Popular Posts
-
Story Logs
-
Initial access: This basically means how an attacker gets into your environment. its the first step where an attacker tries to gain entry in...
-
For Linux Systems: SSH Failed Logins: This gets triggered when someone tries to log into a Linux server via SSH (for example, using PuTTY)...
-
Reconnaissance Some guard duty findings types related to reconnaissance are below. AWS GuardDuty detects a wide range of suspicious or mal...
-
Multiple Login Failures from a Single User Objective: The objective of this use case is to identify brute force attacks that could be dictio...
-
Malicious URL access detected means when a user or host attempts a connection to a malicious website, like phishing pages, malware, or comm...
-
T shark - TShark is the command-line version of Wireshark It performs similar network packet capture and analysis functions but withou...
-
Persistence: Adversaries/attackers are trying to remain inside your system even after you remove them. After the attacker gains access, they...
-
Multiple VPN Logins From Different Countries means that the same user account is trying to log in from multiple geographical locations thro...
-
🔐 Welcome to Security Manadhey Step into the world of real-world cybercrime investigations! 🕵️♀️ What We Offer: Access to simulate...