What is a Cyber Kill Chain?The cyber kill chain is essentially a cybersecurity model created by Lockheed Martin that traces the stages of a cyber-attack, identifies…Feb 27, 2022Feb 27, 2022
The cyber kill chain is a series of steps that trace stages of a cyberattack from the early…How the Cyber Kill Chain WorksFeb 27, 2022Feb 27, 2022
List of PowerShell commands and commandlets that should be in your Powershell watchlist.add-exfiltrationJun 24, 2020Jun 24, 2020
Suspicious Shell commands in linux — Sigma Rule — convert it to your SIEM language— — — — — — — — — — — — — — — — — — — —May 11, 2020May 11, 2020
A Few words about Intrusion DetectionPrevention is ideal, but detection is a must; however, detection without response has minimal value.May 10, 2020May 10, 2020
Today, three email technologies will be explained that can be used to secure mail and protect…However, each one is very important so I’m going to divide into two posts. Also, how an attacker can leverage them to attack users and aid…May 4, 2020May 4, 2020