Cyber Writes

Cyber Writes

Work done by a Team Of Security Experts from Cyber Writes (www.cyberwrites.com) - World’s First Dedicated Content-as-a-Service (CaaS) Platform for Cybersecurity. For Exclusive Cyber Security Contents, Reach at: business@cyberwrites.com
Network Penetration Testing Checklist – 2025Network Penetration Testing Checklist – 2025

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network to identify vulnerabilities and improve security…

4 weeks ago
Shut Down Phishing Attacks -Detection & Prevention ChecklistShut Down Phishing Attacks -Detection & Prevention Checklist

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as…

4 months ago
Top 10 Active Directory Management Tools – 2024Top 10 Active Directory Management Tools – 2024

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active Directory (AD) environments efficiently. These tools…

9 months ago
Criminal IP Unveils Innovative Fraud Detection Data Products on Snowflake MarketplaceCriminal IP Unveils Innovative Fraud Detection Data Products on Snowflake Marketplace

Criminal IP Unveils Innovative Fraud Detection Data Products on Snowflake Marketplace

AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced that it has started selling its paid threat detection…

10 months ago
5 Major Phishing Campaigns in March 20245 Major Phishing Campaigns in March 2024

5 Major Phishing Campaigns in March 2024

March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time…

12 months ago
How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within an analysis session. In October 2022,…

1 year ago
GBHackers Weekly Round-Up: Cyber Attacks, Vulnerabilities, Threats & New Cyber StoriesGBHackers Weekly Round-Up: Cyber Attacks, Vulnerabilities, Threats & New Cyber Stories

GBHackers Weekly Round-Up: Cyber Attacks, Vulnerabilities, Threats & New Cyber Stories

With our weekly GBHackers news summary, explore and learn about the most recent developments in the cybersecurity field.  This practice…

1 year ago
OpenCTI: OSINT Platform to SOC & MDR Teams for Malware AnalysisOpenCTI: OSINT Platform to SOC & MDR Teams for Malware Analysis

OpenCTI: OSINT Platform to SOC & MDR Teams for Malware Analysis

ANY.RUN now integrates with OpenCTI, a cyber threat intelligence platform that allows automatic enrichment of OpenCTI observations with malware data…

1 year ago
Combining Threat Intelligence Platforms & Sandboxes for Efficient Security Operations – A DFIR GuideCombining Threat Intelligence Platforms & Sandboxes for Efficient Security Operations – A DFIR Guide

Combining Threat Intelligence Platforms & Sandboxes for Efficient Security Operations – A DFIR Guide

Organizations have many tools when investigating cyber threats, but two stand out: Threat Intelligence Platforms (TIPs) and sandboxes. Each solution…

1 year ago
How to Create a Sandbox Environment For Malware Analysis – A Complete GuideHow to Create a Sandbox Environment For Malware Analysis – A Complete Guide

How to Create a Sandbox Environment For Malware Analysis – A Complete Guide

In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing…

1 year ago