Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Year: 2017

  • Home
  • 2017
Threat Hunting Threat Intelligence

Profiling the adversary : Target Determination

July 1, 2017April 15, 2018

Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their

Read More
Malware Analysis Ransomware

Yet another WanaCry Ransomware – Analysis

June 10, 2017April 23, 2022

Recently, organizations are being targeted with new ransomware labelled as WanaCry. Being curious, I downloaded the sample to understand how the malware actually behaved. The

Read More
General Tips Legitimate tool analysis

PowerShell : Tool for Admins and Adversaries

February 19, 2017April 23, 2022

Readers! From last couple of weeks I have been doing some analysing of malware. Mostly, are via phishing attempts. What our adversaries are doing is

Read More
Forensics Threat Hunting

Finding Evidence of Data Exfil – USBStor artefacts

February 4, 2017April 23, 2022

Readers! Last year one of the member on SANS DFIR posted a question with regards to identifying whether there was any data leakage occurred in

Read More

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...