Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

General Tips Threat Intelligence

Essential Intel: Using CTI to Map the Essential Eight Against CL0P Ransomware

August 21, 2023August 22, 2023
General Tips Phishing Threat Intelligence

Into the world of Phishing-as-a-Service Providers operating on Telegram targeting Australia

July 30, 2023July 30, 2023
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2023 – January to July 2023 – A Look into Cybersecurity’s Persistent Nemesis

July 22, 2023July 23, 2023
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022
General Tips Phishing Threat Intelligence

Into the world of Phishing-as-a-Service Providers operating on Telegram targeting Australia

July 30, 2023July 30, 2023

Welcome to the fascinating world of phishing as a service (PaaS) provider ecosystem in Australia, where cybercriminals have turned their malicious activities into a profitable

Read More
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2023 – January to July 2023 – A Look into Cybersecurity’s Persistent Nemesis

July 22, 2023July 23, 2023

Good day to my esteemed readers. I trust everyone is well and maintaining a vigilant stance in light of recent noteworthy cyber events, particularly the

Read More
General Tips Threat Intelligence

Essential Intel: Using CTI to Map the Essential Eight Against CL0P Ransomware

August 21, 2023August 22, 2023

The Essential Eight represents fundamental cybersecurity strategies every organization should implement to reduce attack surfaces and strengthen defences. However, organisations often struggle with prioritising which

Read More
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023

Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this

Read More
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022

Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to

Read More
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022

The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a

Read More
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022

Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog

Read More
close up shot of dollar bills
Fraud & Fin Crime

Marketplace Update #1 – An Australian logs based Fraud Store

February 27, 2021August 23, 2022

Readers! Its been almost a year so apologies for not being proactive. Will now try and publish at-least once a week. Recently, I came across

Read More
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022

Our research team has identified a campaign in wild serving Formbook stealer. Based on the email content and sender it seems targeted towards UK. Below

Read More
Malware Analysis

Gozi ISFB RM3 and Me : A Diamond Model Approach

September 29, 2019August 23, 2022

Readers! Few weeks back I was invited to present at Malware and Reverse Engineering conference (MRE) and topic I chose to present is my understanding

Read More

Posts navigation

1 2 … 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (14) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (9) Ransomware (5) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (16) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...