Summary

  • The writer took part in the Deloitte Australia Cyber Security Virtual Internship Sim and managed to expose a stealthy insider through log forensics.
  • They were tasked with determining if an external attacker could have breached their client Daikibo Industrials’ dashboard, and identify any suspicious behaviour through the web activity logs.
  • The key to detection was recognising patterns, including machine-like behaviours that indicated a potential insider threat.
  • This simulation provided the chance to flex blue team skills, including threat hunting, behavioural analysis and authentication, and access flow review, in order to detect and mitigate threats to systems.
  • It is a steely resolve and sharpened instincts like these that are needed in the ever-evolving battleground of cybersecurity.

By Aditya Bhatt

Original Article