Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Author: fl0x2208

Just a common human being - want to share my knowledge and experience
  • Home
  • fl0x2208
  • Page 5
Phishing Threat Intelligence

Westpac Spam and an approach to STIX language

November 4, 2015April 23, 2022

In my previous post regarding Westpac phishing mail, I mentioned associated domain and IP address. Recently, I am diving into the threat intelligence and especially

Read More
Fraud & Fin Crime Phishing

Westpac spam email – You have new notification

October 13, 2015April 23, 2022

Malicious or spam emails are frequent but one of the best ways to get a system/host infected. Recently I received an email from one of

Read More
Fraud & Fin Crime Phishing

An email from UN – attachment ATM_CARD_1.doc – IRREVOCABLE PAYMENT ORDER VIA ATM CARD

October 1, 2015April 23, 2022

Received an email from UN@ – no email domain on the sender list and that’s why my email identified as spam. Attachment was a doc

Read More
General Tips

Ubuntu – Security Onion Networking issue

October 1, 2015April 23, 2022

Been using Security Onion for a while now. A very good OS for analysis and getting IDS alerts on the go without installing expensive hardware.

Read More
Malware Analysis Phishing

NDISPlan phishing/malware email

September 24, 2015April 23, 2022

Based on my previous blog entry about emails I have analysed an email that was received from *@ndis.gov.au. From the email it seems that you

Read More
General Tips Phishing

Emails – The good, The bad and The ugly side

September 24, 2015April 23, 2022

Emails – as we know is a very efficient way to communicate without physically visiting the intended recipients. Emails have been with us from many years

Read More
Threat Hunting

Hunting as an SOC analyst

September 12, 2015April 23, 2022

Been security analyst in SOC for more than 3 years. Besides waiting for the alerts triggering from the device such as IPS or end point protection,

Read More

Posts navigation

Previous 1 … 4 5

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...