License – To the extent possible under law, Rahmat Nurfauzi “@infosecn1nja” has waived all copyright and related or neighboring rights to this work. Table of Contents...
Category: THREAT INTELLIGENCE
Countering Ransomware Financing – FATF Report March 2023
The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist...
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection in Your SOC by Logpoint
Download & read the complete guide below 👇👇👇
The Ultimate Guide to Insider Threats eBook by exabeam
Introduction Insider threats are a growing concern for every organization — one that is increasingly difficult to manage using conventional security technologies. According to Ponemon’s 2022...
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra Kumar Nainar & Ashish Panda – Apress
Introduction Traffic capture and analysis is an integral part of the overall IT operation, and accordingly Wireshark is an essential skillset required for any IT operation...
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
With the return of war in a largely Digitized Europe, especially after the COVID episode that accelerated the digital transformation of our societies, a new strategic...
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by BlackBerry Cybersecurity.
INTRODUCTION At BlackBerry, we recognize that in today’s world, security leaders must expand their focus beyond technologies and their vulnerabilities. To effectively manage risk, security leaders...
Telegram – How a Messenger Turned into a Cybercrime Ecosystem by 2023 by Kela Cybercrime Intelligence
Executive SummaryTelegram is a messaging app that is used by many people around the world for a variety of purposes. However, it has also become a...
Threat Hunting Framework by Cyborg Security
INTRODUCTION “HUNTING IS NOT A SPORT. IN A SPORT, BOTH SIDES SHOULD KNOW THEY’RE IN THE GAME.” ‘Threat hunting’ is a concept that has gained tremendous...
OSINT – The Most Complete Open Source Intelligence Overview by Joas Antonio
This is a book with multi translations about OSINT, for those who want to acquireknowledge and improve themselves even more in the area.My LinkedIn: https://www.linkedin.com/in/joas antonio...
Threat Hunting Playbooks for MITRE Tactics – Starting your first threat hunting today by PRASANNAKUMAR B MUNDAS
ABSTRACTThis document will help and guide you to start your first threat hunting based on MITRE ATT&CK Tactics. Objective:Identify potential reconnaissance activity on the network Description:...
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and resources.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed...