Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Month: August 2016

  • Home
  • 2016
  • August
Threat Hunting

Threat Hunting and Pyramid of Pain

August 15, 2016April 23, 2022

The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting

Read More

Phishing SMS – A failed attempt

August 9, 2016April 23, 2022

Just about an hour ago I received an text from one of my mentors. Excited, I read but I know him very well and knew

Read More
Hunting Package Malware Analysis

YARA rule for Dridex

August 2, 2016April 23, 2022

Have been learning YARA from few days and below is my first YARA rule for a IOCs collected while analysing a word document. Analysis concluded

Read More

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...