SOC Alert Analysis: APT35 HyperScrape Data Exfiltration Tool Detected
Explore APT35’s HyperScrape detection & defense strategies in our deep dive into combating sophisticated cyber threats with LetsDefend
Explore APT35’s HyperScrape detection & defense strategies in our deep dive into combating sophisticated cyber threats with LetsDefend
Discover insights on combating Remote Code Execution threats and a recent Splunk Enterprise vulnerability.
Explore Nuclei, a top vulnerability scanner enhancing cybersecurity through swift, efficient system checks. Boost security with this open-source powerhouse.
Explore IcedID malware analysis with Wireshark: Uncover risks, hands-on investigation tips, and cybersecurity defenses in this in-depth blog post.
Dive into the world of cybersecurity with our analysis of the FakeGPT Malicious Chrome Extension. Leveraging insights from LetsDefend, I uncover the dangers of this deceptive threat and offer expert strategies for effective defense. Join me for a concise, enlightening exploration.
Introduction Welcome back! Today, we’re diving into a practical case study to examine and comprehend the sinister operations of malware, utilizing the dynamic capabilities of Wireshark. Our focus will be on analyzing the “Email Roulette” traffic analysis exercise from malware-traffic-analysis.net. For those who are keen to participate actively with their own setups, you’re encouraged to …
Read more “Wireshark Investigation: A Comprehensive Exploration of ‘Email Roulette’”
Comprehensive guide on setting up pfSense firewall in VMware. Covers VM specifications, installation steps, and initial firewall configurations. Ideal for cybersecurity pros.
Introduction This series of blog posts will provide an overview of the creation, management, and utilization of a virtual security home lab environment. The home lab at its completion will involve a firewall, a Security Information and Event Management (SIEM) tool, an Intrusion Prevention System (IPS), a Honeypot, network segmentation, malware analysis tools, and more. …
Read more “Virtual Home Lab Foundations for Blue Team Security – An Introduction – Section 1”