ReZa AdineHExecution Tactic in MITRE ATT&CK: Understanding Scheduled Task/JobMITRE ATT&CK is a knowledge base of adversary tactics and techniques that helps organizations to understand, detect, and respond to cyber…2 min read·May 7, 2023----
ReZa AdineHActions to do based on Threat Detection reports announced by Red Canary on 2023In order to effectively prevent, detect, and respond to cyber attacks, security teams should take a multi-faceted approach. The first step…2 min read·Mar 30, 2023----
ReZa AdineHa quick review for Detection, Prevention, and respond on last year's most common Threats based on…T1059.003: Windows Command Shell 25 min read·Mar 26, 2023----
ReZa AdineHQbot Malware ActivityDescription: This genral plan is designed to detect and respond to potential Qbot malware activity by monitoring for specific indicators of…3 min read·Mar 23, 2023----
ReZa AdineHApple MacOS, Login Hook Persistence: Techniques, Prevention, and DetectionAbstract:2 min read·Mar 19, 2023----
ReZa AdineHThe future of cybersecurity: Trends, technologies, and predictions for the next decadeIntroduction:2 min read·Mar 18, 2023----
ReZa AdineHA Quick Guide to Estimating Log Retention and Rotation PoliciesAbstract: Log retention and rotation policies are crucial for maintaining the integrity of an organization’s data, especially in today’s…6 min read·Mar 15, 2023----