JoeInfoSecWhat is a Cyber Kill Chain?The cyber kill chain is essentially a cybersecurity model created by Lockheed Martin that traces the stages of a cyber-attack, identifies…4 min read·Feb 27, 2022----
JoeInfoSecThe cyber kill chain is a series of steps that trace stages of a cyberattack from the early…How the Cyber Kill Chain Works4 min read·Feb 27, 2022----
JoeInfoSecMalicious PowerShell Commandletstitle: Malicious PowerShell Commandlets2 min read·Jun 28, 2020----
JoeInfoSecList of PowerShell commands and commandlets that should be in your Powershell watchlist.add-exfiltration2 min read·Jun 24, 2020----
JoeInfoSecSuspicious Shell commands in linux — Sigma Rule — convert it to your SIEM language— — — — — — — — — — — — — — — — — — — —2 min read·May 11, 2020----
JoeInfoSecA Few words about Intrusion DetectionPrevention is ideal, but detection is a must; however, detection without response has minimal value.3 min read·May 10, 2020----
JoeInfoSecToday, three email technologies will be explained that can be used to secure mail and protect…However, each one is very important so I’m going to divide into two posts. Also, how an attacker can leverage them to attack users and aid…1 min read·May 4, 2020----