Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this

Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to

The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a

Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog

Readers! Its been almost a year so apologies for not being proactive. Will now try and publish at-least once a week. Recently, I came across

Our research team has identified a campaign in wild serving Formbook stealer. Based on the email content and sender it seems targeted towards UK. Below

Readers! Few weeks back I was invited to present at Malware and Reverse Engineering conference (MRE) and topic I chose to present is my understanding

Readers! I have been working as a Cyber Threat intelligence area from quite a long time and today I want to talk about a question
Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely
Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their