Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022
close up shot of dollar bills
Fraud & Fin Crime

Marketplace Update #1 – An Australian logs based Fraud Store

February 27, 2021August 23, 2022
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022
Penetration Testing

Penetration Testing and Rules of engagement

September 3, 2016April 23, 2022

Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am

Read More
Ransomware

Ransomware extensions and filenames

September 2, 2016April 23, 2022

As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and

Read More
Threat Hunting

Threat Hunting and Pyramid of Pain

August 15, 2016April 23, 2022

The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting

Read More

Phishing SMS – A failed attempt

August 9, 2016April 23, 2022

Just about an hour ago I received an text from one of my mentors. Excited, I read but I know him very well and knew

Read More
Hunting Package Malware Analysis

YARA rule for Dridex

August 2, 2016April 23, 2022

Have been learning YARA from few days and below is my first YARA rule for a IOCs collected while analysing a word document. Analysis concluded

Read More
Hunting Package

List of IOCs collected so far

July 15, 2016April 23, 2022

Hunters, This post is to share indicators of compromise that I collected so far for analysis and investigation that I have been doing. Most of

Read More
Malware Analysis Phishing

A javascript file – Invoice from UK

June 23, 2016April 23, 2022

It’s been quite a while I was able to analyse my spam emails. Recently, I received an email with a zip attachment claiming to be

Read More
General Tips

The Vendor, The MSSPs and The Consultant

June 16, 2016August 23, 2022

I have been waiting for quite a while to write something about my experience with vendors, MSSPs and consultants. This is my own opinion and

Read More
Hunting Package Ransomware

CIF – Ransomware Tracker abuse.ch feeds

June 15, 2016April 23, 2022

Good Day guys!!!!!. Just finished another yml script to collect feeds from abuse.ch for Ransomware (ransomware tracker) and has been uploaded on my github account.

Read More
OSINT Threat Intelligence

CIF – Feodotracker threat feeds

June 14, 2016April 23, 2022

Good Day guys!!!!!. Was able to write another yml script to collect feeds from Feodotracker and has been uploaded on my github account and also

Read More

Posts navigation

Previous 1 2 3 4 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...