CYBINT collection similarities between Iran and North KoreaSimilarities and behaviors that exist in cyberspace for CYBINT collection between rogue totalitarian states, Iran and North Korea are…Jul 30, 2021Jul 30, 2021
Advanced Persistent Threats (APTs)The term APT was first instituted in 2006 by United States Air Forces (USAF) to describe a network based attack technique and its intrusion…Jul 29, 2021Jul 29, 2021
E-mail Sentiment Analysis using VADERSince mid-90’s, modes of correspondence and communication have tremendously evolved to services like real-time chat rooms, blogs…Nov 30, 2020Nov 30, 2020
Use of Shannon Entropy Estimation for DGA DetectionFor threat hunters and security researchers, Advanced Persistent Threats (APTs) are always one step ahead especially in case of…Nov 23, 2020Nov 23, 2020
Using Machine Learning for DNS Exfiltration / Tunnel DetectionCyber Security Defensive Mechanisms built on Supervised Machine Learning Algorithms heavily rely on old historical logs of recent Cyber…Nov 21, 20201Nov 21, 20201