Cyber Incident Response Team Playbook Battle Cards
-
Updated
May 10, 2024
Cyber Incident Response Team Playbook Battle Cards
Cyber Threat Intelligence Data, Indicators, and Analysis
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Secure Coding Practices for PHP – A white paper and code snippets on best practices for securing PHP applications, covering input validation, authentication, encryption, and more. 🔒🚀
Highly configurable scripts for a web scraper intended to be used for cyber threat intelligence
🔮 Collect, process, and automatically distribute Cyber Threat Intelligence from RSS feeds across multiple platforms.
Semi-Automate asset vulnerabilities monitoring for CyberSecurity experts looking to stay updated on the latest updates.
Las 100 principales amenazas cibernéticas y sus soluciones. Top 100 Cyber Threats & Solutions.
Learn about the MARIJUANA web shell, a PHP-based backdoor with stealth capabilities designed to bypass server security measures. Understand its features, potential risks, and implications for cybersecurity.
In-depth malware research report analyzing TrickBot's evolution from a banking trojan to a modular threat tool used in ransomware campaigns. Covers threat actor attribution, MITRE ATT&CK mapping, propagation techniques, and defensive strategies.
🔐 Malware Detection System using classical ML models to classify and detect malicious software based on behavior and feature patterns.
A hands-on threat hunting scenario focused on detecting Tor-based adversary activity
🛡️ Digital safety session at Lincoln Corner Muzaffarabad. Covers cyber threats in Pakistan with real cases, prevention tips, and resources.
"A detailed explanation and awareness guide on CAPTCHA Social Engineering Attacks where fake CAPTCHAs are used to hijack the clipboard and deliver silent malware via user action."
Comprehensive presentation on cybersecurity best practices for SMEs, highlighting key threats like phishing, ransomware, and DDoS attacks, and offering AI-powered solutions to enhance business resilience.
Add a description, image, and links to the cyber-threats topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threats topic, visit your repo's landing page and select "manage topics."