Shreenkhala BhattaraiinInfoSecStoriesPowershell logging for Blue TeamersAs a blue teamer, having a robust and comprehensive logging system is essential for effective PowerShell monitoring and detection…Feb 26Feb 26
Shreenkhala BhattaraiSysmon For LinuxSysmon for Linux is a powerful system monitoring tool designed to give deep insights into the processes and activities occurring in Linux…Feb 5Feb 5
Shreenkhala BhattaraiMaximizing SIEM Efficiency: A Guide to Prioritizing Log Sources for Effective SOC ImplementationSecurity information and event management (SIEM) is an essential part of a strong cybersecurity strategy. It helps organizations detect and…Sep 12, 2023Sep 12, 2023
Shreenkhala BhattaraiUnraveling RDP Events: Understanding Remote Desktop Protocol for Enhanced Security.Within the security operation center, visibility is everything. The security operations team responds swiftly and forcefully to potential…Jul 28, 2023Jul 28, 2023
Shreenkhala BhattaraiThreat Intelligence 101: An Introduction to Cybersecurity’s Frontline DefenseCybersecurity has historically been inward-looking on identifying what we want to protect and then building defenses around them over time…Jul 20, 2023Jul 20, 2023
Shreenkhala BhattaraiEnhancing Threat Detection with Microsoft SysmonCyber Threats are becoming more sophisticated and common these days. These threats have the potential to compromise sensitive data…Jun 20, 2023Jun 20, 2023
Shreenkhala BhattaraiEffective Cybersecurity Strategies: Understanding the Cyber Kill Chain and How SOC Analysts Use It…In today’s digital age, businesses and organizations are constantly at risk of being targeted by cybercriminals. These malicious actors…Feb 15, 2023Feb 15, 2023
Shreenkhala BhattaraiSecurity Analyst’s Trinity: MISP InstallationMISP (Malware Information Sharing Platform) is an open-source software platform for collecting, storing, distributing, and sharing…Jan 13, 2023Jan 13, 2023
Shreenkhala BhattaraiPhishing comes with different facesSmishing is a type of cyber attack that uses social engineering techniques to trick individuals into giving sensitive information, such as…Dec 18, 2022Dec 18, 2022
Shreenkhala BhattaraiinCryptoGen NepalCertification & Resources to develop Skills as SOC AnalystSecurity operations center (SOC) is a prominent topic right now. In this area, there is a significant skills gap, and there is a high…Sep 20, 20212Sep 20, 20212