Triaging the Week 026

Dark web marketplace gets taken down, new attacks abuse the cloud and legitimate services, and China uses ORB networks to evade detection in triaging the week 026.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
Dark web marketplace gets taken down, new attacks abuse the cloud and legitimate services, and China uses ORB networks to evade detection in triaging the week 026.
Crown Jewel Analysis is a fundamental risk management methodology you should know. This guide will teach you what it is, how to use it, and tools to help.
New hacking attacks target cloud and DNS, MITRE releases a new framework, and Windows Quick Access gets abused in triaging the week 025.
Learn the Traffic Light Protocol (TLP). A fundamental cyber threat intelligence framework used to classify information for secure intelligence sharing.
New MacOS malware and DHCP attacks, LockBit admin locked up, and hackers pose as journalists in triaging the week 024.
Explore the top five Cyber Kill Chain challenges you will face when using this cyber security model in the real world and how to overcome them.
Okta comes under attack, dating scams are on the rise, and millions of Docker repositories are pushing malware in triaging the week 023
Unlock the power of YARA rules and build your own custom detections. Learn how to write them effectively and use them in the real world with examples.
Learn to create honey files, discover why programming is needed for cyber security, and raise your productivity in triaging the week 022.
This full guide will help you discover the power of the Analysis of Competing Hypotheses technique and learn how to analyze intelligence more efficiently.
Zero-day in Palo Alto firewalls, new steganography phishing emails, and Chirp Systems’ smart locks failing in triaging the week 021.
Elevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start using this analytical technique.
Scams everywhere, Israeli spy chief sucks at opsec, and a new flaw in SharePoint lets hackers evade detection in triaging the week 020.
Discover the top five challenges with indicators (IOCs) and how to overcome them to improve the effectiveness of your cyber security operations.
Backdoor found in open-source tool, India rescues citizens from cyber slavery, and Microsoft slammed over breach in triaging the week 019.