Search Results for: malware
3 Group-IB Tools You Should Try
Introduction Dive into the world of cybersecurity with free Group-IB tools designed to fortify your email, network, and cloud defenses. Stay ahead with Group-IB’s updates [more…]
Hunting With URLscan: Part 1
Today, we’re going to focus on using URLscan.io, a powerful tool to hunt for phishing attacks. This guide will help you understand the process better [more…]
YARA Rules 101: Quickly craft YARA rules
YARA is like a Swiss Army knife for cybersecurity. It’s a powerful tool used for malware detection and classification. This allows cyber defenders to identify, [more…]
How to Create Tags in MISP
In the Malware Information Sharing Platform (MISP), tags are a pivotal feature that allows for easier categorization and identification of events, attributes, and even other [more…]
Getting MISP Back on Track: When It’s Unable to Fetch Feeds
MISP, or Malware Information Sharing Platform, is an essential cybersecurity tool. However, users sometimes face a situation where MISP cannot fetch feeds, creating a gap [more…]
Quick Fix for MISP: When It Stops Updating Events
The MISP (Malware Information Sharing Platform) is a top-tier tool for threat intelligence. However, users might sometimes experience a situation where it stops updating events [more…]
OT vs IT: Decoding the Differences
Operational Technology (OT) and Information Technology (IT) – you’ve probably heard these terms thrown around. But what do they really mean? And, more importantly, what’s [more…]
Create YARA rule
The YARA Signature Generator is a powerful tool designed to simplify the process of creating YARA signatures for malware detection. Benefits String Management: The tool [more…]
Responding to Azure Account Breaches
Cybersecurity incidents, particularly breaches of cloud services like Microsoft Azure, can cause significant disruption and financial impact for businesses. This article provides a step-by-step guide [more…]
Understanding LockBit 3.0 Ransomware Threat
LockBit 3.0, aka “LockBit Black,” has been causing waves in the cyber world as a new and sophisticated iteration of the notorious LockBit ransomware. Sharing [more…]