InSystem WeaknessbyMAGESHTempest-Tryhackme WriteupYou are tasked to conduct an investigation from a workstation affected by a full attack chain.Aug 26
YousefBlueSky Ransomware Blue Team LabQ1: Knowing the source IP of the attack allows security teams to respond to potential threats quickly. Can you identify the source IP…May 6
Tokenview.ioMonitoring Ethereum Event Topics for Developers Using Tokenview APIDevelopers often need to monitor specific event topics on the Ethereum blockchain to track relevant smart contract interactions and…Apr 7Apr 7
Md. Mahim Bin FirojIncident response and threat hunting using hayabusa toolHayabusa is an incident response and threat detection tool by Yamato security professionals in Japan. Its leverage sigma rules and its own…Oct 15, 2023Oct 15, 2023
InMirko Peters — Data & Analytics BlogbyMirko PetersUnderstanding the Distinction: Process Mining vs Data Mining and Their Impact on BusinessIn the contemporary business landscape, the terms “process mining” and “data mining” are often mentioned in discussions surrounding…Mar 8Mar 8
InSystem WeaknessbyMAGESHTempest-Tryhackme WriteupYou are tasked to conduct an investigation from a workstation affected by a full attack chain.Aug 26
YousefBlueSky Ransomware Blue Team LabQ1: Knowing the source IP of the attack allows security teams to respond to potential threats quickly. Can you identify the source IP…May 6
Tokenview.ioMonitoring Ethereum Event Topics for Developers Using Tokenview APIDevelopers often need to monitor specific event topics on the Ethereum blockchain to track relevant smart contract interactions and…Apr 7
Md. Mahim Bin FirojIncident response and threat hunting using hayabusa toolHayabusa is an incident response and threat detection tool by Yamato security professionals in Japan. Its leverage sigma rules and its own…Oct 15, 2023
InMirko Peters — Data & Analytics BlogbyMirko PetersUnderstanding the Distinction: Process Mining vs Data Mining and Their Impact on BusinessIn the contemporary business landscape, the terms “process mining” and “data mining” are often mentioned in discussions surrounding…Mar 8
Krzysztof[CyberDefenders Write-up] MITRE-T1110.003Adversaries may use a single or small list of commonly used passwords against many different accounts.Nov 5, 2023