Open in app

Sign In

Write

Sign In

Muhammad Shahzad
Muhammad Shahzad

12 Followers

Home

About

Nov 11, 2020

APT 41: Techniques Based on MITRE

APT41(Double Dragon APT41, a dual espionage and cybercrime operation) APT41 is a group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity. APT41 has been active since as early as 2012. …

Apt41

3 min read

APT 41: Techniques Based on MITRE
APT 41: Techniques Based on MITRE
Apt41

3 min read


Oct 23, 2020

Ransomware Phenomenon

Ransomware is a fast-growing threat of malware that targets a wide range of companies, government agencies, financial institutions and other organizations. The latest development in ransomware attacks is driven by a new form of ransomware called Maze. The cybercriminals behind the other type of Ransomware Ryuk, ensure that the malware…

Ransomware

4 min read

Ransomware Phenomenon
Ransomware Phenomenon
Ransomware

4 min read


Oct 12, 2020

Ransomware As A Service

Cloud used by the Threat Actors Ransomware As A Service Given the rapid scaling of the Ransomware market, a recent report on Impervas services and tools, claims and touted that high-quality Ransomware is offered at a fraction of the cost of traditional Ransomware as a service (RaaS) and even as an alternative to Ransomware. …

Ransomware

5 min read

Ransomware As A Service
Ransomware As A Service
Ransomware

5 min read


Oct 12, 2020

Emotet: Malware Trojan and A Trickbot

The Trickbot banking Trojan and the Ryuk Ransomware are two of the more common follow-ons. …

Malware

4 min read

Malware

4 min read


Oct 12, 2020

MITRE Atta&K Framework

The Framework is a free, globally accessible service that provides organizations seeking to strengthen their cybersecurity strategy with comprehensive and up-to-date information on cyber threats. Security teams can use the framework to validate their defenses against common attack vectors and identify defenses to continuously advance their strategies. The MITRE — ATT&CK Framework, a measure to improve cyber defense with the MITre — ATT&CK Framework provides expert guidance to help cyber defense experts learn how to use it to improve their defenses against the most common types of cyber attacks, such as the pronounced Mitre attack, phishing and ransomware.

Mitre Attack Framework

4 min read

MITRE Atta&K Framework
MITRE Atta&K Framework
Mitre Attack Framework

4 min read


Sep 20, 2020

OpenAdmin — Hack the Box — Writeup

We will start with doing a simple NMAP scan

Hackthebox

4 min read

OpenAdmin — Hack the Box — Writeup
OpenAdmin — Hack the Box — Writeup
Hackthebox

4 min read


Sep 19, 2020

Bastard — Hack the Box — Writeup

nmap — A 10.10.10.9

Hacking

4 min read

Bastard — Hack the Box — Writeup
Bastard — Hack the Box — Writeup
Hacking

4 min read


Aug 8, 2020

Cyber Kill Chain

The process for intrusion detection developed by Lockheed Martin is based on an actual military model(F2T2EA) “Find, Fix ,Track, Target, Engage and Asses”. There are Seven stages in this model. 1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. Installation 6. Command and Control 7. Actions on Objectives Each infiltration…

Cyber Kill Chain

3 min read

Cyber Kill Chain

3 min read

Muhammad Shahzad

Muhammad Shahzad

12 Followers

CyberSecurity Enthusiast

Following
  • Thexssrat

    Thexssrat

  • Ensar Seker

    Ensar Seker

  • Katlyn Gallo

    Katlyn Gallo

  • Shafiqa Iqbal

    Shafiqa Iqbal

  • Orwa Atyat

    Orwa Atyat

See all (10)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech