top of page
BLOG POSTS
Search


The Ultimate Guide to System2 AI
The Ultimate Guide to System 2 AI: Cutting-Edge Reasoning, 1 Million Token LLMs, and Beyond
Cynor Sense
Jan 306 min read


Automating Phishing Mail Analysis Using n8n
In today's fast-evolving threat landscape, phishing remains one of the most prevalent methods for attackers to gain unauthorized access...
Cynor Sense
Jan 94 min read


How AI Agents and DPDPA Taxonomies are Revolutionizing MISP Workflows in MISP Galaxies: An Exciting, Unexplored Frontier
As cyber threats become more sophisticated and frequent, organizations need better tools to protect their data. Integrating AI agents and...
Cynor Sense
Jan 83 min read


Understanding the Digital Personal Data Protection Act (DPDPA) in India: A Comprehensive Guide
Cyberpunk-inspired artwork representing the DPDPA act simplified by Cynorsense, featuring a neon-lit cityscape and a futuristic figure...
Cynor Sense
Jan 85 min read


Automating DFIR with Velociraptor, Jupyter Notebook, and Neo4j: Part 1
Get started with Knowledge graphs and RAG's. AI for velociraptor.
Cynor Sense
Nov 29, 20244 min read


Maximizing EDR Threat Detection: Tips for Supercharging Your Security System
Combine EDR with VQL for enhanced threat detection. Simplify queries, gain real-time insights, and stay ahead of threats.
Cynor Sense
Nov 29, 20244 min read


The Ultimate Guide to Threat Hunting with Velociraptor
The Ultimate Guide to Threat Hunting with Velociraptor
Cynor Sense
May 8, 20232 min read


MDR: ZEEK with VelociraptorIR
Zeek and velociraptor integration on host to collect traffic and detect on velocirator.
Cynor Sense
Apr 25, 20232 min read


Mastering Network Filter Drivers: NTDL (Part 7)
Uncover the network filter drivers in monitoring network activities like TCP, UDP, NetBIOS, SMB, RDP, and NTLM traffic using Defender.
Cynor Sense
Apr 25, 20234 min read


MDR: Unleashing the Power of Minifilters (Part 6)
Master minifilters with Windows Defender & Velociraptor for enhanced file system monitoring! 🛡️🖥️🔍
Cynor Sense
Apr 25, 20232 min read


MDR: Unveiling Image-Load & Registry (Part 5)
Unveiling Image-Load & Registry malicious activity using VQL #VelociraptorIR and #WindowsDefender
Cynor Sense
Apr 25, 20236 min read


Track & Tackle: Files and Reg Activity (Part 4)
Unveiling Object Notifications: Tracking File and Registry Activities with VQL Queries.
Cynor Sense
Apr 25, 20231 min read


Detect Thread and Process Notifications using VQL (Part 3)
Detect Thread and Process Notifications using VQL. EDR, MDR, XDR
Cynor Sense
Apr 24, 20233 min read


Master Function-Hooking DLLs (Part2)
Discover how to detect and protect your system from malicious function-hooking DLLs using Velociraptor and Windows Defender.
Cynor Sense
Apr 24, 20236 min read


EDR : Architecture & Solutions (Part1)
EDR monitors and detects cyber threats, providing real-time analysis and protection against advanced malware and targeted attacks.
Cynor Sense
Apr 20, 20235 min read


#DFIR: Digital Forensics Incident Response
DFIR (Digital Forensic and Incident Response)
arun711
Feb 9, 20234 min read


Hardening Active Directory
Hardening Active Directory. Simple steps to safe guard Active Directory AD.
arun711
Feb 8, 20234 min read


Indicator of Attack (IOA) vs Attack Surface Reduction (ASR) #cybersecurity
How to enable ASR for free using Windows Defender?
arun711
Jan 12, 20234 min read


Cybersecurity Insurance: Claims & Cost?
Cost of cyber insurance? What is the coverage of cyber insurance? What is the claim rate? What is the Premium to pay?
Cynor Sense
Aug 20, 20226 min read


Forensics: How to guide?
Disk forensics, data recovery, evidence of execution are important steps of cyber investigation
Cynor Sense
Jul 30, 20227 min read
bottom of page
