Cyber Threat Intelligence
-
VMware
IBM QRadar SIEM | SOC Analyst Training | Day 5
Welcome to Day 5 of IBM QRadar Analyst Training! π In this video, we kick off our comprehensive training series designed for aspiring SOC (Security Operations Center) analysts. Learn how to leverage IBM QRadar, one of the leading SIEM (Security Information and Event Management) tools, to detect and respond to cybersecurity threats. Whether you’re new to cybersecurity or looking to…
Read More » -
VMware
Strategies for Active Defense against Pre-Ransomware and Ransomware Attacks
SANS Ransomware Summit 2024 Defending Against the Cyber Siege: Strategies for Active Defense against Pre-Ransomware and Ransomware Attacks Syed Zaidi, Senior Incident Response Analyst, Sophos As the threat landscape continues to evolve, organizations face an ever-growing risk of falling victim to ransomware attacks. These malicious attacks not only jeopardize sensitive data but also threaten business continuity and financial stability. In…
Read More » Ransomware Running Wild in the Cloud
Threat actors evolved their methods conducting ransomware attacks in the cloud and on-premise during 2023 and show no signs of stopping. This discussion addresses initial access factors and threat actor trends associated with cloud ransomware attacks, including a shift to server-side exploits and prioritization of data exfiltration over data encryption. Content also includes notable incidents, attack models, and examples of…
Read More »11 TOOL 06: Installing and Configuring MetaSploitable Machine (Cyber Security Udemy Course for free)
11 TOOL 06: Installing and Configuring MetaSploitable Machine | Cyber Security Udemy Course for Free Welcome to the sixth tool in our free Cyber Security Udemy Course! In this video, we’ll guide you through the process of downloading, installing, and configuring the MetaSploitable machine. This intentionally vulnerable VM is perfect for practicing penetration testing and improving your ethical hacking skills.…
Read More »