Kerberoasting – Active Directory Attack
Active Directory services are usually used by organizations for easily configuring policies and managing permissions. Due to its widespread usage, […]
ToddyCat APT
ToddyCat — a relatively new Chinese-Speaking Advanced Persistent Threat, has been targeting and exploiting vulnerable Exchange Servers throughout Europe and […]
CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability and Digital Forensics
Microsoft issued CVE-2022-30190 regarding a vulnerability regarding the Microsoft Support Diagnostic Tool (MSDT). This exists when MSDT is called using […]
Wiper Malware – What is it and How to Detect?
In the world of different malware types and strains, the most disruptive malware type besides ransomware might be Wiper malware. […]
Ransomware Detection Using Machine Learning
Gone are the days of manual security analysis that cyber security teams used to perform to track down and stop […]
How to Detect Ransomware Early
The proliferation of ransomware attacks in the past decade has brought many challenges to companies and cyber security teams worldwide. […]
CSOC Analysts Cybersecurity Toolkit Arsenal
It is safe to say that organizations worldwide have different infrastructure setups, technology, software, and different network architecture types. No […]
XDR Software – The Journey Beyond
We are still in the early days of the XDR (eXtended Detection and Response) era, understanding XDR technology in the […]
Log4j Critical RCE
The Log4j Vulnerability commonly known as Log4Shell zero day vulnerability was made public on December 9th 2021. This vulnerability is […]
How Threat Actors Steal Your Data with Reverse Tunnelling
Reverse tunnelling is a technique used to ‘sneak into’ a secured network by hiding applications within traffic which originates from […]
Using Windows Event Forwarding for Centralized Windows Monitoring – Part 3
Reading security logs requires a higher level of permission that other logs. Below are the steps to configure the right […]
Using Windows Event Forwarding for Centralized Windows Monitoring – Part 2
From a security perspective, generally, it would be better to allow communication from user segments to outside rather than from […]
Using Windows Event Forwarding for Centralized Windows Monitoring – Part 1
Staying on top of cyber threats in your environment could be challenging even with a lot of protective measures in […]
Deep-dive into Azure Sentinel – Part 2 – Data Collection and Processing
From our experience in deploying various SIEM platform, we would rank Azure sentinel number one when it comes to the […]
Deep-dive into Azure Sentinel – Part 1 – Introduction to Sentinel as a SIEM
You might have heard of the North Sentinel Island in the middle of Bay of Bengal that hosts the most […]
SOAR Features and Use Cases
Organizations are getting bigger and bigger and, because of that a lot of events, activities and data are being generated […]
Dark Web and Threat Intelligence (DARKINT)
Security researchers and Cybersecurity professionals have an immense interest in discovering threat intelligence on the deep web and darknet. This […]
Ransomware Incident Response Plan – Part 2
Ransomware was and still is one of the most dangerous attacks that can cause catastrophic consequences to the endpoint system […]
Ransomware Incident Response Plan – Part 1
Ransomware was and still is one of the most dangerous attacks that can cause catastrophic consequences to the endpoint system […]
Cyber Threat Intelligence and OSINT
We are living in a world where any number of cyber threats can bring an organization to its knees and […]
Threat Model and Security Considerations For Remote Workers
As the world faces uncertain times, due to the spread of the pandemic COVID19 (coronavirus) outbreak, organizations around the world […]
12 Steps to Secure Your Organization’s Office 365 Accounts Effectively
Recently, our Incident response team at HAWKEYE received a frantic call from one of our clients saying that their o365 […]
What to Train Your User for Effective Email Security
User’s is the most vulnerable asset for any organization. We can deploy security controls for any other vulnerability, but not […]
Cyber Threat Management with MITRE ATT&CK – Part 1
Let’s agree on this first, job of a SOC analyst is TOUGH, as tough as finding a needle in a […]