J3bitokjebitok.hashnode.dev·Nov 14, 2024Cyber Defence Frameworks: MITRE (TryHackMe)In this article, I will write an MITRE write-up: The Basics that covers Introduction to MITRE, Basic Terminology, ATT&CK Framework, CAR Knowledge Base, MITRE Engage, MITRE D3FEND, ATT&CK Emulation Plans, and ATT&CK and Threat Intelligence. Besides B...Discussmitre-attack
Dru BanksProbluecordsecurity.io·Oct 26, 2024KC7 Case: A Rap BeefTwo hip-hop artists are caught in a musical feud that extends into cyberspace. One artist's oversharing in his lyrics makes him a target, leading the rival label to hire a hacker to exploit vulnerabilities. As a security analyst for OWL Records, your...Discussthreat intelligence
Atharv Patilatharvpatil.hashnode.dev·Aug 26, 2024Insider Threat Detection Using Behavioral AnalysisIn the age of rapid digital transformation, cybersecurity challenges have grown more complex, and among them, insider threats remain one of the most perplexing. While most organizations focus on external attacks, such as hackers or phishing schemes, ...Discuss·78 readsbehavior
raja manisynackwithraj.hashnode.dev·Aug 14, 2024Learn Like a Baby - hunting for OnPrem to Cloud movement by Credential Access - Azure CLI - 5The Act. Earlier in the series we discussed phishing for initial access now the attacker has to move laterally go to cloud. We will discuss a credential access technique of stealing refresh token of a local users Azure CLI which is given for the scop...Discuss·83 readsCloud Attacks - Azurecredential access
raja manisynackwithraj.hashnode.dev·Aug 13, 2024Learn like a baby - Vendor Agnostic Hunting approaches for modern authentication abuse using AITM - 3In this blog we have structured this into three parts The Act, The Analysis and The Detection and go through each part in very simplistic way to understand and approach them. The Act talks about Modern authentication abuse using AITM The Analysis t...Discuss·95 readsCloud Attacks - AzureAitm
Cyrill GremaudforDina - Technical Security Blogsecurity.dina.ch·Jun 27, 2022Microsoft Defender for Endpoint - Threat Hunting Cheat SheetLes personnes utilisant la solution Microsoft Defender for Endpoint bénéficient d'un module dédié à la recherche de menace très performant, Advanced Hunting. Threat Hunting - Kesako ? Le Threat Hunting est une technique qui consiste à rechercher proa...Discuss·101 readsVulnerabilitythreat