Posts by Tag
- SOC 17
- LetsDefend 7
- Challenges 7
- SIEM 4
- Security Analyst 4
- CyberTalents 3
- Trend Micro 3
- Splunk 3
- Linux 2
- CTF 2
- Follina 2
- Phishing 2
- Excel 2
- Data Breach 2
- Incident Response 2
- Cyber Defenders 2
- INE 2
- Red Hat System Administration I 1
- CVE Number 1
- Smart Role 1
- Creepy DNS 1
- WormSeen 1
- Bean 1
- Beans Detector 1
- Tools 1
- Red Team 1
- Network Security 1
- Qradar 1
- Ransomware 1
- Wireshark 1
- Analysis 1
- Blue Team 1
- FakeGPT 1
- PowerShell 1
- PortSwigger 1
- Penetration Testing 1
- PenTesting 1
- Web 1
- eCIR 1
- Threat Hunting 1
- FalconEye 1
- ToddyCat APT 1
- SideWinder APT 1
- APT35 1
- Charming Kitten 1
SOC
APT35 (Charming Kitten)
APT35 has been active since at least 2013 and is recognized for its sophisticated use of social engineering tactics.
SideWinder APT Groups
SideWinder APT Groups
ToddyCat APT Group
ToddyCat APT Group
FalconEye Challenge
FalconEye Blue Team Challenge
eCIR - Effectively Using Splunk (Scenario 1)
eCIR - Effectively Using Splunk
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
SOC175 - PowerShell Found in Requested URL
This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.
SOC202 - FakeGPT Malicious Chrome Extension
SOC202 - FakeGPT Malicious Chrome Extension
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
Introduction to SIEM Solution
An introduction to Security Information and Event Management.
CyberTalents Certified SOC Analyst 2023
Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
SIEM 1
What do SOC Analysts need to know about SIEM?
CyberTalents Certified SOC Analyst Challenges
CyberTalents Blue Team Scholarship 2023
CyberTalents Certified SOC Analyst 2023
Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC
LetsDefend
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
SOC175 - PowerShell Found in Requested URL
This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.
SOC202 - FakeGPT Malicious Chrome Extension
SOC202 - FakeGPT Malicious Chrome Extension
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
Challenges
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
SOC175 - PowerShell Found in Requested URL
This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.
SOC202 - FakeGPT Malicious Chrome Extension
SOC202 - FakeGPT Malicious Chrome Extension
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
SIEM
FalconEye Challenge
FalconEye Blue Team Challenge
eCIR - Effectively Using Splunk (Scenario 1)
eCIR - Effectively Using Splunk
Introduction to SIEM Solution
An introduction to Security Information and Event Management.
SIEM 1
What do SOC Analysts need to know about SIEM?
Security Analyst
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
SOC175 - PowerShell Found in Requested URL
This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.
SOC202 - FakeGPT Malicious Chrome Extension
SOC202 - FakeGPT Malicious Chrome Extension
CyberTalents
CyberTalents Certified SOC Analyst 2023
Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools
CyberTalents Certified SOC Analyst Challenges
CyberTalents Blue Team Scholarship 2023
CyberTalents Certified SOC Analyst 2023
Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC
Trend Micro
CyberTalents Certified SOC Analyst 2023
Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools
CyberTalents Certified SOC Analyst Challenges
CyberTalents Blue Team Scholarship 2023
CyberTalents Certified SOC Analyst 2023
Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC
Splunk
FalconEye Challenge
FalconEye Blue Team Challenge
eCIR - Effectively Using Splunk (Scenario 1)
eCIR - Effectively Using Splunk
Introduction to SIEM Solution
An introduction to Security Information and Event Management.
Linux
Recon-ng
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
Red Hat System Administration I Part 1
Red Hat System Administration I
CTF
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
CyberTalents Certified SOC Analyst Challenges
CyberTalents Blue Team Scholarship 2023
Follina
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC173 - Follina 0-Day Detected
SOC173 - Follina 0-Day Detected
Phishing
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
Excel
SOC145 - Ransomware Detected
SOC145 - Ransomware Detected
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
SOC146 - Phishing Mail Detected - Excel 4.0 Macros
Data Breach
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
Incident Response
Red Team Tools
The investigation case about FireEye red team tools. Try to find root cause of incident
Data Breach 01
Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue
Cyber Defenders
FalconEye Challenge
FalconEye Blue Team Challenge
eCIR - Effectively Using Splunk (Scenario 1)
eCIR - Effectively Using Splunk
INE
FalconEye Challenge
FalconEye Blue Team Challenge
eCIR - Effectively Using Splunk (Scenario 1)
eCIR - Effectively Using Splunk