Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Category: Threat Hunting

  • Home
  • Threat Hunting
Threat Hunting Threat Intelligence

Profiling the adversary : Target Determination

July 1, 2017April 15, 2018

Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their

Read More
Forensics Threat Hunting

Finding Evidence of Data Exfil – USBStor artefacts

February 4, 2017April 23, 2022

Readers! Last year one of the member on SANS DFIR posted a question with regards to identifying whether there was any data leakage occurred in

Read More
Threat Hunting

Threat Hunting and Pyramid of Pain

August 15, 2016April 23, 2022

The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting

Read More
Threat Hunting

Hunting as an SOC analyst

September 12, 2015April 23, 2022

Been security analyst in SOC for more than 3 years. Besides waiting for the alerts triggering from the device such as IPS or end point protection,

Read More

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...