DFIR

Attacks on a System

Linkedin Twitter Telegram Youtube Instagram Facebook Attacks on a System Summary of the Blog what is System Attack Types of Attack on a System What is System Attack A system attack is a malicious attempt to compromise a computer system, targeting vulnerabilities in software, hardware or human behavior. Examples include malware, phishing, and denial-of-service attacks. […]

Attacks on a System Read More »

A Beginner’s Guide to Ethical Hacking

Linkedin Twitter Telegram Youtube Instagram Facebook A Beginner’s Guide to Ethical Hacking Summary of the Blog what is Ethical Hacking Definition of ethical hacking – Explanation of the purpose and goals of ethical hacking Difference between ethical hacking and illegal hacking Ethical Hacking vs. Penetration Testing Definition and explanation of penetration testing Comparison of ethical

A Beginner’s Guide to Ethical Hacking Read More »

Hunting Down CVE-2023-29343: An Elusive Elevation of Privilege Vulnerability in Sysmon

Linkedin Twitter Telegram Youtube Instagram Facebook Hunting Down CVE-2023-29343: An Elusive Elevation of Privilege Vulnerability in Sysmon Introduction of Topic In recent months, security researchers have discovered a critical vulnerability, CVE-2023-29343, which allows adversaries to exploit arbitrary file write capabilities in Sysmon v14.14. This vulnerability poses a significant risk as it can lead to privilege

Hunting Down CVE-2023-29343: An Elusive Elevation of Privilege Vulnerability in Sysmon Read More »

Strengthening Phishing Defense with Sigma Detection: Blocking Potentially Malicious Email Attachments

Linkedin Twitter Telegram Youtube Instagram Facebook Strengthening Phishing Defense with Sigma Detection: Blocking Potentially Malicious Email Attachments Introduction of Topic Phishing attacks remain a persistent threat to organizations, often serving as a gateway for unauthorized access and data breaches. To fortify our defenses against these malicious campaigns, we have implemented a powerful detection mechanism using

Strengthening Phishing Defense with Sigma Detection: Blocking Potentially Malicious Email Attachments Read More »