Author: ReZa AdineH
-
Review on windows lateral movement tactics and techniques
Introduction: Windows lateral movement is a tactic used by attackers to move laterally within a network after they have gained initial access. The goal of lateral movement is to gain access to sensitive information, such as sensitive files and data, and to escalate their privileges in order to achieve their ultimate objective, such as data…
-
Mapping NIST CSF to Incident response process
Introduction: The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) provides organizations with a set of guidelines for improving their cybersecurity posture. The NIST CSF is a valuable resource for organizations looking to better understand and manage the risks associated with their assets, systems, and data. Incident response is the process of detecting,…
-
Threat intelligence
Introduction: Threat intelligence is the process of collecting, analyzing, and using information about current and potential threats to an organization’s assets, systems, and data. Threat intelligence is a critical component of a comprehensive cybersecurity program, as it provides organizations with the information they need to understand and respond to the evolving threat landscape. Background: The…
-
A quick review on the MITRE ATT&CK matrixA quick review on
Introduction: The MITRE ATT&CK matrix is a comprehensive and well-documented framework that provides organizations with a comprehensive understanding of the tactics, techniques, and procedures used by cyber attackers. The matrix is a valuable resource for organizations to use as a starting point for developing their threat intelligence and for improving their cybersecurity posture. Background: The…
-
A quick review on NIST CSF
The NIST Cybersecurity Framework (CSF) is a risk management framework developed by the National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risk. The framework provides a common language for understanding, managing, and communicating cybersecurity risk and provides a structure for organizations to develop and implement cybersecurity programs. The NIST…
-
This is to introduce Reza Adineh blog
Hello, My name is Reza Adineh and I am a Cyber Security enthusiast. I was born and grew up in Tehran and worked in cyber security specifically in Security Operation Center design and architecture, SOC process and playbook development such as Incident Response, Threat Detection, Threat Intelligence, forensic investigation, Cyber defense, SIEM Engineering, and security…