Shreenkhala BhattaraiinInfoSecStoriesPowershell logging for Blue TeamersAs a blue teamer, having a robust and comprehensive logging system is essential for effective PowerShell monitoring and detection…8 min read·Feb 26, 2024----
Shreenkhala BhattaraiSysmon For LinuxSysmon for Linux is a powerful system monitoring tool designed to give deep insights into the processes and activities occurring in Linux…4 min read·Feb 5, 2024----
Shreenkhala BhattaraiMaximizing SIEM Efficiency: A Guide to Prioritizing Log Sources for Effective SOC ImplementationSecurity information and event management (SIEM) is an essential part of a strong cybersecurity strategy. It helps organizations detect and…7 min read·Sep 12, 2023----
Shreenkhala BhattaraiUnraveling RDP Events: Understanding Remote Desktop Protocol for Enhanced Security.Within the security operation center, visibility is everything. The security operations team responds swiftly and forcefully to potential…7 min read·Jul 28, 2023----
Shreenkhala BhattaraiThreat Intelligence 101: An Introduction to Cybersecurity’s Frontline DefenseCybersecurity has historically been inward-looking on identifying what we want to protect and then building defenses around them over time…6 min read·Jul 20, 2023----
Shreenkhala BhattaraiEnhancing Threat Detection with Microsoft SysmonCyber Threats are becoming more sophisticated and common these days. These threats have the potential to compromise sensitive data…4 min read·Jun 20, 2023----
Shreenkhala BhattaraiEffective Cybersecurity Strategies: Understanding the Cyber Kill Chain and How SOC Analysts Use It…In today’s digital age, businesses and organizations are constantly at risk of being targeted by cybercriminals. These malicious actors…4 min read·Feb 15, 2023----
Shreenkhala BhattaraiSecurity Analyst’s Trinity: MISP InstallationMISP (Malware Information Sharing Platform) is an open-source software platform for collecting, storing, distributing, and sharing…3 min read·Jan 13, 2023----
Shreenkhala BhattaraiPhishing comes with different facesSmishing is a type of cyber attack that uses social engineering techniques to trick individuals into giving sensitive information, such as…2 min read·Dec 18, 2022----
Shreenkhala BhattaraiinCryptoGen NepalCertification & Resources to develop Skills as SOC AnalystSecurity operations center (SOC) is a prominent topic right now. In this area, there is a significant skills gap, and there is a high…5 min read·Sep 20, 2021--2--2