Thirdeye Intelligence

If cyber threats had a most-wanted list, Chip would be the detective cracking the case! My blog dives deep into the world of cyber intelligence, unraveling attacks, trends, and security tactics with a mix of wit and wisdom. Whether you’re a seasoned pro or just cyber-curious, expect insights that pack a punch—no fluff, just the good stuff!


  • Hash Values – A Trivial Artefact

    Readers! Merry Christmas and Happy new year to all. The days of holiday spam and vendor predictions are here. Here I am spending summer afternoon watching TV and writing on my blog. As I am bit lazy during holidays I am posting something simple. The post is about HASH values… Read More ⇢

  • SANS FOR578 Cyber Threat Intelligence – Course Review

    Readers!!! Advanced greetings for Christmas. Before I start make sure to check out SANS Holiday Hack Challenge here. Recently, I was honoured to attend one of the SANS course For578 – Cyber Threat Intelligence. SANS instructor was one of the best in business Robert M. Lee. My reason to attend… Read More ⇢

  • Evoltin POS Malware – Kill Chain Mind Map

    Readers!!! Its been quite a while I have updated my blog posts, due to me spending  some quality time off the work and being with family. Recently, was honoured to attend SANS FOR578 Cyber Threat Intelligence course taught by Robert M. Lee and it was excellent. I will be writing… Read More ⇢

  • Forensics – Where to start and What to know

    Readers I would like to share my experience and understanding with regards to forensics and where I started to get a foothold in forensics. Questions that I normally get : I want to get into forensics. What should I study? What kind of certificates are good? What background should I… Read More ⇢

  • Disposable email addresses (DEA) and concerns

    Readers This post is about disposable email addresses and where to get them and concerns for organisations or whitehats defending their network/country. Disposable email addresses are something for which you don’t need an account. Understand you can only RECEIVE emails and cannot SEND. The service was first paid only but… Read More ⇢

  • Battling Insider Threats – Browser in the box

    Readers One of the biggest threats for any organisation is Insider Threat. An employee visiting malicious sites, drive-by downloads, uploading documents etc. , in short any web activity that can impact the organisation. Many of the organisations have chose to deploy DLP, Intrusion Detection and Prevention systems, proxies, user behaviour analytics… Read More ⇢

  • Incident Response and Forensics – The two towers

    Readers Been meaning write something about my experience with Incident response and forensics and how knowledge of both field helped me. Most of the organisations have Incident Response and Forensics as 2 different department and no overlap of services or transparency is seen between them. Personally, I believe it is… Read More ⇢

  • Penetration Testing and Rules of engagement

    Readers This post is about globally accepted LEGAL technique to exploit a system or network to validate their deployment of security controls. Yes I am talking about PENETRATION TESTING. With this post I would like to share an ideal approach during penetration testing and importance in following the rules of… Read More ⇢

  • Ransomware extensions and filenames

    As we all know Ransomware is currently one of the biggest threat to any organisation and therefore we must understand how a ransomware works and its digital footprint. Every application when executed leaves a footprint on the system and sometimes we call them dropper. A footprint for Microsoft word is… Read More ⇢