PinnedMember-onlyRussia, China, US, Ukraine — What Does Geopolitics Mean To Your Cyber Threat Intelligence Strategy?Geopolitical influence on cyber security and especially on cyber threat intelligence strategy has never been so crucial than it is now. Let us understand in perspective. — Reading the Rise in Tension: Geopolitics plays a significant role in shaping the international relations of nations, and the interconnectedness of our global economy means that political events in one part of the world can have an impact on another. The relationship and ongoing geopolitical tensions between Russia, China, the US, and Ukraine is a…Cybersecurity5 min readCybersecurity5 min read
Published in Coinmonks·PinnedMember-onlyHidden Secrets of LockBit Ransomware Revealed!!!This article reveals a lot of insider information related to LockBit Ransomware gang and the ransomware cartel. — Where To Begin…… Ok, so I will begin the story by explaining about what LockBit is. Then I will go on to speak about the LockBit victimology and attack timeline in brief and then proceed to the research details that are revealed. …Cybersecurity9 min readCybersecurity9 min read
Published in Lampshade of ILLUMINATION·8 hours agoMember-onlyGoogle and ChatGPT Diagnosis: The Shocking Dangers of Self-Diagnosing Online!The aim of this blog is to educate the dangers of Googling and ChatGPTing about a disease and how it can be dangerous to your life. — In the modern era, access to information has become incredibly easy with the advent of the internet. The internet has revolutionized the way we interact with each other and seek out knowledge. With the click of a button, one can find information about anything, from the history of the world…Life5 min readLife5 min read
Published in InfoSec Write-ups·Mar 13Member-onlyHow to Master in Real Cyber Threat Intelligence? Build Military-Grade Intelligence Skills!Resharing news and deploying IOCs is not real cyber threat intelligence. See how to develop military-grade cyber threat intelligence skills. — Why Mastering in Cyber Threat Intelligence is Not Easy? In today’s digital age, cyber threats are becoming increasingly prevalent and sophisticated, posing significant risks to companies and organizations. To stay ahead of these threats, companies try to invest in Cyber Threat Intelligence (CTI), which involves the collection and analysis of relevant data and information and turning it into meaningful…Cybersecurity10 min readCybersecurity10 min read
Published in InfoSec Write-ups·Mar 12Member-only8 Free Websites To Check If Your Email Address Is Compromised?You can use these 8 free open source tools to check if your email address, phone numbers, and passwords are breached in cyber attacks. — How To Check If Your Email Address Is Compromised? In today’s digital age, email addresses have become an essential aspect of our lives. We use them to communicate with friends and family, register for online services, sign up for newsletters, and receive important notifications. …Cybersecurity7 min readCybersecurity7 min read
Published in InfoSec Write-ups·Mar 12Member-onlyRisk vs Threat: The Fatal Mistake You’re Making in Your Security StrategiesRisk and Threat are two terms that are often used interchangeably. In this article, we will see why it’s a blunder mistake to do that. — Introduction In today’s world, the terms “risk” and “threat” are often used interchangeably. However, there is a fundamental difference between the two that should not be overlooked. Risk and threat levels are critical components of risk management and mitigation, and it is essential to understand the distinction between them to make…Cybersecurity9 min readCybersecurity9 min read
Published in InfoSec Write-ups·Mar 10Member-onlyAssess Maturity of Your Cyber Security Program With This Free ToolAssess your cyber security maturity level with this free tool. If you’re a Security Manager or CISO or a Cyber Security Consultant, this tool can help you in assessing the maturity level of your cyber security Incident Response program helping you strategize your roadmap — Why Maturity Assessment is Important Assessing the maturity of your cyber security program is important for several reasons. Firstly, it allows you to identify weaknesses in your security posture and develop a roadmap for improvement. …Cybersecurity7 min readCybersecurity7 min read
Published in InfoSec Write-ups·Mar 9Member-onlyWindows Forensic 101: How to Perform Forensic Investigation of Windows Machine?In this article, we will discuss how to perform Windows Forensic Investigation to detect hidden threats along with a checklist of tasks to be performed during the process. — Forensic Investigation Is Confusing. Right? Performing a forensic investigation is often a challenging and confusing task for many cybersecurity analysts. With so many different sources of evidence and potential threats to consider, it can be difficult to know where to start and how to proceed. Moreover, every investigator has their own approach to forensic investigation…Cybersecurity11 min readCybersecurity11 min read
Published in Geek Culture·Mar 8Member-onlyDid You Know Darkweb Has Its Own Courts and Justice System?Darkweb, as unorganized you think it is, has its own justice system that will resolve disputes between cybercriminals. Let’s see how it works. — What Are Darkweb Courts? As we know, the dark web is an underground network of onion sites that are not indexed by search engines and can only be accessed through specific tools like Tor and Tails. Generally you might only know that it is a place where people can buy and sell illegal goods…Cybersecurity7 min readCybersecurity7 min read
Published in Geek Culture·Mar 7Member-onlyCreating Stock Market Financial Statement Analyzer Tool With ChatGPTAnalyzing Stock Market Financial Statements is Complex and Challenging. Why Not Make it Simple With ChatGPT. This Python Tool Can Analyze Financial Statements and Determine If You Have to Invest or Avoid. — The Challenge Investing in the stock market can be an exciting and rewarding experience, but it is not without its challenges. The stock market is a complex and dynamic environment that can be difficult to navigate, even for experienced investors. …Finance7 min readFinance7 min read