Jiyajiyajha.hashnode.dev·Mar 28, 2024Fortifying Our Foundations: Charting the Path in Critical Infrastructure ProtectionThe process of preventing, reducing, or fixing the risks of vulnerabilities in critical infrastructure assets is known as critical infrastructure protection or CIP.Critical infrastructure is shielded by CIP from terrorist threats, natural disasters, ...Discuss #CriticalInfrastructureProtection
Niranjan Gblog.securityinsights.io·Feb 11, 2024Protect Your AWS Accounts: Intelligent Threat Detection with GuardDutyUnveiling the Shield: GuardDuty for Enhanced AWS Security In the ever-evolving landscape of cloud security, threats lurk around every corner. But fear not, for Amazon Web Services (AWS) offers a powerful tool to combat them: GuardDuty. This intellig...Discussaws guardduty
Sumit Mondalsumit007.hashnode.dev·Feb 10, 2024Unlocking Security with Amazon GuardDuty: A Beginner's GuideIntroduction: In the ever-evolving landscape of cloud computing, ensuring the security of your AWS (Amazon Web Services) environment is paramount. With the rise of cyber threats, having a robust security strategy is crucial. Amazon GuardDuty, a manag...DiscussAWS - HandsOnAWS
Adrianajcyb3r.com·Feb 6, 2024Journey through Cybersecurity: Malware based on system components?I have no idea why, but sometimes acronyms in English are so interesting to me that they draw me deeper... In the previous post, I summarized my Windows Security review, mainly focusing on learning and reviewing PowerShell... and a few others. In the...Discuss#cybersecurity
Goodycybgoodycyb.hashnode.dev·Feb 4, 2024Threat detection🕵️♂️ in AWS using Amazon Athena ServiceI recommend starting with the article below before beginning the Hands-on lab.😉🕵️♂️ https://medium.com/@goodycyb/threat-detection-in-aws-using-amazon-athena-to-analyze-cloudtrail-logs-from-flaws-cloud-00a43348d18a Objective In this lab, you wil...Discuss·158 readsThreat Detection 💡🕵️♂️🕸️ThreatDetection
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...Discuss·36 readsObfuscated Code
Eric Clamptoneclampton0033.hashnode.dev·Jan 11, 2024Mastering Cybersecurity: A Practical Approach to Safeguarding Your Online PresenceIntroduction: In today's interconnected world, where digital technologies permeate every aspect of our lives, the importance of cybersecurity cannot be overstated. From personal data and financial transactions to critical infrastructure, the digital ...Discussdata encryption
Goodycybgoodycyb.hashnode.dev·Aug 30, 2023Lab 5: Building an Automated DetectionLab Objective View the Lambda function that will handle the event Create an AWS EventBridge rule to capture CloudTrail data events involving your password-backup honey file and trigger a Lambda function called HoneyFileDetection Perform T1530 (Dat...Discuss·47 readsAWS
abel sekibaalaabelsekibaala.hashnode.dev·Jun 25, 2023Incident Response and Threat Hunting with Redline:Power of Live Memory Analysis Part 1Introduction In today's cybersecurity landscape, it's crucial to have effective tools and techniques to identify and respond to security incidents swiftly. Redline, a powerful open-source tool developed by FireEye, is designed to assist in incident r...Discuss·10 likes·28 readsincident response
Pankaj Singhpankaj007.hashnode.dev·Mar 24, 2023How machine learning algorithms can help in early threat detectionIntroduction Machine learning algorithms have the potential to revolutionize the field of threat detection by providing a powerful tool for the early detection of potential threats. Traditional threat detection techniques often rely on rule-based sys...DiscussThreatDetection