Vijay GuptaComprehensive Guide to Email Analysis ToolsEmail analysis is an essential practice for extracting actionable insights, enhancing security, optimizing marketing campaigns, and…Dec 1
Aftab AlamEmail Forensic Techniques.Email forensics involves investigating emails to gather evidence for legal or investigative purposes. It focuses on analyzing email…Nov 17, 2023
Chiafukamnanya NwanonenyiSOC114 — Malicious Attachment Detected (LetsDefend)Hello, so I will be working on LetsDefend SOC114: EventID 45 so let’s get into itAug 24Aug 24
Chicken0248[LetsDefend Write-up] WannaCry RansomwareMMOX Company GOT infected with ransomware, as one of our new employees was not aware enough of the phishing campaigns. Can you track what…Jun 22Jun 22
Vijay GuptaComprehensive Guide to Email Analysis ToolsEmail analysis is an essential practice for extracting actionable insights, enhancing security, optimizing marketing campaigns, and…Dec 1
Aftab AlamEmail Forensic Techniques.Email forensics involves investigating emails to gather evidence for legal or investigative purposes. It focuses on analyzing email…Nov 17, 2023
Chiafukamnanya NwanonenyiSOC114 — Malicious Attachment Detected (LetsDefend)Hello, so I will be working on LetsDefend SOC114: EventID 45 so let’s get into itAug 24
Chicken0248[LetsDefend Write-up] WannaCry RansomwareMMOX Company GOT infected with ransomware, as one of our new employees was not aware enough of the phishing campaigns. Can you track what…Jun 22
InOSINT TeambyDaouda DialloIntroduction to Email Communication and Email SecurityLet’s start with the fundamental principle of how email messaging works.May 161
Mohit DamkeEmail Analysis | SOC Analysis | By Mohit DamkeEmail Analysis | SOC Analysis | By Mohit DamkeJan 27
Andrew PetrusSafely Analyzing a Malicious Email for ThreatsIn this post, I aim to share my recent experience analyzing a malicious email that was impersonating Facebook.Apr 51