensic techniques http://www.popsci.com/use-photo-forensics-to-spot-faked-ima… 2 : Trickbot Malware Now Targets US Banks Researchers with IBM and Flashpoint warn the Trickbot Trojan is growing more… https://t.co/V2w5eI0McF 3 : API Hooking – Evading Traditional Detection with Stealthy New Techniques https://www.infosecurity-magazine.com/…/api-hooking-evadin…/ 4 : Drone…

FORENSICS AS CAREER

Without a doubt, technology is advancing at an increasingly rapid pace. It’s all about today’s Digital Security and increasing Cyber-Crime information. If you want to play a role in fighting these cyber crimes, then you’ll want to know how to become a digital forensic examiner. Sharp knowledge and Computer soundness may lead you ahead and…

FORENSICS FRAMEWORKS/MODELS

First thanks to all respected readers. Trying to amalgamate almost models framework of forensics by this article. Welcoming your views and comments. Well, Forensics “The application of scientific knowledge to legal problems“ So, What is Forensics (4n6) : Answer The aim of this article is to establish a clear guideline of what steps should be…

GURUGRAM POLICE CYBER INTERN: 2017

Gurugram Police (India’s Law Enforcement Agencies) Summer Internship 2017 delivered Session on C3: Cyber, Cyber Forensics, Cyber Warfare. Special Thanks to all Gurugram Police (Law enforcement), cyber ninjas and Rakhsit Tandon Sir. Appreciated by  Sandeep Khirwar (Commissioner of Gurugram Police) Sharing one module: C3 Cyber Slide Presentation Might Helpful: 21st Century Cyber Forensics  BE SMART & CREATIVE IN CYBER…