Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

Category: Threat Intelligence

  • Home
  • Threat Intelligence
General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023

Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this

Read More
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022

Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to

Read More
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022

The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a

Read More
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022

Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog

Read More
battle black board board game
Threat Intelligence

Cyber Threat Intelligence. Is it for me?

August 12, 2018August 23, 2022

Readers! I have been working as a Cyber Threat intelligence area from quite a long time and today I want to talk about a question

Read More
Information Gathering OSINT Threat Intelligence

Gathering Information about targets

June 30, 2018April 23, 2022

Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely

Read More
Threat Hunting Threat Intelligence

Profiling the adversary : Target Determination

July 1, 2017April 15, 2018

Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their

Read More
Threat Intelligence

SANS FOR578 Cyber Threat Intelligence – Course Review

December 16, 2016April 23, 2022

Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one

Read More
Fraud & Fin Crime Malware Analysis Threat Intelligence

Evoltin POS Malware – Kill Chain Mind Map

November 14, 2016April 23, 2022

Readers!!! Its been quite a while I have updated my blog posts, due to me spending  some quality time off the work and being with

Read More
OSINT Threat Intelligence

CIF – Feodotracker threat feeds

June 14, 2016April 23, 2022

Good Day guys!!!!!. Was able to write another yml script to collect feeds from Feodotracker and has been uploaded on my github account and also

Read More

Posts navigation

1 2 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...