Uche UgochukwuLetsDefend: SA — Malware — Event ID: 77 WalkthroughSOC138 — Detected Suspicious Xls FileAug 27Aug 27
Uche UgochukwuLetsDefend: Investigate Web Attack WalkthroughToday I’ll be playing detective in investigating a log that was gotten from a server that has recently suffered an attack.Aug 13Aug 13
Uche UgochukwuIntroduction to Malware Analysis For SOC AnalystsMalware is any software or code designed with malicious intent to harm, exploit, or otherwise compromise the confidentiality, integrity and…Aug 13Aug 13
Uche UgochukwuDetecting Web Attacks in Server Logs as a SOC AnalystA web application is any program that offers services to users via a browser interface. Examples include Facebook, Netflix, and Alibaba…Aug 131Aug 131
Uche UgochukwuHow to Begin Phishing Email Analysis Using LetsDefend: A Beginner’s Guide for SOC Analysts.Before diving into how to analyze a phishing email, it’s essential to first understand what phishing is and the various types it…Aug 11Aug 11
Uche UgochukwuExploring the MITRE ATT&CK Framework for Enhanced CybersecurityMITRE ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge. This framework was introduced in 2013 by a non-profit…Aug 10Aug 10
Uche UgochukwuIntroduction to the Cyber Kill Chain: Mapping the Stages of a Cyber AttackThe term “kill chain” originates from military terminology and refers to the steps or phases involved in targeting and engaging an enemy to…Aug 5Aug 5
Uche UgochukwuSOC Fundamentals: A Guide for Aspiring AnalystsThe key responsibilities of a SOC analyst.Jul 26Jul 26