Tag Incident Response

LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through

LetsDefend’s Malware Analysis: Suspicious Browser Extension Walk-Through. Everything you need to know to solve the challenge!

Creating Fun Cybersecurity Tabletop Exercises

How you can create fun and engaging cybersecurity tabletop exercises at your organization. Fulfill compliance requirements for tabletop exercises or security awareness training with the provided documents.

LetsDefend’s DFIR Challenge: IcedID Malware Family Walk-Through

A walk-through of the IcedID Malware Family for the LetsDefend’s DFIR Challenge. An analysis of the IcedID malware and how to defend against it.

How to Stay on Top of Cybersecurity News

The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!

LetsDefend’s DFIR Challenge: REvil Ransomware Walk-Through

LetsDefend’s DFIR challenge walk-through of the REvil ransomware challenge! Everything you need to know to complete the DFIR challenge.

Automated Sysmon Deployment

Learn how to automate the deployment and configurations of Sysmon in your environment.

What You Need to Know to Defend Against CVE-2022-30190!

Office documents exploiting CVE-2022-30190 are coming to an inbox near you! Find out how you can prepare and mitigate this threat!

How to Investigate Malicious DNS Requests

How to track down malicious DNS requests in Windows systems. Incident response techniques for DNS security products like Cisco Umbrella, or DNSFilter.

You Can Help Defend the Internet!

Help defend the Internet! Join a community of security researchers gathering logs and running honeypots to mitigate online attacks.

LetsDefend’s DFIR Challenge: Ransomware Attack Walk-Through

A Walk-Through of the LetsDefend’s DFIR Ransomware Attack Challenge!

« Older posts

© 2022 Cyber Gladius

Up ↑