warning, alert, detected-2168379.jpg

Malicious Document Analysis

Malicious document files are really popular nowadays. Typically, attackers use these files to infiltrate and compromise endpoints and networks. Threat actors have taken advantage of documents by using macros to conduct malicious practices. In this post, we will discuss and analyze malicious documents and uncover hidden indicators of compromise (IOCs). Table of Content What’s a …

Malicious Document Analysis Read More »

to hack, fraud, map-7109362.jpg

Phishing Email Analysis

In this blog, we will discuss emails and a prominent cyber attack known as phishing. We will analyze an email to determine whether it was a phishing attempt. Tools used include PowerShell, HashCalc, Mozilla Thunderbird, VirusTotal and AbuseIPDB. What is Phishing Phishing is one of the biggest threats businesses face today. 36% of all data …

Phishing Email Analysis Read More »

system, web, network-3699542.jpg

Network Diagnostic Tools

In my last post, I had covered the topic of troubleshooting and a little on the importance of troubleshooting, and we discussed built-in tools used to troubleshoot problems in Windows Systems. In this post, we are going to give some attention to the networking side of things. Networking plays a significant role in the world …

Network Diagnostic Tools Read More »