Baris DincerMalicious Document Analysis: Emotet Case IIn this article, we will conduct operational research on Emotet and analyze its operational capabilities as malware. All these forensic…5h ago
Ondra RojčíkWhy a Non-Technical Background Does Not Prevent You from Succeeding in Cyber Threat IntelligenceIntrusions, cyber attacks and adversarial operations are often seen as technical events best described by the deployed malware, leveraged…May 273
Ervin ZubicinOSINT AmbitionPython for Dark Web OSINT: Automate Threat MonitoringLearn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence.Apr 263Apr 263
Güray OğuzgirayCybersecurity for Operational Technology and Industrial Control Systems — VIIOT/ICS Security Use-Cases for MITRE ICS4h ago4h ago
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 3May 3
Baris DincerMalicious Document Analysis: Emotet Case IIn this article, we will conduct operational research on Emotet and analyze its operational capabilities as malware. All these forensic…5h ago
Ondra RojčíkWhy a Non-Technical Background Does Not Prevent You from Succeeding in Cyber Threat IntelligenceIntrusions, cyber attacks and adversarial operations are often seen as technical events best described by the deployed malware, leveraged…May 273
Ervin ZubicinOSINT AmbitionPython for Dark Web OSINT: Automate Threat MonitoringLearn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence.Apr 263
Güray OğuzgirayCybersecurity for Operational Technology and Industrial Control Systems — VIIOT/ICS Security Use-Cases for MITRE ICS4h ago
Lex CrumptoninMITRE-EngenuityTechnical Deep Dive: Understanding the Anatomy of a Cyber IntrusionMITRE’s experiences detecting and responding to a nation-state cyber threat actor incident in our research and experimentation networkMay 3
Ervin ZubicinOSINT AmbitionBuilding a Versatile Threat Intelligence Program for Any EnvironmentLearn how to build a comprehensive threat intelligence program to identify, analyze, and counter cyber threats in any environment.Jun 171
Scott Bolen | RONIN OWL CTIThe Skeleton Key: Unveiling a New Frontier in AI Jailbreak TechniquesA recent development, the “Skeleton Key” AI jailbreak technique, has raised concerns about manipulating AI models to subvert their intended…21h ago
Thomas RocciainSecurityBreak6 Useful Infographics for Threat IntelligenceVisualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…Dec 18, 20228