attack chain

SOC First Defense phase – Understanding the Attack Chain – A Basic Defense approach...

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most times, the cyber attacks are getting executed in stages. So the SOC team must...
Windows Registry Analysis-Tracking Every activity

Windows Registry Analysis – Tracking Everything You Do on the System

The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it holds. Today most administrators and forensic analysts, the registry probably looks like the entrance to...

Intrusion Detection System (IDS) And Its Detailed Working Function -SOC/SIEM

Intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations. IDS also can be referred as a packet sniffer which intercepts packets travel along various communication mediums. All the packets are...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

0

Most Popular

Recommended