HarisuthanNov 5, 20221 min readEmotet Malware is backEmotet is a Trojan that is primarily spread through spam emails. The infection may arrive either via malicious script, macro-enabled...
HarisuthanJun 23, 20221 min readWorking Of Threat HuntingTeam threat hunters are front-line defenders who proactively detect malicious or suspicious activity by investigating internal systems in...
HarisuthanJun 10, 20222 min readPyramid of painPyramid of pain is a threat hunting cookbook used by the threat hunters to investigate or determine cyber threats, it's a combination of...
HarisuthanJun 6, 20221 min readBasic Of Cyber Threat HuntingIn recent trends, many adversaries remain hidden in an organization for a month before detection it has been too challenging for many...