APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage

The Hacker News-- It's one thing for APT groups to conduct cyber espionage to meet their own financial objectives. But it's an entirely different matter when they are used as "hackers for hire" by competing private companies to make away with confidential information. Bitdefender's Cyber Threat Intelligence Lab discovered yet another instance of an espionage … Continue reading APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage

Building a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance

InfoSec Write-ups - Medium-- When putting together a SIEM, one of the first things that you need to decide on is the distributed architecture you’re going to choose. This means analyzing the resources available, as well as the needs of your SOC.Are you monitoring 100, 1000, or 10000 hosts?Do you have budget for commercial tools?How heterogeneous is … Continue reading Building a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance

The cybersecurity skills gap is misunderstood

Malwarebytes Labs-- Nearly every year, a trade association, a university, an independent researcher, or a large corporation—and sometimes all of them and many in between—push out the latest research on the cybersecurity skills gap, the now-decade-plus-old idea that the global economy lacks a growing number of cybersecurity professionals who cannot be found. It is, as … Continue reading The cybersecurity skills gap is misunderstood

Wildcards Understanding and Using for Hacking

HackingPassion.com-- Wildcards, I would like to highlight the use of Wildcards, because they are incredibly important, especially for “hacking-related and some programming” stuff. In this article I will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2020. In real-world attacks, arbitrary shell options and or arguments could be hidden among … Continue reading Wildcards Understanding and Using for Hacking

Popular iOS SDK Caught Spying on Billions of Users and Committing Ad Fraud

The Hacker News-- A popular iOS software development kit (SDK) used by over 1,200 apps—with a total of more than a billion mobile users—is said to contain malicious code with the goal of perpetrating mobile ad-click fraud and capturing sensitive information. According to a report published by cybersecurity firm Snyk, Mintegral — a mobile programmatic … Continue reading Popular iOS SDK Caught Spying on Billions of Users and Committing Ad Fraud

Google Researcher Reported 3 Flaws in Apache Web Server Software

The Hacker News-- If your web-server runs on Apache, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it. Apache recently fixed multiple vulnerabilities in its web server software that could have potentially led to the execution of arbitrary code and, in specific scenarios, … Continue reading Google Researcher Reported 3 Flaws in Apache Web Server Software