top of page
BLOG POSTS
Search


The Ultimate Guide to System2 AI
The Ultimate Guide to System 2 AI: Cutting-Edge Reasoning, 1 Million Token LLMs, and Beyond
Cynor Sense
Jan 306 min read
69
0


Automating Phishing Mail Analysis Using n8n
In today's fast-evolving threat landscape, phishing remains one of the most prevalent methods for attackers to gain unauthorized access...
Cynor Sense
Jan 94 min read
201
0


How AI Agents and DPDPA Taxonomies are Revolutionizing MISP Workflows in MISP Galaxies: An Exciting, Unexplored Frontier
As cyber threats become more sophisticated and frequent, organizations need better tools to protect their data. Integrating AI agents and...
Cynor Sense
Jan 83 min read
17
0


Understanding the Digital Personal Data Protection Act (DPDPA) in India: A Comprehensive Guide
Cyberpunk-inspired artwork representing the DPDPA act simplified by Cynorsense, featuring a neon-lit cityscape and a futuristic figure...
Cynor Sense
Jan 85 min read
11
0


Automating DFIR with Velociraptor, Jupyter Notebook, and Neo4j: Part 1
Get started with Knowledge graphs and RAG's. AI for velociraptor.
Cynor Sense
Nov 29, 20244 min read
45
0


Maximizing EDR Threat Detection: Tips for Supercharging Your Security System
Combine EDR with VQL for enhanced threat detection. Simplify queries, gain real-time insights, and stay ahead of threats.
Cynor Sense
Nov 29, 20244 min read
36
0


The Ultimate Guide to Threat Hunting with Velociraptor
The Ultimate Guide to Threat Hunting with Velociraptor
Cynor Sense
May 8, 20232 min read
464
1


MDR: ZEEK with VelociraptorIR
Zeek and velociraptor integration on host to collect traffic and detect on velocirator.
Cynor Sense
Apr 25, 20232 min read
113
0


Mastering Network Filter Drivers: NTDL (Part 7)
Uncover the network filter drivers in monitoring network activities like TCP, UDP, NetBIOS, SMB, RDP, and NTLM traffic using Defender.
Cynor Sense
Apr 25, 20234 min read
165
0


MDR: Unleashing the Power of Minifilters (Part 6)
Master minifilters with Windows Defender & Velociraptor for enhanced file system monitoring! 🛡️🖥️🔍
Cynor Sense
Apr 25, 20232 min read
203
0


MDR: Unveiling Image-Load & Registry (Part 5)
Unveiling Image-Load & Registry malicious activity using VQL #VelociraptorIR and #WindowsDefender
Cynor Sense
Apr 25, 20236 min read
89
0


Track & Tackle: Files and Reg Activity (Part 4)
Unveiling Object Notifications: Tracking File and Registry Activities with VQL Queries.
Cynor Sense
Apr 25, 20231 min read
67
0


Detect Thread and Process Notifications using VQL (Part 3)
Detect Thread and Process Notifications using VQL. EDR, MDR, XDR
Cynor Sense
Apr 24, 20233 min read
83
0


Master Function-Hooking DLLs (Part2)
Discover how to detect and protect your system from malicious function-hooking DLLs using Velociraptor and Windows Defender.
Cynor Sense
Apr 24, 20236 min read
252
0


EDR : Architecture & Solutions (Part1)
EDR monitors and detects cyber threats, providing real-time analysis and protection against advanced malware and targeted attacks.
Cynor Sense
Apr 20, 20235 min read
650
0


#DFIR: Digital Forensics Incident Response
DFIR (Digital Forensic and Incident Response)
arun711
Feb 9, 20234 min read
55
0


Hardening Active Directory
Hardening Active Directory. Simple steps to safe guard Active Directory AD.
arun711
Feb 8, 20234 min read
487
0


Indicator of Attack (IOA) vs Attack Surface Reduction (ASR) #cybersecurity
How to enable ASR for free using Windows Defender?
arun711
Jan 12, 20234 min read
195
0


Cybersecurity Insurance: Claims & Cost?
Cost of cyber insurance? What is the coverage of cyber insurance? What is the claim rate? What is the Premium to pay?
Cynor Sense
Aug 20, 20226 min read
186
0


Forensics: How to guide?
Disk forensics, data recovery, evidence of execution are important steps of cyber investigation
Cynor Sense
Jul 30, 20227 min read
49
0
bottom of page