SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.

Understanding Threat Emulation, Energetic Bear

Understanding Threat Emulation

Threat Emulation is the process of mimicking the TTFs of a specific threat. Threats of any variety can be emulated Zero-day or custom attacks Script kiddie to advanced adversary Emulation of specific threat (Botnets, DDOS, Ransomware, Specific Malware, APT, etc.) Scenario driven assessments are typically driven by emulation of some level of threat. This may…

Get to Know the Roles and Responsibilities of a SOC Analyst and the SOC Team

Stay Ahead of Threats Part 2: Get to Know the Roles and Responsibilities of a SOC Analyst and the SOC Team

Attacks are continuously developing and expanding; thus, protecting your organization from threats, cyber-attacks, and data breaches must be a top priority. Other than technology, organizations will also need qualified security experts who can proficiently manage security-based alerts and scenarios. The main goals and responsibilities of a SOC team are continuously monitoring security, detecting, analyzing, and…

Detect-Malicious-Control-Panel threat hunting

Detect Malicious Control Panel items with this free Splunk Detection Rule

Windows Control Panel items are utilities that allow users to view and adjust computer settings. Control Panel items are registered executable (.exe) or Control Panel (.cpl) files, the latter are actually renamed dynamic-link library (.dll) files that export a CPlApplet function. Control Panel items can be executed directly from the command line, programmatically via an…

Stay Ahead of Threats Part 1: A Comprehensible Introduction to Security Operations Center (SOC)

Cybercriminal activity is among the most significant challenges that humanity will face in the next two decades. In 2019, over 15.1 billion records were exposed. According to Cybercrime Ventures, the global cost of cybercrime will rise from US$3 trillion in 2015 to US$6 trillion by 2021. Cybercriminals steadily make efforts to attack and compromise sensitive corporate data;…