📖 ON THE BLOG 📖 : Imagine a thief scoping a target's home before they make their move. In the digital world, cybercriminals engage in a similar tactic called reconnaissance. It's the first step in many cyberattacks that often goes unnoticed - where attackers essentially 'assess' your environment for potential vulnerabilities before swooping in. This post delves further into what reconnaissance is, why it matters and how businesses can protect themselves from it. 🛡 Read it here. ⤵ https://lnkd.in/gEY9vVtP
Sentia’s Post
More Relevant Posts
-
If you're curious about what happens during a cyber attack on an organization, I recommend checking out this free, interactive webinar. Find out how to identify and prepare for imminent cyber threats with the experts at Northwave Cyber Security. #CyberSecurity #CyberAttack
Is your organisation truly prepared for a cyber attack? 👾 Find out how you can respond to a cyber attack with Gold Teaming, our comprehensive cyber attack simulation. We would like to invite you to our online event on 24 September 2024, from 12:00 to 13:00 CEST. Our experts Inge van der Beijl, Pascal Renckens CPP, and Ton Maas will be on hand to introduce you to the Gold Teaming concept, explain how it works, its importance, and how it can support your organisation's cyber resilience. They will also be available to answer any questions you may have. 🛡 Follow this link to register: https://lnkd.in/eHEVafyQ #goldteaming #cyberattacks #cyberresilience #cybersecurity
To view or add a comment, sign in
-
Is your organisation truly prepared for a cyber attack? 👾 Find out how you can respond to a cyber attack with Gold Teaming, our comprehensive cyber attack simulation. We would like to invite you to our online event on 24 September 2024, from 12:00 to 13:00 CEST. Our experts Inge van der Beijl, Pascal Renckens CPP, and Ton Maas will be on hand to introduce you to the Gold Teaming concept, explain how it works, its importance, and how it can support your organisation's cyber resilience. They will also be available to answer any questions you may have. 🛡 Follow this link to register: https://lnkd.in/eHEVafyQ #goldteaming #cyberattacks #cyberresilience #cybersecurity
24.09.2024 - Gold Teaming Webinar
northwave-cybersecurity.com
To view or add a comment, sign in
-
VulnCheck Initial Access Intelligence (IAI) equips security teams with detection artifacts to defend against initial access vulnerabilities that are either already or likely to be exploited soon. Last month, we crossed 300+ CVEs that have IAI artifacts, developing artifacts for 21 CVEs, covering 16 different vendors and products. Eleven of the 21 have confirmed exploitation activity as of November 10 – see which ones: https://lnkd.in/ej3DfZ8Y
To view or add a comment, sign in
-
I’m thrilled to announce that I’ve obtained my eCDFP (eLearnSecurity Certified Digital Forensics Professional) certification! 🕵️♂️ This journey has been both challenging and rewarding, allowing me to dive deeper into the critical field of digital forensics. I now feel even more equipped to analyze, investigate, and handle complex cybersecurity incidents with the right skills and knowledge. #DigitalForensics #CyberSecurity #eCDFP #Certification #DigitalSafety #ContinuousLearning
Certified Digital Forensics Professional • Ahmed Alwy • INE - Expert IT Training & Certifications
certs.ine.com
To view or add a comment, sign in
-
Industry-Specific Threats Does it make sense to study and conduct Thret Intelligence focused on certain APTs (APT28, APT29, APT37 and so on), create highly specialized IOCs and signatures to detect compromise and penetration of the system by hackers before deploying the backdoor and activation according to Industry-Specific Threats, e.g. financial institutions are dealt with by certain groups, industrial compromise by others, and state institutions are dealt with by political hacker groups. Specialized IOCs can be used more effectively to protect and scan the systems and networks of targeted industry segments. Today, it is usually all in one pile and quite inefficient. We can develop a module that will generate IOC and Yara rules depending on APT by drawing artifacts from analytical sources. What do you think about it ?
To view or add a comment, sign in
-
Excited to share that I've earned my Certified Digital Forensics Professional credential! Grateful for the support along this journey. While not originally into the world of Blue Teaming, it seems we're about to delve deeper into it. Looking forward to applying this expertise in digital forensics to future projects! #CertifiedDigitalForensicsProfessional #BlueTeaming #CyberSecurity #INE #eCDFP INE INE Security (FKA eLearnSecurity) Ali Hadi
Certified Digital Forensics Professional • Turki S. Al-Mutairi • INE - Expert IT Training & Certifications
certs.ine.com
To view or add a comment, sign in
-
I’m thrilled to share that I have just earned the eLearnSecurity Digital Forensics Professional (eCDFP) certification! 🎓🔍 This achievement represents countless hours of studying and hands-on experience in the field of digital forensics. #DigitalForensics #EDFP #eLearnSecurity #CyberSecurity #ProfessionalGrowth #Forensics
Certified Digital Forensics Professional • Sevinj Gurbanova • INE - Expert IT Training & Certifications
certs.ine.com
To view or add a comment, sign in
-
I've successfully earned my eCDFP certificate in digital forensics from INE Security (FKA eLearnSecurity) This was an amazing opportunity to deepen my knowledge and skills in the forensics field. This certification has provided me with a comprehensive understanding of various digital forensic techniques, from disk and file system analysis to Windows artifacts investigation. #eCDFP #digitalforensics #dfir #certification #cybersecurity
Certified Digital Forensics Professional • Gasser Sayed • INE - Expert IT Training & Certifications
certs.ine.com
To view or add a comment, sign in
-
APT29 Day 2. Scenario begins with target spearphishing then moving into slow and stealthy approach to owning initial target and eventually the entire domain. The task here is to find what were the initial files on the system, what was the C2 framework used for communication, which methods were used for persistence, credential dumping, lateral movement, privilege escalation, discovery, exfiltration, backdoor and wiping the traces. Very challenging lab from Security Blue Team that pushed me to do lots of research into all the methods above. Useful links: https://lnkd.in/eknzVPFa https://lnkd.in/eSjZxCys https://lnkd.in/eShZHFEP #BTLO #CozyBear2 #APT29 #securityoperations
Completed Cozy Bear 2! - Blue Team Labs Online
blueteamlabs.online
To view or add a comment, sign in
-
As 2025 approaches, it's crucial to stay ahead of the curve with AI threats, evolving cybercrime and geopolitical curveballs. Join our virtual deep-dive for the inside scoop on what's coming and how to tackle it, straight from our Acronis Threat Research Unit experts. Whether you're an MSP or running an IT team, you'll walk away with practical strategies and insights to keep your organization safe in this increasingly complex digital landscape. 📆 December 5, 9 a.m. EST ➡️ https://lnkd.in/gTndFwpY
To view or add a comment, sign in
1,324 followers