Not every protection is detection based, it can also be prevention by configuring your network to standards. This blog series (MITRE Hunting) will focus on each MITRE technique and tactics, its detection/prevention process. MITRE Technique ID: T1190 Reference: Exploit Public-Facing Application, Technique T1190 - Enterprise | MITRE ATT&CK® The next in line, is adversaries' attempt to … Continue reading MITRE Hunting – Initial Access: Exploit Public-Facing Application
MITRE Hunting – Initial Access: Drive-by Compromise
Not every protection is detection based, it can also be prevention by configuring your network to standards. This blog series (MITRE Hunting) will focus on each MITRE technique and tactics, its detection/prevention process. MITRE Technique ID: T1189 Reference: Drive-by Compromise, Technique T1189 - Enterprise | MITRE ATT&CK® Initial Access consists of techniques that use various entry … Continue reading MITRE Hunting – Initial Access: Drive-by Compromise
Still using Facebook? Beware of these signs!
Cybercriminals are a forward thinkers, they are always devising new ways to defraud unsuspecting social media users. Most fraudsters try to obtain your account login credentials, personally identifying information, or bank and credit card information etc. And that right there is a red flag. Photo by Fernando Arcos on Pexels.com The majority of phishing scams … Continue reading Still using Facebook? Beware of these signs!
Instagram Phishing Scam
Social Media, it could very well be hell on Earth for the latest generation. Then again, its all about perspective, isn't it. This generation is all caught up on how society views them based on their social media status, they are entirely blind to the consequences and repercussions that comes along with it I am … Continue reading Instagram Phishing Scam
Social Media – Cyber Security Awareness
A book for the public - to all the non IT folks out there. Have a good read! If you are using social media on a daily basis, this is a good read for you. The signs to watch out for! Spend few mins - its free! Buy Now
Choosing a good password
Key to a safe life is a strong password
Microsoft Defender — Detect Hidden Windows Runs
A Usecase Series — Threat Hunting
Azure Sentinel — Simultaneous Logins on a Host
A UseCase Series
Two factor Authentication – which type?
Which two-step authentication has better security, a text message or an authenticator app?Answer: Both has its pros & cons. SMS: * Its convenient * Doesn't require a smartphone * Doesn't need any setup * Last of all, its a good "teller" when some one is trying to break in to your account. However, it can … Continue reading Two factor Authentication – which type?
Common cyber security threat
What is the biggest cyber security threat to your business?Answer: There are many, however my thought always goes to "Phishing" Offenders are never going to stop finding any loophole that they would want to exploit. Because to them, every small piece of information they could find is a treasure in hand. No matter how many … Continue reading Common cyber security threat