Security Infographics Copy [Thomas Roccia]

DevSecOps
3 min readMay 28, 2024

--

Just copy of https://blog.securitybreak.io/security-infographics-9c4d3bd891ef#18dd

Summary

Attribution Model for Influence Operations

Hermetic Wiper Malware

Anatomy of a Sigma Rule

Practical Threat Intelligence

Windows Privileges

Source:

Log Parsing Cheat Sheet

Supply Chain Attack

Source:

Anatomy of a YARA rule

Sources:

Linux Kernel Security Best Practices

Sources:

Diamond Model

Source : https://apps.dtic.mil/dtic/tr/fulltext/u2/a586960.pdf

Mitre ATT&CK Matrix

Source : https://attack.mitre.org

Tactics, Techniques and Procedures

RDP Security Best Practices

Sandbox Best Practices

If you like this content you can follow me.

--

--