Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am
Author: fl0x2208
As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and
The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting
Just about an hour ago I received an text from one of my mentors. Excited, I read but I know him very well and knew
Have been learning YARA from few days and below is my first YARA rule for a IOCs collected while analysing a word document. Analysis concluded
Hunters, This post is to share indicators of compromise that I collected so far for analysis and investigation that I have been doing. Most of
It’s been quite a while I was able to analyse my spam emails. Recently, I received an email with a zip attachment claiming to be
I have been waiting for quite a while to write something about my experience with vendors, MSSPs and consultants. This is my own opinion and
Good Day guys!!!!!. Just finished another yml script to collect feeds from abuse.ch for Ransomware (ransomware tracker) and has been uploaded on my github account.
Good Day guys!!!!!. Was able to write another yml script to collect feeds from Feodotracker and has been uploaded on my github account and also