1. Cybrary
2.TryHackMe
3. OverTheWire
4. HackTheBox
5. LetsDefend
6. PicoCTF
1. Cybrary
2.TryHackMe
3. OverTheWire
4. HackTheBox
5. LetsDefend
6. PicoCTF
Introduction: A recent SOC alert from a LetsDefend simulation provides a stark reminder of the persistent threat posed by malicious Microsoft Office macros. A single document, edit1-invoice.docm, acted as a…
Introduction: A recent SOC alert from a LetsDefend simulation provides a stark reminder of the persistent threat posed by malicious Microsoft Office macros. A single document, edit1-invoice.docm, acted as a…
#walkthrough #information-security #cybersecurity #soc
Origin | Interest | Match
#walkthrough #information-security #cybersecurity #soc
Origin | Interest | Match
Origin | Interest | Match
rcnworldwidemedia.blogspot.com/2025/10/unit...
rcnworldwidemedia.blogspot.com/2025/10/unit...
#information-security #incident-response #cybersecurity
Origin | Interest | Match
#information-security #incident-response #cybersecurity
Origin | Interest | Match
#Mergers #& #Acquisitions
Origin | Interest | Match
#Cybersecurity
archive.is/sXjqG
#Cybersecurity
archive.is/sXjqG
#News
Origin | Interest | Match
#Application #Security
Origin | Interest | Match
#Application #Security
Origin | Interest | Match
#Application #Security #ai #and #machine #learning #ai […]
[Original post on ai-techpark.com]
#Application #Security #ai #and #machine #learning #ai […]
[Original post on ai-techpark.com]
https://medium.com/@lukwagoasuman236/dynamic-malware-analysis-example-1-letsdefend-17477c11fa42?source=rss------education-5
#malware #case-study #analysis #cybersecurity #education
Result Details
https://medium.com/@lukwagoasuman236/dynamic-malware-analysis-example-1-letsdefend-17477c11fa42?source=rss------education-5
#malware #case-study #analysis #cybersecurity #education
Result Details
https://systemweakness.com/soc141-phishing-url-detected-eventid-86-on-letsdefend-8490256dcacb?source=rss----f20a9840e177---4
#phishing #alerts #soc-analyst #lets-defend #cybersecurity
Result Details
https://systemweakness.com/soc141-phishing-url-detected-eventid-86-on-letsdefend-8490256dcacb?source=rss----f20a9840e177---4
#phishing #alerts #soc-analyst #lets-defend #cybersecurity
Result Details
https://systemweakness.com/letsdefend-write-up-ntfs-forensics-parsing-master-file-table-to-discover-keylogger-06f5e816db75?source=rss----f20a9840e177---4
#letsdefendio #lets-defend #blue-team […]
https://systemweakness.com/letsdefend-write-up-ntfs-forensics-parsing-master-file-table-to-discover-keylogger-06f5e816db75?source=rss----f20a9840e177---4
#letsdefendio #lets-defend #blue-team […]
- Books
- Malware Analysis
- Practice Labs
- Phishing Analysis
- Tools for Investigation
- Network Log Sources
and more.
github.com/LetsDefend/a...
#cybersecurity
- Books
- Malware Analysis
- Practice Labs
- Phishing Analysis
- Tools for Investigation
- Network Log Sources
and more.
github.com/LetsDefend/a...
#cybersecurity
https://systemweakness.com/letsdefend-write-up-obfuscated-javascript-network-drive-mapping-to-msi-installation-ca34816f2d94?source=rss----f20a9840e177---4
#letsdefendio #cybersecurity […]
https://systemweakness.com/letsdefend-write-up-obfuscated-javascript-network-drive-mapping-to-msi-installation-ca34816f2d94?source=rss----f20a9840e177---4
#letsdefendio #cybersecurity […]
https://medium.com/@victorjunior.rubrice/soc249-port-scan-detected-community-walkthrough-letsdefend-b3358c2cd572?source=rss------technology-5
#lets-defend #cybersecurity #technology #soc
Event Attributes
https://medium.com/@victorjunior.rubrice/soc249-port-scan-detected-community-walkthrough-letsdefend-b3358c2cd572?source=rss------technology-5
#lets-defend #cybersecurity #technology #soc
Event Attributes
https://medium.com/@jawad.shoukat/letsdefend-walkthrough-for-soc274-palo-alto-networks-pan-os-command-injection-vulnerability-e551c3eaf913?source=rss------technology-5
#soc-analyst […]
https://medium.com/@jawad.shoukat/letsdefend-walkthrough-for-soc274-palo-alto-networks-pan-os-command-injection-vulnerability-e551c3eaf913?source=rss------technology-5
#soc-analyst […]
https://medium.com/@jawad.shoukat/letsdefend-soc-walkthrough-soc287-arbitrary-file-read-on-checkpoint-security-gateway-13f88ac160f0?source=rss------technology-5
#threat-intelligence #technology […]
https://medium.com/@jawad.shoukat/letsdefend-soc-walkthrough-soc287-arbitrary-file-read-on-checkpoint-security-gateway-13f88ac160f0?source=rss------technology-5
#threat-intelligence #technology […]