PinnedPublished inCryptoGen NepalCyber Kill Chain — Offensive and Defensive ApproachThis is the follow-up blog of the previous one; check it out in here if you haven’t already. Whereas the previous blog was to provide…Sep 5, 20211Sep 5, 20211
PinnedPublished inCryptoGen NepalSIEM Basics: EPS and MPS for Selecting Suitable EDR SolutionIn this blog, I’m going to specifically write on Events Per Second (EPS) and Message Per Second (MPS) factors along with their prime…Jun 26, 2021Jun 26, 2021
PinnedPublished inCryptoGen NepalMalicious PowerShell Analysis —Blue Team Labs Online WalkthroughThe Malicious PowerShell Analysis challenge from Blue Team Labs Online has already been retired. This challenge was mainly about clarifying…May 28, 2021May 28, 2021
Published inCryptoGen NepalELI5: Explain like I’m Five — Cyber Kill ChainIn the Cyber security field, one must be aware of the methods and strategies used by cybercriminals in order to protect, detect attacks…Aug 7, 2021Aug 7, 2021