Skip to content
Blog by Third Eye intelligence

Blog by Third Eye intelligence

Information that was not there yesterday and will be obselete tomorrow

General Tips Ransomware Threat Intelligence

Australian Ransomware Threat Landscape 2022

January 3, 2023January 4, 2023
guy fawkes mask and red flower on hand
Threat Intelligence

Actor types

July 23, 2022August 23, 2022
people reading books in library
Threat Intelligence

Post #2 Intelligence Life Cycle – Collection

April 30, 2022August 23, 2022
arranged paper clips around an eraser
Threat Intelligence

Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements

January 8, 2022August 23, 2022
close up shot of dollar bills
Fraud & Fin Crime

Marketplace Update #1 – An Australian logs based Fraud Store

February 27, 2021August 23, 2022
Malware Analysis

Fake New Order on Hold serving Formbook Stealer

April 22, 2020August 23, 2022
Phishing Threat Intelligence

Westpac Spam and an approach to STIX language

November 4, 2015April 23, 2022

In my previous post regarding Westpac phishing mail, I mentioned associated domain and IP address. Recently, I am diving into the threat intelligence and especially

Read More
Fraud & Fin Crime Phishing

Westpac spam email – You have new notification

October 13, 2015April 23, 2022

Malicious or spam emails are frequent but one of the best ways to get a system/host infected. Recently I received an email from one of

Read More
Fraud & Fin Crime Phishing

An email from UN – attachment ATM_CARD_1.doc – IRREVOCABLE PAYMENT ORDER VIA ATM CARD

October 1, 2015April 23, 2022

Received an email from UN@ – no email domain on the sender list and that’s why my email identified as spam. Attachment was a doc

Read More
General Tips

Ubuntu – Security Onion Networking issue

October 1, 2015April 23, 2022

Been using Security Onion for a while now. A very good OS for analysis and getting IDS alerts on the go without installing expensive hardware.

Read More
Malware Analysis Phishing

NDISPlan phishing/malware email

September 24, 2015April 23, 2022

Based on my previous blog entry about emails I have analysed an email that was received from *@ndis.gov.au. From the email it seems that you

Read More
General Tips Phishing

Emails – The good, The bad and The ugly side

September 24, 2015April 23, 2022

Emails – as we know is a very efficient way to communicate without physically visiting the intended recipients. Emails have been with us from many years

Read More
Threat Hunting

Hunting as an SOC analyst

September 12, 2015April 23, 2022

Been security analyst in SOC for more than 3 years. Besides waiting for the alerts triggering from the device such as IPS or end point protection,

Read More

Posts navigation

Previous 1 … 4 5

Exploitation (1) Forensics (4) Fraud & Fin Crime (5) General Tips (11) Hunting Package (3) Incident Response (1) Information Gathering (3) Insider Threat (1) Legitimate tool analysis (1) Malware Analysis (10) OSINT (4) Penetration Testing (1) Phishing (8) Ransomware (4) Threat Actor tool analysis (1) Threat Hunting (4) Threat Intelligence (13) Vulnerability assessment (1)

Third Eye Intelligence 2022. All Rights Reserved.
 

Loading Comments...