Published inInfoSec Write-ups·PinnedMember-onlyHow to Master in Real Cyber Threat Intelligence? Build Military-Grade Intelligence Skills!Resharing news and deploying IOCs is not real cyber threat intelligence. See how to develop military-grade cyber threat intelligence skills. — Why Mastering in Cyber Threat Intelligence is Not Easy? In today’s digital age, cyber threats are becoming increasingly prevalent and sophisticated, posing significant risks to companies and organizations. To stay ahead of these threats, companies try to invest in Cyber Threat Intelligence (CTI), which involves the collection and analysis of relevant data and information and turning it into meaningful…Cybersecurity10 min readCybersecurity10 min read
PinnedMember-onlyRussia, China, US, Ukraine — What Does Geopolitics Mean To Your Cyber Threat Intelligence Strategy?Geopolitical influence on cyber security and especially on cyber threat intelligence strategy has never been so crucial than it is now. Let us understand in perspective. — Reading the Rise in Tension: Geopolitics plays a significant role in shaping the international relations of nations, and the interconnectedness of our global economy means that political events in one part of the world can have an impact on another. The relationship and ongoing geopolitical tensions between Russia, China, the US, and Ukraine is a…Cybersecurity5 min readCybersecurity5 min read
Published inCoinmonks·PinnedMember-onlyHidden Secrets of LockBit Ransomware Revealed!!!This article reveals a lot of insider information related to LockBit Ransomware gang and the ransomware cartel. — Where To Begin…… Ok, so I will begin the story by explaining about what LockBit is. Then I will go on to speak about the LockBit victimology and attack timeline in brief and then proceed to the research details that are revealed. …Cybersecurity9 min readCybersecurity9 min read
Published inInfoSec Write-ups·Jul 31Member-onlyWho are Cyber Idiots? How to Mitigate Risk in Enterprise and Personal Cybersecurity?Cyber security thrives and flourishes due to the presence of cyber idiots. But who are cyber idiots? Let’s take a look at their characteristics and learn how to deal with them in day-to-day life. — The term “cyber idiot” is an informal and derogatory way to describe individuals who exhibit careless and uninformed behavior in the digital realm. These individuals often fall prey to various cyber threats due to their lack of awareness, understanding, and caution when interacting with technology and the internet. …Cybersecurity5 min readCybersecurity5 min read
Published inInfoSec Write-ups·May 1Member-onlyTop 5 Cybersecurity Certifications for Immediate Job Placement in 2023!Getting a job in cybersecurity is a dream to many. Best cyber security jobs in the market demand best skills in cybersecurity. These top 5 cyber security certifications can help you land in your dream job with desired payscale. — Cybersecurity is an increasingly important field as more and more of our personal and professional lives are conducted online. With the rise in cyber attacks and data breaches, organizations of all types and sizes are looking for skilled cybersecurity professionals to protect their networks and data. One way to demonstrate…Cybersecurity6 min readCybersecurity6 min read
Published inCoinmonks·Apr 26Member-onlyThe Dark Side of Cybersecurity: Who Really Benefits from the Rise in Cyber Attacks?We all pray for a world where we don’t have any cyber attacks. But, the reality is harshly different. Let us see who all will be praying for a world of cyber attacks and the reasons for the increased cyber threats in recent times. — Cyber attacks are a growing threat to individuals, businesses, and governments around the world. While the impact of these attacks can be devastating, there are some entities that may stand to benefit from them. …Cybersecurity5 min readCybersecurity5 min read
Published inCoinmonks·Apr 26Member-onlyWhy Cyber Attacks Are Actually Increasing In Recent Times?We all pray for a world where we don’t have any cyber attacks. But, the harsh reality is cyber attacks are increasing at a exponential way. Let us see why! — Cyberattacks have been on the rise in recent years, with hackers and cybercriminals using increasingly sophisticated techniques to target individuals, businesses, and governments. The reasons for this increase are complex and multifaceted, involving a range of economic, political, and technological factors.In …Cybersecurity5 min readCybersecurity5 min read
Published inInfoSec Write-ups·Mar 26Member-only1 Mitre Att&ck Technique That You Cannot IgnoreMitre Att&ck is Important for Improving The Overall Cyber Threat Detection But You May have To Pay Hefty Price If You Ignore This One Att&ck Technique — In recent years, cybersecurity threats have grown significantly, with attackers using sophisticated techniques to penetrate networks and compromise sensitive data. The Mitre ATT&CK framework provides a comprehensive and structured approach to understanding and analyzing cyber threats. …Programming6 min readProgramming6 min read
Published inLampshade of ILLUMINATION·Mar 21Member-onlyGoogle and ChatGPT Diagnosis: The Shocking Dangers of Self-Diagnosing Online!The aim of this blog is to educate the dangers of Googling and ChatGPTing about a disease and how it can be dangerous to your life. — In the modern era, access to information has become incredibly easy with the advent of the internet. The internet has revolutionized the way we interact with each other and seek out knowledge. With the click of a button, one can find information about anything, from the history of the world…Life6 min readLife6 min read
Published inInfoSec Write-ups·Mar 12Member-only8 Free Websites To Check If Your Email Address Is Compromised?You can use these 8 free open source tools to check if your email address, phone numbers, and passwords are breached in cyber attacks. — How To Check If Your Email Address Is Compromised? In today’s digital age, email addresses have become an essential aspect of our lives. We use them to communicate with friends and family, register for online services, sign up for newsletters, and receive important notifications. …Cybersecurity7 min readCybersecurity7 min read