Patrick EssienHey everyone!Cybercriminals are constantly looking for ways to steal personal and financial information, including credit and debit card details. One…Mar 19, 2023Mar 19, 2023
Patrick EssienThe MITRE ATT&CK framework is a comprehensive knowledge base of adversarial tactics and techniques…Techniques: Spearphishing link, PowerShell, Scheduled task, Windows Management Instrumentation, Windows Remote Management, Pass the hash…Jan 22, 2023Jan 22, 2023
Patrick EssienThe Virtually Testing Foundation recently concluded a highly successful four-day hands-on threat…The Mitre Att&ck framework is a globally recognized standard for identifying and analyzing cyber threats. It provides a comprehensive and…Jan 21, 2023Jan 21, 2023
Patrick EssienWizard Spider is a highly sophisticated Advanced Persistent Threat (APT) group that has been active…One of the primary techniques used by Wizard Spider is spear-phishing, which involves the use of targeted emails that contain malicious…Jan 20, 2023Jan 20, 2023
Patrick EssienAtomic Red Team is an open-source project that aims to provide a comprehensive collection of small…One of the key features of Atomic Red Team is its modular design. Each test is designed to be small and focused, which makes it easy for…Jan 17, 2023Jan 17, 2023
Patrick EssienAs the world becomes increasingly digital, the need for qualified cyber security professionals has…The curriculum of the program covers a wide range of topics, including network security, incident response, and data protection, providing…Jan 17, 2023Jan 17, 2023
Patrick EssienThis write-up is motivated and inspired by the question asked by Effiong Ita during a meeting of…It immediately clicked on me that during my transition into tech, I had taken a course from CISA on Critical Infrastructure. I just had to…Jan 8, 2023Jan 8, 2023