Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022
close up shot of dollar bills
Fraud & Fin Crime

Marketplace Update #1 – An Australian logs based Fraud Store

February 27, 2021August 23, 2022
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023

Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this

Read More
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022

Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to

Read More
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022

The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a

Read More
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022

Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog

Read More
close up shot of dollar bills
Fraud & Fin Crime

Marketplace Update #1 – An Australian logs based Fraud Store

February 27, 2021August 23, 2022

Readers! Its been almost a year so apologies for not being proactive. Will now try and publish at-least once a week. Recently, I came across

Read More
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022

Our research team has identified a campaign in wild serving Formbook stealer. Based on the email content and sender it seems targeted towards UK. Below

Read More
Malware Analysis

Gozi ISFB RM3 and Me : A Diamond Model Approach

September 29, 2019August 23, 2022

Readers! Few weeks back I was invited to present at Malware and Reverse Engineering conference (MRE) and topic I chose to present is my understanding

Read More
battle black board board game
Threat Intelligence

Cyber Threat Intelligence. Is it for me?

August 12, 2018August 23, 2022

Readers! I have been working as a Cyber Threat intelligence area from quite a long time and today I want to talk about a question

Read More
Information Gathering OSINT Threat Intelligence

Gathering Information about targets

June 30, 2018April 23, 2022

Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely

Read More
Threat Hunting Threat Intelligence

Profiling the adversary : Target Determination

July 1, 2017April 15, 2018

Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their

Read More

Posts navigation

1 2 … 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...