Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Year: 2016

  • Home
  • 2016
Forensics General Tips Malware Analysis

Hash Values – A Trivial Artefact

December 27, 2016April 23, 2022

Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon

Read More
Threat Intelligence

SANS FOR578 Cyber Threat Intelligence – Course Review

December 16, 2016April 23, 2022

Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one

Read More
Fraud & Fin Crime Malware Analysis Threat Intelligence

Evoltin POS Malware – Kill Chain Mind Map

November 14, 2016April 23, 2022

Readers!!! Its been quite a while I have updated my blog posts, due to me spending  some quality time off the work and being with

Read More
Forensics General Tips

Forensics – Where to start and What to know

October 3, 2016April 23, 2022

Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions

Read More
Threat Actor tool analysis

Disposable email addresses (DEA) and concerns

September 25, 2016April 23, 2022

Readers This post is about disposable email addresses and where to get them and concerns for organisations or whitehats defending their network/country. Disposable email addresses

Read More
Insider Threat

Battling Insider Threats – Browser in the box

September 9, 2016April 23, 2022

Readers One of the biggest threats for any organisation is Insider Threat. An employee visiting malicious sites, drive-by downloads, uploading documents etc. , in short

Read More
Forensics Incident Response

Incident Response and Forensics – The two towers

September 8, 2016April 23, 2022

Readers Been meaning write something about my experience with Incident response and forensics and how knowledge of both field helped me. Most of the organisations

Read More
Penetration Testing

Penetration Testing and Rules of engagement

September 3, 2016April 23, 2022

Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am

Read More
Ransomware

Ransomware extensions and filenames

September 2, 2016April 23, 2022

As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and

Read More
Threat Hunting

Threat Hunting and Pyramid of Pain

August 15, 2016April 23, 2022

The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting

Read More

Posts navigation

1 2 3 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...