ReZa AdineHExecution Tactic in MITRE ATT&CK: Understanding Scheduled Task/JobMITRE ATT&CK is a knowledge base of adversary tactics and techniques that helps organizations to understand, detect, and respond to cyber…May 7, 2023May 7, 2023
ReZa AdineHActions to do based on Threat Detection reports announced by Red Canary on 2023In order to effectively prevent, detect, and respond to cyber attacks, security teams should take a multi-faceted approach. The first step…Mar 30, 2023Mar 30, 2023
ReZa AdineHa quick review for Detection, Prevention, and respond on last year's most common Threats based on…T1059.003: Windows Command Shell 2Mar 26, 2023Mar 26, 2023
ReZa AdineHQbot Malware ActivityDescription: This genral plan is designed to detect and respond to potential Qbot malware activity by monitoring for specific indicators of…Mar 23, 2023Mar 23, 2023
ReZa AdineHApple MacOS, Login Hook Persistence: Techniques, Prevention, and DetectionAbstract:Mar 19, 2023Mar 19, 2023
ReZa AdineHThe future of cybersecurity: Trends, technologies, and predictions for the next decadeIntroduction:Mar 18, 2023Mar 18, 2023
ReZa AdineHA Quick Guide to Estimating Log Retention and Rotation PoliciesAbstract: Log retention and rotation policies are crucial for maintaining the integrity of an organization’s data, especially in today’s…Mar 15, 2023Mar 15, 2023