jonCyberDefenders — GetPDF LabScenario: PDF format is the de-facto standard in exchanging documents online. Such popularity, however, has also attracted cyber criminals…2d ago2d ago
jonCyberDefenders — PhishStrike LabScenario: As a cybersecurity analyst for an educational institution, you receive an alert about a phishing email targeting faculty members…Oct 21Oct 21
jonCyberDefenders — Ramnit Blue Team LabScenario: Our intrusion detection system has alerted us to suspicious behavior on a workstation, pointing to a likely malware intrusion. A…Oct 17Oct 17
jonCyberDefenders — WebStrike Blue Team LabScenario: An anomaly was discovered within our company’s intranet as our Development team found an unusual file on one of our web servers…Oct 16Oct 16
jonCyberDefenders — DumpMe LabScenario: A SOC analyst took a memory dump from a machine infected with a meterpreter malware. As a Digital Forensicators, your job is to…Oct 15Oct 15
jonCyberDefenders — l337 S4uc3 LabScenario: Everyone has heard of targeted attacks. Detecting these can be challenging, responding to these can be even more challenging…Oct 14Oct 14
jonCyberDefenders — BlackEnergy LabScenario: A multinational corporation has been hit by a cyber attack that has led to the theft of sensitive data. The attack was carried…Sep 30Sep 30
jonCyberDefenders — PsExec Hunt Blue Team LabScenario: Our Intrusion Detection System (IDS) has raised an alert, indicating suspicious lateral movement activity involving the use of…Sep 12Sep 12
jonCyberDefenders — PoisonedCredentials Blue Team LabScenario: Your organization’s security team has detected a surge in suspicious network activity. There are concerns that LLMNR (Link-Local…Sep 12Sep 12
jonCyberDefenders — Obfuscated Blue Team LabScenario: During your shift as a SOC analyst, the enterprise EDR alerted a suspicious behavior from an end-user machine. The user indicated…Jul 1Jul 1