Tag: threat hunting
Yellow Liderc: Iran-Based Threat Actor’s New Malware Sample IMAPLoader Raises the Bar in Cyber Espionage
Escalating Cyber Threats from Yellow Liderc PwC’s recent analysis reveals an evolved cyber threat landscape where Yellow Liderc, an Iran-based threat actor, is heightening its [more…]
Operation Triangulation: The Stealthy iOS Attack Kaspersky Couldn’t Ignore
A Chilling Discovery: Kaspersky’s Internal Alert In a startling revelation, cybersecurity giant Kaspersky reported an internal alert in early 2023. Their Security Information and Event [more…]
Mastering VirusTotal Intelligence: A Comprehensive Guide to VTI Cheat Sheet
How often have you found yourself lost in the maze of features and options that VirusTotal Intelligence (VTI) offers? If you’re reading this, chances are [more…]
Critical Windows Event IDs for Cybersecurity Pros
Hello, Cyberwarriors! As we know, the path to cybersecurity enlightenment is paved with event logs. These tiny nuggets of data are like clues in a [more…]
Security Event IDs for Threat Hunters
Join us as we unravel the secrets of threat hunting, diving deep into various event IDs that expose hidden risks and potential cyber threats. From [more…]
Event 4713: The Shift in Kerberos Policy
Greetings, fellow cybersecurity enthusiasts! In today’s cyber adventure, we’re shining a spotlight on Event 4713 – a Kerberos policy change. Grab your digital detective hats, [more…]
Audit Log Wipe: Understanding Event 1102
Hello, cyber guardians! Today, we’re exploring Event 1102. If you’re thinking that’s just another number in a sea of events, think again. This event signals [more…]
OCSP Responder Service: A Security Update Has Occurred
Hello, cyber guardians! Today, we’re zooming in on an event that doesn’t always get the spotlight but is very crucial: a security setting update on [more…]
Role Separation: The Power of Partitioning
Hey there, cyber guardians! In our quest to keep the digital world safe, we’ve tackled many topics. Today, let’s dive into the concept of “Role [more…]
System Audit Policy: Change Alert!
Hello, cybersecurity champions! Today we’re cracking open the case of a “System Audit Policy Change”. Sounds serious, right? But don’t worry, we’ve got your back. [more…]