UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐—ฆ๐—ข๐—ฃ๐˜€ (๐—ฆ๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐—ฑ๐˜‚๐—ฟ๐—ฒ๐˜€) / ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€ / ๐—ฅ๐˜‚๐—ป๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€โœจ

A playbook, also known as a standard operating procedure (SOP), consists of a set of guidelines to handle security incidents and alerts in the SOC.

Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.

These gudelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.

Source: https://lnkd.in/eudq_jJi
Thanks to Societe Generale

โœ…Worm Infection: https://lnkd.in/ez-kq98Y
โœ…Social Engineering: https://lnkd.in/e_FJbxDP
โœ…Information Leakage: https://lnkd.in/eeN8KX8g
โœ…Insider Abuse: https://lnkd.in/ep4p_THk
โœ…Customer Phishing: https://lnkd.in/ekTfY7vz
โœ…Scam: https://lnkd.in/eUHwG3fF
โœ…Trademark infringement: https://lnkd.in/e3P3xfeb
โœ…Phishing: https://lnkd.in/eYTi3RQ8
โœ…Ransomware: https://lnkd.in/eRkctdQn
โœ…Large_scale_compromise: https://lnkd.in/eYFF43b4
โœ…3rd-party_compromise: https://lnkd.in/e8SAu5MT
โœ…Windows Intrusion: https://lnkd.in/eXCpcx9V
โœ…Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
โœ…DDOS: https://lnkd.in/eQ7zZzVt
โœ…MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
โœ…Website-Defacement: https://lnkd.in/eraNiHcH
โœ…WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
โœ…Blackmail: https://lnkd.in/eW3zGcPs
โœ…SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9

Ref:
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐Ÿ” Tax-Themed Phishing Campaign Targets Pakistan with Stealthy Backdoor

https://undercodenews.com/tax-themed-phishing-campaign-targets-pakistan-with-stealthy-backdoor/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐€ ๐…๐ซ๐ž๐ž ๐€๐œ๐ญ๐ข๐ฏ๐ž ๐ƒ๐ข๐ซ๐ž๐œ๐ญ๐จ๐ซ๐ฒ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐‹๐€๐๐ฌ!

Game of Active Directory is an Open-Source project developed by Orange Cyber Defense that provides a vulnerable Active Directory environment.

It's designed for security professionals to practice and improve their skills in a controlled setting:

โ€ข Hands-on learning without risking a production environment.
โ€ข Opportunity to explore advanced attack and defense techniques.
โ€ข Offers a cost-effective way to build cybersecurity expertise.
โ€ข Facilitates a deeper understanding of AD security best practices.

Source: https://lnkd.in/gxN-_nTw

Kindly note that GOAD is intentionally designed to be highly vulnerable. It is strongly advised to refrain from replicating its configuration for production environments.

GOAD helps threat hunters simulate AD attacks, refine detection skills, and test response strategies in a safe, controlled environment.

Discover over 10+ essential data analysis techniques for effective threat hunting in my "Cyber Threat Hunt 101" YouTube series, explained simply: https://lnkd.in/gkVB6B2j

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–