Readers! I have been working as a Cyber Threat intelligence area from quite a long time and today I want to talk about a question
Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely
Readers! As mentioned on my recent LinkedIn update, this is the first blog article in this series about what our adversaries do and from their
Recently, organizations are being targeted with new ransomware labelled as WanaCry. Being curious, I downloaded the sample to understand how the malware actually behaved. The
Readers! From last couple of weeks I have been doing some analysing of malware. Mostly, are via phishing attempts. What our adversaries are doing is
Readers! Last year one of the member on SANS DFIR posted a question with regards to identifying whether there was any data leakage occurred in
Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon
Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one
Readers!!! Its been quite a while I have updated my blog posts, due to me spending some quality time off the work and being with
Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions