Injecting Payload In Phone Numbers field !
#infosec #bugbountytip #cybersecuritytips
@Engineer_Computer
#infosec #bugbountytip #cybersecuritytips
@Engineer_Computer
⚠️ Urgent: A new critical RCE security #vulnerability (CVE-2023-27997) in FortiGate firewalls has been discovered. Update to the latest versions to secure your network against potential remote code execution.
Read details:
https://thehackernews.com/2023/06/critical-rce-flaw-discovered-in.html…
#infosec #cybersecurity
@Engineer_Computer
Read details:
https://thehackernews.com/2023/06/critical-rce-flaw-discovered-in.html…
#infosec #cybersecurity
@Engineer_Computer
Infosec Standards
NIST SP 800-124 r2:
Guidelines for Managing the Security of Mobile Devices in the Enterprise May 2023
-Business Secure Continuity-
1402.03.29
#DiyakoSecureBow
#businessanalyst #infosec #securitymanagement #security #business
@Engineer_Computer
NIST SP 800-124 r2:
Guidelines for Managing the Security of Mobile Devices in the Enterprise May 2023
-Business Secure Continuity-
1402.03.29
#DiyakoSecureBow
#businessanalyst #infosec #securitymanagement #security #business
@Engineer_Computer
#DiyakoSecureBow
Analytics
2023 Data Breach Investigations Report:
Hello, and welcome first-time readers! Before you get started on the 2023 Data Breach Investigations Report (DBIR), it might be a good idea to take a look at this section first. (For those of you who are familiar with the report, please feel free to jump over to the introduction.) We have been doing this report for a while now, and we appreciate that the verbiage we use can be a bit obtuse at times. We use very deliberate naming conventions, terms and definitions and spend a lot of time making sure we are consistent throughout the report. Hopefully this section will help make all of those more familia
Breaking the string of end-of-year InfoSec milestones set in 2020 with SolarWinds Orion and in 2021
by Log4j, December 2022 was comparatively boring. Intelligence indicated several threat actors were abusing Microsoft developer accounts to get malicious drivers signed through their profiles to be used
in cyberattacks, including ransomware incidents and SIM swapping operations. The streak of months with attacks exploiting zero-day vulnerabilities was extended with reports of successful attacks on Microsoft, Apple, Fortinet and Citrix products. OWASSRF is a new attack chain exploiting on-premises Exchange Servers using the URL rewrite mitigations provided by Microsoft responding to September’s ProxyNotShell attack chain. The Play ransomware threat actors had exploited OWASSRF to attack at least eight victims. Among the best intelligence collections was a virtual order of battle of TA subordinate to Bureau 121 in the Reconnaissance General Bureau (RGB), North Korea’s military intelligence agency.
Special thanks to Dave Kennedy of the Verizon Threat Research Advisory Center (VTRAC) for his continued support and yearly contribution to this report.
#developerslife #data #research #infosec #help #intelligence #military #analytics #microsoft
@Engineer_Computer
Analytics
2023 Data Breach Investigations Report:
Hello, and welcome first-time readers! Before you get started on the 2023 Data Breach Investigations Report (DBIR), it might be a good idea to take a look at this section first. (For those of you who are familiar with the report, please feel free to jump over to the introduction.) We have been doing this report for a while now, and we appreciate that the verbiage we use can be a bit obtuse at times. We use very deliberate naming conventions, terms and definitions and spend a lot of time making sure we are consistent throughout the report. Hopefully this section will help make all of those more familia
Breaking the string of end-of-year InfoSec milestones set in 2020 with SolarWinds Orion and in 2021
by Log4j, December 2022 was comparatively boring. Intelligence indicated several threat actors were abusing Microsoft developer accounts to get malicious drivers signed through their profiles to be used
in cyberattacks, including ransomware incidents and SIM swapping operations. The streak of months with attacks exploiting zero-day vulnerabilities was extended with reports of successful attacks on Microsoft, Apple, Fortinet and Citrix products. OWASSRF is a new attack chain exploiting on-premises Exchange Servers using the URL rewrite mitigations provided by Microsoft responding to September’s ProxyNotShell attack chain. The Play ransomware threat actors had exploited OWASSRF to attack at least eight victims. Among the best intelligence collections was a virtual order of battle of TA subordinate to Bureau 121 in the Reconnaissance General Bureau (RGB), North Korea’s military intelligence agency.
Special thanks to Dave Kennedy of the Verizon Threat Research Advisory Center (VTRAC) for his continued support and yearly contribution to this report.
#developerslife #data #research #infosec #help #intelligence #military #analytics #microsoft
@Engineer_Computer
⭕️ The #ASIS #CTF Final 2023 is set for December 29-30! 🗓️ Calling all CTFers to join in for an epic showdown and compete against each other in the last CTF of the year!
asisctf.com
💻🏆 #ASISCTF #CTF2023 #CaptureTheFlag #InfoSec
https://twitter.com/ASIS_CTF/status/1737872564372885928?t=ZpU8ITLKi2erAfRB2-tjCQ&s=19
@Engineer_Computer
asisctf.com
💻🏆 #ASISCTF #CTF2023 #CaptureTheFlag #InfoSec
https://twitter.com/ASIS_CTF/status/1737872564372885928?t=ZpU8ITLKi2erAfRB2-tjCQ&s=19
@Engineer_Computer
JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers and security researchers.
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #bugbountyTools
Please open Telegram to view this post
VIEW IN TELEGRAM
THE BEST SOC ANALYST TOOLS.pdf
3.4 MB
ابزار های مهم برای SOC
#infosec #cybersecurity #SOC #pentest #SOCTools
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉1
State of Physical Security 2025.pdf
8.9 MB
Strategizing, planning, and investing wisely
The integration of artificial intelligence (AI) into physical security systems is promising development and one end users are eager to explore (10% did in 2024 and 37% plan to in 2025)
Analytics and Al techniques will continue to usher in new possibilities, allowing businesses to capitalize on existing physical security data, infrastructure, and sensors to automate mundane tasks and drive higher levels of operational efficiency company-wide.
#infosec #cybersecurity #SOC #pentest #SOCTools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
🚀 We’re Hiring Cybersecurity Interns! Launch Your Career with Us 🚀
Are you passionate about cybersecurity and eager to learn in a real-world environment? We’re looking for driven interns who want to grow their skills and make an impact.
What We’re Looking For:
🔹 Basic Linux skills – Comfortable using the terminal, basic shell commands, and understanding file permissions
🔹 Web security fundamentals – Awareness of OWASP Top 10, HTTP/HTTPS, and common web vulnerabilities
🔹 Networking basics – Understanding TCP/IP, DNS, ports, firewalls, and proxies
🔹 Familiarity with security tools like Nmap, Wireshark, or Burp Suite
🔹 Analytical mindset – Love solving problems and reverse-engineering challenges
🔹 Self-motivated learner – Willing to learn independently and absorb new concepts quickly
🔹 Strong communicator – Able to document findings clearly and work well in a team
Internship begins on July 1st, 2025.
Location: Remote
Duration: 3 months
Opportunity to convert to a full-time employee after successful completion of the internship.
Who Can Apply:
🎓 3rd and 4th year engineering students
🎓 Students from BSc, BCA and BBA backgrounds with computer knowledge
🎓 Freshers interested in cybersecurity
If you’re ready to step into the world of cybersecurity, develop hands-on technical skills, and collaborate with passionate professionals, we want to hear from you!
Apply now and take the first step toward your cybersecurity career.
Contact us at: one@fncyber
#Cybersecurity #Internship #Hiring #Linux #Networking #WebSecurity #CareerStart #InfoSec #JoinOurTeam #fnCyber
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Are you passionate about cybersecurity and eager to learn in a real-world environment? We’re looking for driven interns who want to grow their skills and make an impact.
What We’re Looking For:
🔹 Basic Linux skills – Comfortable using the terminal, basic shell commands, and understanding file permissions
🔹 Web security fundamentals – Awareness of OWASP Top 10, HTTP/HTTPS, and common web vulnerabilities
🔹 Networking basics – Understanding TCP/IP, DNS, ports, firewalls, and proxies
🔹 Familiarity with security tools like Nmap, Wireshark, or Burp Suite
🔹 Analytical mindset – Love solving problems and reverse-engineering challenges
🔹 Self-motivated learner – Willing to learn independently and absorb new concepts quickly
🔹 Strong communicator – Able to document findings clearly and work well in a team
Internship begins on July 1st, 2025.
Location: Remote
Duration: 3 months
Opportunity to convert to a full-time employee after successful completion of the internship.
Who Can Apply:
🎓 3rd and 4th year engineering students
🎓 Students from BSc, BCA and BBA backgrounds with computer knowledge
🎓 Freshers interested in cybersecurity
If you’re ready to step into the world of cybersecurity, develop hands-on technical skills, and collaborate with passionate professionals, we want to hear from you!
Apply now and take the first step toward your cybersecurity career.
Contact us at: one@fncyber
#Cybersecurity #Internship #Hiring #Linux #Networking #WebSecurity #CareerStart #InfoSec #JoinOurTeam #fnCyber
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1🔥1🤩1🗿1
🚨 We're Hiring: Security Consultant (Penetration Testing)
📍 Location: Bangalore
💼 Work Mode: Hybrid
🛡 Experience Level: 3–5 years
Are you passionate about cybersecurity and penetration testing? Join our team as a Security Consultant, where you'll lead hands-on engagements, work with global and regulated industry clients, and play a key role in strengthening their security posture.
🔍 What You'll Do:
> Lead network, application, API, and cloud penetration testing
> Conduct Red & Purple Team assessments
> Identify vulnerabilities and provide expert remediation guidance
> Collaborate with clients and internal teams to deliver actionable security insights
> Mentor junior team members and contribute to research & tool development
🛠 What We're Looking For:
> 3–5 years of hands-on pen testing experience
> Strong scripting and problem-solving skills
> Certifications like OSCP, GPEN, GWAPT, GXPN, CREST (preferred)
> Excellent communication and project leadership skills
> Experience with Cobalt Strike is a plus
If you're self-driven, detail-oriented, and thrive in a collaborative and fast-paced environment, we want to hear from you!
🔗 Scan the below QR code and apply now or DM us to learn more.
Let’s build a safer digital world together.
#CyberSecurityJobs #PenetrationTesting #InfoSec #SecurityConsultant #Hiring #RedTeam #PurpleTeam #OSCP #InfosecCareers
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
📍 Location: Bangalore
💼 Work Mode: Hybrid
🛡 Experience Level: 3–5 years
Are you passionate about cybersecurity and penetration testing? Join our team as a Security Consultant, where you'll lead hands-on engagements, work with global and regulated industry clients, and play a key role in strengthening their security posture.
🔍 What You'll Do:
> Lead network, application, API, and cloud penetration testing
> Conduct Red & Purple Team assessments
> Identify vulnerabilities and provide expert remediation guidance
> Collaborate with clients and internal teams to deliver actionable security insights
> Mentor junior team members and contribute to research & tool development
🛠 What We're Looking For:
> 3–5 years of hands-on pen testing experience
> Strong scripting and problem-solving skills
> Certifications like OSCP, GPEN, GWAPT, GXPN, CREST (preferred)
> Excellent communication and project leadership skills
> Experience with Cobalt Strike is a plus
If you're self-driven, detail-oriented, and thrive in a collaborative and fast-paced environment, we want to hear from you!
🔗 Scan the below QR code and apply now or DM us to learn more.
Let’s build a safer digital world together.
#CyberSecurityJobs #PenetrationTesting #InfoSec #SecurityConsultant #Hiring #RedTeam #PurpleTeam #OSCP #InfosecCareers
Please open Telegram to view this post
VIEW IN TELEGRAM