Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022
close up shot of dollar bills
Fraud & Fin Crime

Marketplace Update #1 – An Australian logs based Fraud Store

February 27, 2021August 23, 2022
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022
OSINT Threat Intelligence

CIF – cleanmx threat feeds

June 3, 2016April 23, 2022

Good Day today indeed. Have finally got some time to work on my skills for CIF and writing configuration (YAML scripts) to fetch open source

Read More
General Tips Threat Intelligence

CIF – Collective Intelligence Framework – My deployment

June 1, 2016April 23, 2022

Morning Everybody!!!! Been working on crafting my skills in Threat Intelligence and available open source system. As the title says I have been working on

Read More
General Tips Malware Analysis

Malware Analysis – Mind Map

May 30, 2016April 23, 2022

Its been long time have updated my blog. Just busy @work and with family and trying to juggle a lot. Have been working a mind

Read More
Malware Analysis

Dridex malware dropper -New doc 115.doc

March 1, 2016April 23, 2022

On a pleasant morning I received an email with an doc attachment. The email was not having any text or message. Subject was name of

Read More
Fraud & Fin Crime Phishing

Ho Ho Ho – Here comes the spam/phish

January 17, 2016April 23, 2022

Merry Christmas and Happy New Year to all ! I thought to start the new year with a blog with regards to spam from Australian

Read More
Exploitation Vulnerability assessment

Heap Spray attempts : Compromised site http://www.efendim.net

December 20, 2015April 23, 2022

On a Saturday evening I spent some time in upgrading my MacBook Pro with an SSD. The only SSD I had was having security Onion

Read More
Information Gathering OSINT

Information Gathering – Then, Now and Why ?

November 28, 2015April 23, 2022

Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several

Read More
General Tips

Installing/running TOR on Linux distros

November 14, 2015April 23, 2022

TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box

Read More
Phishing

A interesting email – FROM field empty

November 6, 2015April 23, 2022

Received a interesting email yesterday from Mr. Gordon Hills from London who wanted me to be partner and 5 Million dollars will be released to

Read More
General Tips Information Gathering

Comand line use to check IP reputation

November 6, 2015April 23, 2022

Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and

Read More

Posts navigation

Previous 1 … 3 4 5 Next

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...