The Essential Eight represents fundamental cybersecurity strategies every organization should implement to reduce attack surfaces and strengthen defences. However, organisations often struggle with prioritising which
Category: Threat Intelligence

Welcome to the fascinating world of phishing as a service (PaaS) provider ecosystem in Australia, where cybercriminals have turned their malicious activities into a profitable

Good day to my esteemed readers. I trust everyone is well and maintaining a vigilant stance in light of recent noteworthy cyber events, particularly the

Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this

Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to

The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a

Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog

Readers! I have been working as a Cyber Threat intelligence area from quite a long time and today I want to talk about a question
Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely
Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their