FILELESS MALWARE ATTACKS : INTRO

FILELESS MALWARE ATTACKS Unlike attacks carried out using traditional malware, fileless malware attacks don’t entail attackers installing software on a victim’s machine. This means that there’s NO signature for antivirus software to detect, greatly decreasing the effectiveness of these programs in detecting fileless malware attacks. And these attacks are almost 10 times more likely to…

Cyber Threat Intelligence Platforms (TIPs)

ENISA has released the first comprehensive study on Cyber Threat Intelligence Platforms (TIPs) focused on the needs of TIP users, developers, vendors, and the security research community. So lets brief, what is Threat intelligence platform : Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real…

FORENSICS BRUNCH 2

Without a doubt, technology is advancing at an increasingly rapid pace. It’s all about today’s Digital Security and increasing Cyber-Crime information. If you want to play a role in fighting these cybercrime threats, then you’ll want to know how to become a digital forensic examiner. Sharp knowledge and Computer soundness may lead you ahead and…

EQUIFAX DATA BREACH

Equifax Hackers Demanding $2.6 Mln in Bitcoin, Or Else Expose 143 million Americans Private Info Equifax data breach may affect nearly half the US population. Three Equifax execs sold $1.8 million of stock days after breach discovery. But before it was made public. Equifax Inc. is a consumer credit reporting agency in the United States,…

OIL & GAS ENERGY INDUSTRIES: CYBER THREATS

Cyber Domain “Fifth Domain of Warfare” 🌍 Cyber-attacks on the energy sector, and on oil and gas facilities, have increased in the past five years along with the associated costs. The scale and severity of attacks on industrial cyber systems are growing. For the oil and gas sector – like other sectors – it continues…

FORENSICS BRUNCH 1

Greetings : Sharing some resources 1: Digital Forensic Challenge Images (Datasets) https://www.ashemery.com/dfir.html 2: Hidden Networks: Detecting Hidden Networks created with USB Devices https://drive.google.com/drive/folders/0ByczHyAbM7lDLVlfRGhDWHJadzA?usp=sharing 3: Gordon Fraser’s paper, which walks through the IR process after an attack on “A fictitious organization, Winterfell” #SANS https://www.sans.org/reading-room/whitepapers/incident/practical-incident-response-network-based-attack-37920 4: Six Skills Required For A Career In Digital Forensics https://www.forbes.com/sites/laurencebradford/2017/04/29/6-skills-required-for-a-career-in-digital-forensics/#65e5deb87fa6 5:…

एक सैनिक की जुबानी : ARMY

एक सैनिक की जुबानी Sabse pahle mera desh, Sharing one OT post. #Jai_Hind हम दोनों ने 18 की उम्र में घर छोड़ा, तुमने JEE पास की मेने Army के लिए Test पास की तुम्हे IIT मिली, मुझे Army   तुमने डिग्री हांसिल की, मेने कठोर प्रशिक्षण,   तुम्हारा दिन सुबह 7 से शुरू होकर शाम…

FORENSICS TUTORIAL-1

Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines and faces similar issues. Although…

FORENSICS BRUNCH 0

Some Important resources might helpful. Forensics week Update 1 : Spot faked photos using digital forensic techniques http://www.popsci.com/use-photo-forensics-to-spot-faked-ima… 2 : Trickbot Malware Now Targets US Banks Researchers with IBM and Flashpoint warn the Trickbot Trojan is growing more… https://t.co/V2w5eI0McF 3 : API Hooking – Evading Traditional Detection with Stealthy New Techniques https://www.infosecurity-magazine.com/…/api-hooking-evadin…/ 4 : Drone…