JoeInfoSecWhat is a Cyber Kill Chain?The cyber kill chain is essentially a cybersecurity model created by Lockheed Martin that traces the stages of a cyber-attack, identifies…Feb 27, 2022Feb 27, 2022
JoeInfoSecThe cyber kill chain is a series of steps that trace stages of a cyberattack from the early…How the Cyber Kill Chain WorksFeb 27, 2022Feb 27, 2022
JoeInfoSecMalicious PowerShell Commandletstitle: Malicious PowerShell CommandletsJun 28, 2020Jun 28, 2020
JoeInfoSecList of PowerShell commands and commandlets that should be in your Powershell watchlist.add-exfiltrationJun 24, 2020Jun 24, 2020
JoeInfoSecSuspicious Shell commands in linux — Sigma Rule — convert it to your SIEM language— — — — — — — — — — — — — — — — — — — —May 11, 2020May 11, 2020
JoeInfoSecA Few words about Intrusion DetectionPrevention is ideal, but detection is a must; however, detection without response has minimal value.May 10, 2020May 10, 2020
JoeInfoSecToday, three email technologies will be explained that can be used to secure mail and protect…However, each one is very important so I’m going to divide into two posts. Also, how an attacker can leverage them to attack users and aid…May 4, 2020May 4, 2020