leheemerWhalephishing: Analyzing An Email The Company’s CFO ReceivedRecently, my boss forwarded a sus email she had received in her inbox containing an attachment. She immediately knew it was a bogus email…Apr 7, 2023Apr 7, 2023
leheemerMortalKombat: The Latest Ransomware ThreatAll files on the infected system, including virtual machine files and trash bin data, are encrypted by the ransomware. The Run Command is…Feb 16, 2023Feb 16, 2023
leheemerinSystem WeaknessTryHackMe: Benign Room WalkthroughThis room focuses on using Splunk to monitor for suspicious users, process execution, and scheduled tasks.Oct 27, 2022Oct 27, 2022
leheemerLetsDefend — SOC108 Alert WalkthroughAlert — Malicious Remote Access Software DetectedOct 24, 2022Oct 24, 2022