Research, document, test, and evaluate serval current industry information security-based threats, malicious activities, covert methodology, encryption technologies, mitigation techniques, or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity, and availability.
|
In this paper, I discuss the arrest of an individual accused of using a RAT to spy on young victims. I end the paper with a small discussion about ethics and ethics in cyber security.
This paper was based on a TryHackMe room focusing on wifi hacking and techniques used.
I discuss the APT known as APT1, some of their tactics and techniques used. I then discuss ways to can defend against this group.
In this paper, I specifically focused on the TTPs of the cybercrime group known as Blackmatter. I link the group's TTPs to the MITRE ATT&CK framework.
I discuss the Emotet banking trojan again talking about their attack techniques and following it up are ways to help defend your organization from this threat group.
In this paper, I go through most of the 12 tactics that MITRE covers.
This was by far one of the most fun I had with an assignment. The goal was to take an infected machine and go through and try and remove the malware. I was unsuccessful but learned so much!
I discuss the vulnerability (CVE-2021-26084) affecting confluence servers which are used across thousands of organizations. The vulnerability existed in an OGNL injection. I wrap up my presentation with ways to detect and remediate this vulnerability.
|