Ah, the life of a content creator—it’s all glam until a DM from ‘Meta Support Team’ threatens to nuke your account. Sound familiar? Welcome to the wild world of phishing scams on steroids. In this article, we’re unpacking the classic scam formula, red flags to spot, and how to laugh it off while staying scam-proof. Because if it quacks like a scam, waddles like a scam... you know the drill.
MITRE Hunting – Initial Access: Exploit Public-Facing Application
Not every protection is detection based, it can also be prevention by configuring your network to standards. This blog series (MITRE Hunting) will focus on each MITRE technique and tactics, its detection/prevention process. MITRE Technique ID: T1190 Reference: Exploit Public-Facing Application, Technique T1190 - Enterprise | MITRE ATT&CK® The next in line, is adversaries' attempt to … Continue reading MITRE Hunting – Initial Access: Exploit Public-Facing Application
MITRE Hunting – Initial Access: Drive-by Compromise
Not every protection is detection based, it can also be prevention by configuring your network to standards. This blog series (MITRE Hunting) will focus on each MITRE technique and tactics, its detection/prevention process. MITRE Technique ID: T1189 Reference: Drive-by Compromise, Technique T1189 - Enterprise | MITRE ATT&CK® Initial Access consists of techniques that use various entry … Continue reading MITRE Hunting – Initial Access: Drive-by Compromise
Microsoft Defender — Detect Hidden Windows Runs
A Usecase Series — Threat Hunting
Azure Sentinel — Simultaneous Logins on a Host
A UseCase Series
