Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this
Category: Threat Intelligence

Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to

The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a

Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog

Readers! I have been working as a Cyber Threat intelligence area from quite a long time and today I want to talk about a question
Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely
Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their
Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one
Readers!!! Its been quite a while I have updated my blog posts, due to me spending some quality time off the work and being with
Good Day guys!!!!!. Was able to write another yml script to collect feeds from Feodotracker and has been uploaded on my github account and also