• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

threat

  1. K

    Ferrari Hacked: Luxury Automaker Refuses to Pay Ransom for Client Data Held Hostage by Threat Actor

    Italian luxury automaker Ferrari has been hacked by an unknown threat actor who has demanded a ransom in exchange for certain client contact details. Ferrari made the announcement of the “cyber incident” on its website recently, stating that its wholly-owned Italian subsidiary was contacted by a...
  2. itsMe

    Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

    Description: In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses...
  3. S

    ThreatHound - tool which help you on your IR & Threat Hunting

    This tool, called "ThreatHound," is a powerful and versatile tool written in Python (with a new C version available for Linux-based systems) that helps with IR & Threat Hunting & CA. With ThreatHound, you can drop your event log file and analyze the results easily. It now supports...
  4. itsMe

    Threat Hunting Essential Training

    Description Just because an organization opts to spend a fortune on cybersecurity doesn’t mean that it’s immune to an attack. While properly configured technology can stop most of today’s cyber-attacks, hackers have become experts at evading detection. In this course, information security...
  5. itsMe

    APT-Hunter v3.0 - Threat Hunting tool for windows event logs

    APT-Hunter is a Threat Hunting tool for windows event logs which made by the purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity. This tool will make good use of the windows event logs collected and make...
  6. itsMe

    Cybersecurity Threat Hunting Professional

    What you’ll learn     To be an excellent threat hunter, you’ll need the right mentality and talents.     How to carry out simple threat hunting     How to set up environments for threat hunting, from the most basic to the most advanced.     Recognize the different techniques for danger hunting...
  7. itsMe

    Alienvault - The World’s First Truly Open Threat Intelligence

    The World’s First Truly Open Threat Intelligence Community Gain FREE access to over 19 million threat indicators contributed daily Collaborate with over 100,000 global participants to investigate emerging threats in the wild Quickly identify if your endpoints have been compromised in major...
  8. itsMe

    Watcher v1.1.1 - Open Source Cybersecurity Threat Hunting Platform

    Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should be used on webservers and available on Docker. Watcher capabilities     Detect emerging vulnerability, malware using social network & other...
  9. itsMe

    ThreatPursuit-VM: Threat Pursuit Virtual Machine

    ThreatPursuit-VM Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly. Installed Tools Development...
  10. 0x1

    ACT | Semi-Automated Cyber Threat Intelligence

    ACT | Semi-Automated Cyber Threat Intelligence ACT enables advanced threat enrichment, threat analysis, visualisation, process automation, lossless information sharing and powerful graph analysis. Its modular design and APIs facilitate implementing new workers for enrichment, analysis...
Back
Top