Thirdeye Intelligence

If cyber threats had a most-wanted list, Chip would be the detective cracking the case! My blog dives deep into the world of cyber intelligence, unraveling attacks, trends, and security tactics with a mix of wit and wisdom. Whether you’re a seasoned pro or just cyber-curious, expect insights that pack a punch—no fluff, just the good stuff!


  • Forensics – Where to start and What to know

    Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions that I normally get : I want to get into forensics. What should I study? What kind of certificates are good? What background should I… Read More ⇢

  • Disposable email addresses (DEA) and concerns

    Readers This post is about disposable email addresses and where to get them and concerns for organisations or whitehats defending their network/country. Disposable email addresses are something for which you don’t need an account. Understand you can only RECEIVE emails and cannot SEND. The service was first paid only but… Read More ⇢

  • Battling Insider Threats – Browser in the box

    Readers One of the biggest threats for any organisation is Insider Threat. An employee visiting malicious sites, drive-by downloads, uploading documents etc. , in short any web activity that can impact the organisation. Many of the organisations have chose to deploy DLP, Intrusion Detection and Prevention systems, proxies, user behaviour analytics… Read More ⇢

  • Incident Response and Forensics – The two towers

    Readers Been meaning write something about my experience with Incident response and forensics and how knowledge of both field helped me. Most of the organisations have Incident Response and Forensics as 2 different department and no overlap of services or transparency is seen between them. Personally, I believe it is… Read More ⇢

  • Penetration Testing and Rules of engagement

    Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am talking about PENETRATION TESTING. With this post I would like to share an ideal approach during penetration testing and importance in following the rules of… Read More ⇢

  • Ransomware extensions and filenames

    As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and its digital footprint. Every application when executed leaves a footprint on the system and sometimes we call them dropper. A footprint for Microsoft word is… Read More ⇢

  • Threat Hunting and Pyramid of Pain

    The buzz word first came in 2014 and individuals who were actually performing activities such as hunting for adversaries within network interested in Threat Hunting agreed with it on all aspects. During Threat Hunting and/or intelligence gathering or incident response we are mostly concentrating on identifying indicators of compromise and… Read More ⇢

  • Phishing SMS – A failed attempt

    Just about an hour ago I received an text from one of my mentors. Excited, I read but I know him very well and knew it wasn’t him. The phishing text : It’s possible to do 10 k in 10 day. hxxp://www.prosperity-today.com I texted him directly with a new message… Read More ⇢

  • YARA rule for Dridex

    Have been learning YARA from few days and below is my first YARA rule for a IOCs collected while analysing a word document. Analysis concluded with presence of Dridex malware. rule dridex : dridex { meta: description = “Dridex Malware Indicators” author = “Kunal Makwana” date = “2016/04/03” thread_level =… Read More ⇢