PinnedMastering Cyber Threat Intelligence with ObsidianUtilize Obsidian to transform your CTI dataset and uncover unprecedented connectionsMar 16, 20242Mar 16, 20242
PinnedThreat Intelligence with AI: The Power of Gemini, Drive and Inoreader IntegrationLeveraging Gemini with a custom dataset for advanced threat analysis and correlationDec 18, 20236Dec 18, 20236
Cyber criminals exploit Formcrafts to craft phishing pagesOver the past seven years, cybercriminals have used the Formcrafts online service to craft phishing pages with the intent of stealing…Feb 8, 2024Feb 8, 2024
Attribution in Cyber Threat Intelligence: Techniques and ChallengesUnderstanding the importance and methods of the cyber attribution from a strategic point of viewJan 18, 2023Jan 18, 2023
Hunting Cobalt Strike ServersA comprehensive view on the techniques used to fingerprint Cobalt Strike’s C2sMay 12, 20221May 12, 20221
The evolution of ShadowPad infrastructurePivoting the ShadowPad C2s SSL Certificate to track the malware’s infrastructureMar 25, 2022Mar 25, 2022
2021 Dark Web Financial Cyber ThreatsAn overview of the most commonly advertised information related to financial institutions on the Dark Web in 2021Feb 2, 2022Feb 2, 2022
Are the hackers all Russian?Results of a 1 year espionage operation in the Top-tier Russian underground communitiesApr 16, 2021Apr 16, 2021
Cyber Intelligence: HUMINT OperationsHow to engage Threat Actors during undercover operations in the cyber-crime battlegroundJan 25, 20211Jan 25, 20211
Banks’ Cyber Intelligence AssessmentTop 30 questions to understand the maturity of your Cyber Intelligence programJun 30, 20201Jun 30, 20201
Possible link between Magecart group & Cerberus Banking Trojan C2Magecart JS Web Skimmer is present on the same C2 related to Cerberus Banking Trojan.Apr 6, 2020Apr 6, 2020
Automated host recon, persistence and exfiltrationBatch script to automate collection, credential dumping, discovery and exfiltration techniquesJan 8, 2020Jan 8, 2020
How to running PowerShell commands without powershell.exeTo discover the best tool to run powershell script and malicious command line without using powershell.exeSep 9, 2019Sep 9, 2019
MS Excel Weaponization TechniquesDifferent methods to run a command line via Excel file in order to spawn a Meterpreter reverse shell.Mar 4, 2019Mar 4, 2019
Undetectable C# & C++ Reverse ShellsTechnical overview of different way to spawn a reverse shell on a victim machineOct 16, 20181Oct 16, 20181
A Cyber Security way to use TweetDeckThreat Intelligence via Twitter monitoringAug 23, 2018Aug 23, 2018
INOREADER: Advanced OSINT PlatformIn this article I will explain how you can simply create and configure Inoreader platform in order to follow all the cyber news, blogs…Feb 27, 2018Feb 27, 2018