Our collaborative team developed a sophisticated data extraction and filtering tool to empower blue teams in identifying new vulnerabilities. Through intelligent keyword categorization, customizable source lists, and risk assessment algorithms, Harvestor delivers accurate and up-to-date vulnerability intelligence. Featuring a user-friendly GUI and error detection mechanism, it streamlines the process of extracting, filtering, and prioritizing threats from internet feeds, enhancing cybersecurity defense strategies.
This project involved deploying a hybrid infrastructure using Azure Virtual Machines. A Windows Server 2019 domain controller and two Windows Server 2012 R2 servers were set up, alongside Windows 7 VMs connected to the domain. Multiple Virtual Networks simulated different subnets, while Azure Monitor tracked performance and generated alerts. The project showcased effective deployment, network segmentation, and proactive monitoring within a cloud environment, emphasizing the potential of Azure for modern IT solutions.
In this project, a cybersecurity incident was investigated involving memory, autorun, network data, and disk images from a domain controller and a user’s computer. Tools like Autopsy, Volatility, and Wireshark were used for analysis. The investigation aimed to identify the incident’s nature, mitigate threats, and create an incident response report. Findings included timeline reconstruction, threat mitigation steps, and recommendations for enhanced security measures. The project showcased effective incident response strategies and tools.
This project extensively analyzed a malware, employing diverse tools and techniques to uncover its behavior, functions, and potential impact. The investigation revealed its focus on querying system artifacts, dynamic DLL loading, anti-debugging measures, and possible persistence methods. Recommended mitigation strategies involve system wipe, along with proactive IP/domain blocking. The research emphasizes the significance of meticulous analysis and robust mitigation in countering complex malware threats.
The technological revolution is changing aspect of our lives, and the fabric of society itself. it’s also changing the way we learn and what we learn