Open in app

Sign In

Write

Sign In

Jaydev Joshi
Jaydev Joshi

132 Followers

Home

About

Pinned

Threat Group Naming Conventions

Actors, Adversaries and Activities APT (Advanced Persistent Threats), is the most dangerous word in the world of cyber security. APTs is the term used to describe a massive attack campaign where malicious threat actors established their long-term footholds in targeted organisations to gain the most sensitive information. …

Cybersecurity

6 min read

Threat Group Naming Conventions
Threat Group Naming Conventions
Cybersecurity

6 min read


Published in Nerd For Tech

·Pinned

Dark-web Marketplace

The good and evil sides of the Markets In recent years, the Darknet has become one of the most discussed topics in the field of cyber security due to their anonymous nature, privacy, digital currencies… and what not! The “Dark web” is a hidden world where good and evil coexist…

Darkweb

10 min read

Dark-web Marketplace
Dark-web Marketplace
Darkweb

10 min read


Pinned

Let’s Connect to TOR

All about VPN & Privacy, and Anonymity — Dark Web is a word that makes you more enthusiastic to explore it. Welcome to another part of the darker side internet! If you are in a world of Privacy & Anonymity then you’ve no doubt heard the word TOR (The Onion Router). In today’s article, we are going to…

Darkweb

8 min read

Let’s Connect to TOR
Let’s Connect to TOR
Darkweb

8 min read


Published in Nerd For Tech

·Pinned

The Hidden Internet

(Secrets of the Dark Web) — Difference b/w Web & Internet Internet is a like physical connection of all computer that are connected around the globe. ARPANET (Advanced Research Projects Agency Network) The ARPANET was the first wide-area packet-switching network with distributed control and one of the first networks to implement the TCP/IP protocol suite. ARPANET…

Dark Web

7 min read

The Hidden Internet
The Hidden Internet
Dark Web

7 min read


Published in Nerd For Tech

·Pinned

Mysterious Side of the Internet

Deep — Deeper — Deepest ! — This article is based on my searches and internet stories. I have not added any fake points or all the things are like fantasy and created by humans themselves. No proof can prove these rumors. We are going to discover the secrets of searching the internet efficiently and effectively and…

Darkweb

8 min read

Mysterious Side of the Internet
Mysterious Side of the Internet
Darkweb

8 min read


Published in Nerd For Tech

·Oct 9, 2021

Threat Intelligence

New weapon against the Cyber Attacks Intelligence is the collecting and processing of Data & Information about a competitive entity and its agents, needed by an organization or group for its security purpose. Let’s start from beginning… There are many Domains of Intelligence used by organizations as per need.

Cybersecurity

6 min read

Threat Intelligence
Threat Intelligence
Cybersecurity

6 min read


Aug 12, 2021

Espionage Story

The Pegasus spyware What is Spyware? “A spyware is any malicious software designed to enter your computer device, gather your data, and forward it to a third-party without your consent.” Malicious spyware is a type of malware specifically installed without your informed consent. …

Spyware

4 min read

Espionage Story
Espionage Story
Spyware

4 min read


May 25, 2021

Intelligence Agencies

World’s Top Secret Agencies An Intelligence Agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, Secret missions, military, and foreign policy objectives. Universally, every country has an global organization accused of social affair, preparing, and breaking down data…

Intelligence

5 min read

Intelligence Agencies
Intelligence Agencies
Intelligence

5 min read


Published in InfoSec Write-ups

·Mar 28, 2021

KaffeeSec — SoMeSINT Write-up

An intro to SOCMINT (Social Media Intelligence/Investigation) techniques and tooling. Use your awesome OSINT skills to perform an online investigation of a mysterious husband! Access Room Here : https://tryhackme.com/room/somesint Task 1 In this room, you will be learning social media analysis and forensics. You will learn about google dorking, website archiving, social…

Tryhackme

4 min read

KaffeeSec — SoMeSINT Write-up
KaffeeSec — SoMeSINT Write-up
Tryhackme

4 min read


Published in InfoSec Write-ups

·Mar 8, 2021

TryHackMe: THREAT INTELLIGENCE

This lab will try to walk an SOC Analyst through the steps that they would take to assist in breach mitigations and identifying important data from a Threat Intelligence report. Access the room : https://tryhackme.com/room/threatintelligence Task 1 : Understanding a Threat Intelligence blog post on a recent attack THREAT INTELLIGENCE…

Tryhackme

5 min read

TryHackMe: THREAT INTELLIGENCE
TryHackMe: THREAT INTELLIGENCE
Tryhackme

5 min read

Jaydev Joshi

Jaydev Joshi

132 Followers

Learner | Infosec | OSINT | Intelligence |

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech