APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage

The Hacker News-- It's one thing for APT groups to conduct cyber espionage to meet their own financial objectives. But it's an entirely different matter when they are used as "hackers for hire" by competing private companies to make away with confidential information. Bitdefender's Cyber Threat Intelligence Lab discovered yet another instance of an espionage … Continue reading APT Hackers Exploit Autodesk 3D Max Software for Industrial Espionage

VolExp – Volatility Explorer

KitPloit - PenTest Tools!-- This program allows the user to access a Memory Dump. It can also function as a plugin to the Volatility Framework (https://github.com/volatilityfoundation/volatility). This program functions similarly to Process Explorer/Hacker, but additionally it allows the user access to a Memory Dump (or access the real-time memory on the computer using Memtriage). This … Continue reading VolExp – Volatility Explorer

Building a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance

InfoSec Write-ups - Medium-- When putting together a SIEM, one of the first things that you need to decide on is the distributed architecture you’re going to choose. This means analyzing the resources available, as well as the needs of your SOC.Are you monitoring 100, 1000, or 10000 hosts?Do you have budget for commercial tools?How heterogeneous is … Continue reading Building a SIEM: combining ELK, Wazuh HIDS and Elastalert for optimal performance

The cybersecurity skills gap is misunderstood

Malwarebytes Labs-- Nearly every year, a trade association, a university, an independent researcher, or a large corporation—and sometimes all of them and many in between—push out the latest research on the cybersecurity skills gap, the now-decade-plus-old idea that the global economy lacks a growing number of cybersecurity professionals who cannot be found. It is, as … Continue reading The cybersecurity skills gap is misunderstood

Wildcards Understanding and Using for Hacking

HackingPassion.com-- Wildcards, I would like to highlight the use of Wildcards, because they are incredibly important, especially for “hacking-related and some programming” stuff. In this article I will cover one interesting old-school Unix hacking technique, that will still work nowadays in 2020. In real-world attacks, arbitrary shell options and or arguments could be hidden among … Continue reading Wildcards Understanding and Using for Hacking

AWS Recon – Multi-threaded AWS Inventory Collection Tool With A Focus On Security-Relevant Resources And Metadata

KitPloit - PenTest Tools!-- A multi-threaded AWS inventory collection tool.The creators of this tool have a recurring need to be able to efficiently collect a large amount of AWS resource attributes and metadata to help clients understand their cloud security posture.There are a handful of tools (e.g. AWS Config, CloudMapper, CloudSploit, Prowler) that do some … Continue reading AWS Recon – Multi-threaded AWS Inventory Collection Tool With A Focus On Security-Relevant Resources And Metadata