Muhammad ShahzadAPT 41: Techniques Based on MITREAPT41(Double Dragon APT41, a dual espionage and cybercrime operation)Nov 11, 2020Nov 11, 2020
Muhammad ShahzadRansomware PhenomenonRansomware is a fast-growing threat of malware that targets a wide range of companies, government agencies, financial institutions and…Oct 23, 2020Oct 23, 2020
Muhammad ShahzadEmotet: Malware Trojan and A TrickbotThe Trickbot banking Trojan and the Ryuk Ransomware are two of the more common follow-ons. Emotet first detected the use of malware to…Oct 12, 2020Oct 12, 2020
Muhammad ShahzadMITRE Atta&K FrameworkThe Framework is a free, globally accessible service that provides organizations seeking to strengthen their cybersecurity strategy with…Oct 12, 2020Oct 12, 2020
Muhammad ShahzadOpenAdmin — Hack the Box — WriteupWe will start with doing a simple NMAP scanSep 20, 2020Sep 20, 2020
Muhammad ShahzadCyber Kill ChainThe process for intrusion detection developed by Lockheed Martin is based on an actual military model(F2T2EA) “Find, Fix ,Track, Target…Aug 8, 2020Aug 8, 2020