Cybersec.Reviews

Honest Reviews of Cybersecurity Education and Blog

Cybersec.Reviews I created Cybersec.Reviews after noticing that review posts on my previous blog/portfolio website started to become popular and individuals were contacting me stating that these reviews were useful for their buying decisions. Due to this, I created this site to help students decide on educational resources for cybersecurity. There is a massive amount of educational resources for this field. Some subjects include, Bug Bounty, Malware Analysis, Penetration Testing, Blue Teaming, Red Teaming, Coding, SIEMs, Forensics, and much more. More

Key Points Release Date: September 2020. Date Reviewed: June 2024. Author/Creator: Josh Mason, Alexis Ahmed. Subject(s): Network and Web Penetration Testing, Vulnerability Scanning. Prerequisite(s): Basic IT Knowledge, Intermediate Networking Knowledge, Familiarity with the Windows and Linux Command Line Medium: Video Courses, Hands on Exercises. Length: 148 Hours Training + 48 Hour Exam. Price: INE Fundamentals Plan for Training Path: $39 A Month + Exam Voucher: $200 Link: https://ine.com/ (Not Affiliated) More

SOC Analyst 101 Part 2: Analyst Mindset If you haven’t already, please read my prior SOC analysts 101 posts: Part 0: Overview & Prerequisites Part 1: Logs & Security Models From part 1 we covered the basics of security models and logs and at the end I gave you some homework to explore how to read logs. If you have not done so, I recommend checking out the resources section in part 1. More

SOC Analyst 101 Part 1: Security Models & Logs This is part 1 of the SOC Analyst 101 blog series. If you have not, please make sure to read the previous primer post “SOC Analyst 101 Part 0: Overview & Prerequisites”. At this point you have determined that you would like to further pursue a career as a SOC Analyst. You might have gained a few certifications, made a network HomeLab, and/or worked through some other educational resources. More

Threat Intelligence Analysis of APT41 Executive Summary An Advanced Persistent Threat (APT) can be defined as a sophisticated actor or group who conducts cyber-attacks in pursuit of various objectives which can include financial gain or espionage. The APT41 group (ID: G0096) is a Chinese state sponsored group that is associated with the name “WICKED PANDA” and conducts operations against a variety of sectors but mostly targeting the video game industry. The goals of APT41 have been observed to be theft of intellectual property and financial gain as the group has stolen source code, stolen digital certificates to sign malware, and deployed ransomware. More

Disclaimer This blog series is not representative of processes or procedures that are unique to my employer or any other company. This article series is meant to provide information that is agnostic and to educate those who aspire to be a cybersecurity analyst. Overview Purpose of This Blog The goal of this series to provide insight into working in cybersecurity (specifically an analyst role) to anyone, technically skilled or not. I was inspired to write this blog series after having many people inquire about how to get into working in the defensive side of Cybersecurity which is commonly an analyst role, which has been my first position in security. More

(Wannacry Ransomware) Note- This challenge write-up is a “blind analysis”, which was written prior to viewing the answer section of this course. I include how I answered questions, if I got it right or wrong, and why as a reflection for further learning. (Contains spoilers!) Practical Malware analysis and Triage “WannaCry” Challenge This write up comes from the PMAT course that was produced by Husky Hacks. My review of this course can be seen here- https://cybersec. More

Video Review Key Points Release Date: September 2021 Date Reviewed: February 2023 Author/Creator: Husky Hacks (https://huskyhacks.dev/) Subject(s): Malware Analysis, Sandbox Lab Setup, Virtual Box, Reverse Engineering, Report Writing, Static Analysis, Dynamic Analysis, Windows API, Malware Techniques, YARA Rule Writing Prerequisite(s): Familiarity With The Windows OS, Windows/Linux Command Line Experience, Basic Understanding of Programming Medium: Video Course, Hands on Exercises, Written Content Length: 9 Hours Video Content Price: $30 Monthly Subscription (All Access Pass TCM Academy) More

Summary Credits Hayden @CybersecReviews Anna Moose Overview Sample Hash: d7c808bceb5752abbe1e56151e8ac382a6dd94a4ff1499d14baef362e4cf08a0 Sample Name: RuneLite Stealer Capabilitie(s): Information Stealer (RuneScape Credentials) A friend of mine came across this Reddit thread that was posted on December 15th, 2022 and shared with me that he was attempting to view what the executable was and how it works. The malware sample was a modified game client for Runescape called RuneLite. Runescape is popular online MMO game that I played a lot in middle school and investigating a possible malware sample was intriguing to me. More

Note: This challenge write-up is a “blind analysis”, which was written prior to viewing the answer section of this course. I include how I answered questions, if I got it right or wrong, and why as a reflection for further learning. (Contains spoilers!) Practical Malware analysis and Triage “Siko Mode” Challenge This write up comes from the PMAT course that was produced by Husky Hacks. At the time of writing, I am about 3/4 through the course and have found it very valuable from a SOC analyst perspective. More