Author name: DigitalSentinel

Cybersecurity Exercise: Understanding and Applying the MITRE ATT&CK Framework

Objective: The aim of this exercise is to familiarize students with the MITRE ATT&CK framework by analyzing various cybersecurity scenarios. By dissecting real-world-like attack narratives, you’ll learn how to identify Tactics, Techniques, and Procedures (TTPs) commonly used by attackers, particularly Advanced Persistent Threats (APTs). Duration: This is a 30-minute exercise broken down into four scenarios, […]

Cybersecurity Exercise: Understanding and Applying the MITRE ATT&CK Framework Read More »

Log Samples

In our journey to comprehend the diverse world of system logs, let’s delve into these samples extracted from different systems. These examples aim to offer a glimpse into the log entries you might encounter in various scenarios. It’s crucial to remember that log formats can undergo modifications as products evolve over time. Furthermore, it’s worth

Log Samples Read More »

Unmasking Active Directory Threats: Defending the Heart of Enterprise IT

Active Directory serves as the pulsating core of modern enterprise IT systems. It offers organizations the prowess to efficiently manage an array of IT components, ranging from laptops, desktops, and servers to mobile devices, network equipment, printers, and beyond—essentially, any entity tethered to the network. With the agility it brings, specifying device and user permissions

Unmasking Active Directory Threats: Defending the Heart of Enterprise IT Read More »

Balancing Caution and Creativity: Applying Six Thinking Hats to New Ideas

I picked up Edward De Bono’s book Six Thinking Hats a few years ago. His book presents the idea of categorizing thinking into six categories or Hats. Categorizing Thinking: The Six Thinking Hats Approach Black Hat: Focuses on identifying potential problems, risks, and cautious aspects of an idea or solution. White Hat: Gathering data, information, and facts

Balancing Caution and Creativity: Applying Six Thinking Hats to New Ideas Read More »

HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts – Enterprise Information Security

Introduction Over the years, as information security teams, we have always been on the defense, forever waiting for the next security event before we can act. Although part of our strategy is to anticipate the adversary, we have not truly started to learn from the trends of the adversary to be prepared for the next

HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts – Enterprise Information Security Read More »

Wireshark Tips and Tricks: Essential Filters and Combinations for Network Investigations

Welcome to the Wireshark Tips and Tricks table! In this comprehensive reference, we present the 20 most common filters used in Wireshark, arranged in ascending order of popularity. These filters serve as invaluable tools for efficient network traffic analysis, allowing you to gain insights into various protocols and security threats. Each filter comes with essential

Wireshark Tips and Tricks: Essential Filters and Combinations for Network Investigations Read More »

Scroll to Top