Often Cyber Threat Intelligence (CTI) analysts are the one that provides this report to the leadership through MITRE ATT&CK framework’s threat modelling to map adversaries’ Tactics, Techniques, and Procedures (TTPs).

What if the CISO itself learned this and even able to level-up to the next? Is it not more effective…


EXECUTIVE SUMMARY
On December 14, SolarWinds filed a Form 8-K disclosure with the Securities and Exchange Commission (SEC), which is used to inform shareholders of publicly held corporations of events that may impact the value of the stock, in relation to the reported intrusion activity. The filing does not provide any…


⭕️DISCLAMIER
None specified name of vendor nor plug-in has been disclosed to this article and the sole purpose is to enlighten the readers to be more cautious on what they download and use for either personal or business cases. “Human knowledge belongs to the world! –antitrust”.

ONCE UPON A TIME
Last…


Synopsis

When I spoke at one of the local cybersecurity conferences in Panay last November of 2017 on “Evading Social Engineering Attack | Hacker’s Frontier,” specifically with phishing, most of the approaches discussed were manual. …


Synopsis

“The human is the weakest link in the cybersecurity chain.” If you don’t know about this “gossip” yet, well, it’s a fact.When we hear about phishing, our normal response is to be careful about clicking links from email content that direct us to malicious websites on the Internet, yet we…


When was the first time I did a public speaking, was it after my Masteral in 2006 with PSITE/SSITE (topic: e-commerce)? That is something I could no longer remember. …


INTRODUCTION

Just like any other organization, ICS/SCADA is not free from cybersecurity attacks. In fact, this is the most dangerous among other compared to others. It does not just damage the organization’s reputation or implicates financial impact but lives — Cyber Kinetic. …


If you could nail this in 45 seconds pitch during your interview, then it is most likely you will get the job unless you messed-up with the succeeding questions. …


Threat hunting is a proactive task with an assumption that your organization has already been breached and you wanted to beat the average “dwell time” of 256 days; at least for me as a DFIR practitioner. …


One day, a recruiter phoned me for a possible opportunity in a US-based banking corporation to fill-up a position as a Cyber Threat Intelligence Analyst. He mentioned that this is an additional headcount to complement their Threat Hunting team.

I paused for a while then asked him what is the…

Art Rebultan

Cyber-security is not a Job, calling!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store