๐ง Knowledge Articles
Detailed write-ups and insights across malware analysis, forensics, threat hunting, and more.
๐ Knowledge Articles ๐
Cybersecurity Insights at Your Fingertips! ๐๐ก
Welcome to the Knowledge Articles repository! ๐ฏ Here, you'll find concise and actionable
cybersecurity knowledge covering various essential topics. Whether you're a beginner or
a seasoned analyst, there's something valuable for everyone! ๐ก๏ธ๐ป
๐ Contents
- Diamond Model of Intrusion Analysis โ Analyzing relationships between adversary, infrastructure, victim, and capability.
- Email Attachment Analysis โ Techniques for detecting and examining potentially malicious email attachments.
- Email Headers โ Analyzing metadata in email headers to trace origins and identify spoofing.
- Malware Types โ Overview of malicious software such as viruses, worms, Trojans, and ransomware.
- SOC Fundamentals โ Core principles, processes, and roles within a Security Operations Center.
- The Cyber Kill Chain โ A model describing the sequential phases of a cyberattack and defensive strategies.
- MITRE ATT&CK Framework โ A globally recognized knowledge base of adversary TTPs.
- Traffic Light Protocol โ A standardized system for classifying and sharing sensitive cybersecurity information.
- Anatomy of a URL โ Breaking down URL components for threat hunting and phishing analysis.
- Digital Forensics โ Collecting, preserving, and analyzing digital evidence during investigations.
- Pyramid of Pain โ A model showing difficulty levels of indicators for adversaries to change once defenders act.
- YARA โ A rule-based language for identifying and classifying malware families.
- Triaging Forensic Artefacts โ Prioritizing and analyzing digital artefacts to identify relevant evidence quickly.
- Incident Response โ Structured approach to detecting, containing, and eradicating security incidents.
- Malware Analysis โ Examining malicious software to determine behavior, capabilities, and impact.
- Common Attack Signatures โ Patterns commonly associated with known cyberattacks.
- Endpoint Detection & Response โ Continuous monitoring, detection, and response for endpoint threats.
- Flare VM - Malware Lab Provisioning โ A specialized Windows environment for malware analysis.
- A Programโs Perspective of Memory โ Explaining how programs interact with system memory.
- Malware Analysis Framework โ A structured methodology for static and dynamic malware analysis.
- Cryptography โ The science of securing information through encryption and key management.
- Security Controls โ Safeguards and countermeasures to protect assets and ensure CIA.
- CIA-AAA Triads โ Two foundational security models: CIA Triad and AAA Triad.
- Change Management โ The structured process for planning and implementing IT/security changes.
๐ข Disclaimer: All content within this repository has been curated by the author
to the best of their ability and fact-checked as of 2025. However, it cannot be 100% authenticated.
Use the information at your own discretion. ๐