Soc Investigation (@bala_hacky) 's Twitter Profile
Soc Investigation

@bala_hacky

Home for Cyber Security Analyst & Incident Responders #informationsecurity #malware #cybersecurity #csirt #SIEM #cyberdefense #cyberattacks #mitre #IOC #IOA

ID: 838417624283426817

linkhttps://socinvestigation.com calendar_today05-03-2017 15:55:13

434 Tweet

328 Followers

520 Following

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Understanding Microsoft Defender Threat Intelligence (Defender TI) Read Here: socinvestigation.com/understanding-… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #defender #hackerstayaway

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

New WhiskerSpy Backdoor via Watering Hole Attack -Detection & Response Read Here: socinvestigation.com/new-whiskerspy… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #APT #hackerstayaway

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Vidar Infostealer Malware Returns with new TTPS – Detection & Response Read Here: socinvestigation.com/vidar-infostea… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #APT #hackerstayaway #vidar

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

How to Detect Malware Hijacking Digital signatures Read Here: socinvestigation.com/how-to-detect-… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #defender #incidentresponse #csirt #hijack

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Emotet Malware with Microsoft OneNote- How to Block emails based on File attachment extension in Office 365 Read Here: socinvestigation.com/emotet-malware… #cybersecurity #informationsecurity #malware #ThreatHunting #socanalyst #CyberSecurityNews #incidentresponse #csirt #Emotet #onenote

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Phishing Scam Alert: Fraudulent Emails Requesting to Clear Email Storage Space to Deliver New Emails Read Here: socinvestigation.com/phishing-scam-… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #phishing #CSIRT

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

How to Perform Static Code Analysis on Packed Malware ? Read Here: socinvestigation.com/how-to-perform… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #defender #incidentresponse #csirt #static #packedmalware

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

CVE-2023-21554 – Hunt For MSMQ QueueJumper In The Environment Read Here: socinvestigation.com/cve-2023-21554… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #QueueJumper #ThreatHunting

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Threat Hunting Playbooks For MITRE TACTICS Read Here: socinvestigation.com/threat-hunting… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #mitre #playbooks

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Wireshark Filters for Security Analyst Read Here: socinvestigation.com/wireshark-filt… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #Wireshark #pcap

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Threat Hunting Hypothesis Examples: Start For a Good Hunt! Read Here: socinvestigation.com/threat-hunting… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #Hypothesis

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Advanced Cyber Security Interview Questions and Answers Read Here: socinvestigation.com/advanced-cyber… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #interview #hacker

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Incident Response For Common Attack Types Read Here: socinvestigation.com/incident-respo… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #linux

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Cybersecurity Playbook for SOC Read Here: socinvestigation.com/cybersecurity-… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #incidentresponse #csirt #linux #playbooks

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Pestudio: Initial Malware Assessment Made Simple Read Here: socinvestigation.com/pestudio-initi… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #pestudio #incidentresponse #csirt #static #packedmalware

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

The Interactive Disassembler – IDA Pro Read Here: socinvestigation.com/the-interactiv… #cybersecurity #informationsecurity #malware #ioc #iocs #ThreatHunting #siem #soc #socanalyst #CyberSecurityNews #microsoft #pestudio #incidentresponse #csirt #Disassembler

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

How to Bypass DLP Policies & General Defense Strategies #DLP #dlpbypass #CyberSecurity #soc #SIEM #Malware Read Here: socinvestigation.com/how-to-bypass-…

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

How to Detect Malware C2 with DNS Status Codes Read Here: socinvestigation.com/how-to-detect-… #Malware #dns #c2 #Christmas #csirt #soc #siem #CyberSecurity #DFIR

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

Linux Event Logs and Its Record Types – Detect & Respond Read Here: socinvestigation.com/linux-event-lo… #Linux #malware #audit #logs #Siem #incident #csirt #events #redhat #Ubuntu

Soc Investigation (@bala_hacky) 's Twitter Profile Photo

What is Session Hijacking/Cookie Hijacking – DEMO #csirt #appsec #CyberSecurity #Hijacking #waf Read Here: socinvestigation.com/what-is-sessio…