The Hacker News-- It's one thing for APT groups to conduct cyber espionage to meet their own financial objectives. But it's an entirely different matter when they are used as "hackers for hire" by competing private companies to make away with confidential information. Bitdefender's Cyber Threat Intelligence Lab discovered yet another instance of an espionage … Continue reading APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage
Category: Articles
Building a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance
InfoSec Write-ups - Medium-- When putting together a SIEM, one of the first things that you need to decide on is the distributed architecture you’re going to choose. This means analyzing the resources available, as well as the needs of your SOC.Are you monitoring 100, 1000, or 10000 hosts?Do you have budget for commercial tools?How heterogeneous is … Continue reading Building a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance
The cybersecurity skills gap is misunderstood
Malwarebytes Labs-- Nearly every year, a trade association, a university, an independent researcher, or a large corporation—and sometimes all of them and many in between—push out the latest research on the cybersecurity skills gap, the now-decade-plus-old idea that the global economy lacks a growing number of cybersecurity professionals who cannot be found. It is, as … Continue reading The cybersecurity skills gap is misunderstood
Numerous Vulnerabilities Found In Discount Rules for WooCommerce Plugin
Latest Hacking News-- Recently, the Discount Rules for WooCommerce Plugin has made it to the news owing to multiple vulnerabilities. Exploiting these flaws Numerous Vulnerabilities Found In Discount Rules for WooCommerce Plugin on Latest Hacking News. View original article on Latest Hacking News
University Of Utah Suffered Ransomware Attack – Paid Ransom To Recover
Latest Hacking News-- As ransomware attacks continue to target the educational sector, the University of Utah has emerged as the recent victim to University Of Utah Suffered Ransomware Attack – Paid Ransom To Recover on Latest Hacking News. View original article on Latest Hacking News
Wildcards Understanding and Using for Hacking
HackingPassion.com-- Wildcards, I would like to highlight the use of Wildcards, because they are incredibly important, especially for “hacking-related and some programming” stuff. In this article I will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2020. In real-world attacks, arbitrary shell options and or arguments could be hidden among … Continue reading Wildcards Understanding and Using for Hacking
Google Drive Vulnerability Allows Spearphishing Attacks
Hacking News-- A serious vulnerability exists in Google Drive that still awaits a fix. As discovered, the vulnerability allows an adversary to Google Drive Vulnerability Allows Spearphishing Attacks on Latest Hacking News. View original article on Latest Hacking News
Popular iOS SDK Caught Spying on Billions of Users and Committing Ad Fraud
The Hacker News-- A popular iOS software development kit (SDK) used by over 1,200 apps—with a total of more than a billion mobile users—is said to contain malicious code with the goal of perpetrating mobile ad-click fraud and capturing sensitive information. According to a report published by cybersecurity firm Snyk, Mintegral — a mobile programmatic … Continue reading Popular iOS SDK Caught Spying on Billions of Users and Committing Ad Fraud
Google Researcher Reported 3 Flaws in Apache Web Server Software
The Hacker News-- If your web-server runs on Apache, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it. Apache recently fixed multiple vulnerabilities in its web server software that could have potentially led to the execution of arbitrary code and, in specific scenarios, … Continue reading Google Researcher Reported 3 Flaws in Apache Web Server Software
How to Conduct a Pentest Like a Pro in 6 Phases
Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. … Continue reading How to Conduct a Pentest Like a Pro in 6 Phases


