RocketMe Up CybersecurityUnderstanding the Different Types of IOCs — Hashes, IPs, URLs, and MoreDive into the core of cybersecurity defense by exploring key indicators of compromise (IOCs) such as hashes, IPs, URLs, and more.Nov 11
RocketMe Up CybersecurityPersistent Malware in Cloud VMs — Avoiding Detection by Cloud Security ToolsExamining how persistent malware conceals itself in cloud VMs, bypasses cloud security tools, and ways to strengthen defenses.Nov 3Nov 3
Md. Mahim Bin FirojHow to investigate systems using Yara rules to find evil along with yara rule anatomyYara is a tool that will help you to scan systems for malicious activity and it needs rules for that. The rules will be used to detect…Sep 22, 2023Sep 22, 2023
RocketMe Up CybersecurityDeep Packet Inspection (DPI) vs. Evasive Malware — Who’s Winning?In today’s increasingly digital world, cybersecurity threats are evolving at an alarming pace. The rise of sophisticated malware poses…Oct 17Oct 17
RocketMe Up CybersecurityUnderstanding the Different Types of IOCs — Hashes, IPs, URLs, and MoreDive into the core of cybersecurity defense by exploring key indicators of compromise (IOCs) such as hashes, IPs, URLs, and more.Nov 11
RocketMe Up CybersecurityPersistent Malware in Cloud VMs — Avoiding Detection by Cloud Security ToolsExamining how persistent malware conceals itself in cloud VMs, bypasses cloud security tools, and ways to strengthen defenses.Nov 3
Md. Mahim Bin FirojHow to investigate systems using Yara rules to find evil along with yara rule anatomyYara is a tool that will help you to scan systems for malicious activity and it needs rules for that. The rules will be used to detect…Sep 22, 2023
RocketMe Up CybersecurityDeep Packet Inspection (DPI) vs. Evasive Malware — Who’s Winning?In today’s increasingly digital world, cybersecurity threats are evolving at an alarming pace. The rise of sophisticated malware poses…Oct 17
OLÁMILÈKANPikabot Trojan: How I Used Wireshark to Detect a DNS Tunneling Attack.Imagine you are working as SOC Analyst at BulbaTech Innovations, and your SOC received an alert of abnormal traffic patterns and a high…Sep 16
InAardvark InfinitybyAardvark InfinityBash Script for Remote Malware DetectionTitle: Remote Malware Detection ScriptSep 22
Praj SheteUnveiling the capabilities of Threat Hunting with YARA and SilkETW in a Windows environmentThis blog covers the process of threat hunting, YARA rules, and how to use YARA rules and ETW to detect malicious activity in Windows…Sep 29