This media is not supported in your browser
VIEW IN TELEGRAM
🎥یادی کنیم از سخنان رئیسجمهور قبلی که یکسال بعد از فیلتر شدن تلگرام ایراد شد. قصد دفاع و یا تخطئه کسی را نداریم. فقط مقایسه کنید تفاوت دیدگاه ها را!
👏3👍2🤬1
#فرصت_همکاری کارشناس کسپرسکی در شرکت آرمان داده پویان
- تسلط به Kaspersky Security Center
- حداقل دو سال تجربه کاری در حوزه شبکه و امنیت
- آشنایی با مفاهیم شبکه و امنیت
- آشنایی با مفاهیم سرویسهای مایکروسافتی
- آشنایی با راهکارهایEndpoint Security
- گذراندن دورههای شبکه و امنیت همچون CCNA , MCSE , MCITP و …
- توانایی مستندسازی
ارسال رزومه:
📧 [email protected]
@Engineer_Computer
- تسلط به Kaspersky Security Center
- حداقل دو سال تجربه کاری در حوزه شبکه و امنیت
- آشنایی با مفاهیم شبکه و امنیت
- آشنایی با مفاهیم سرویسهای مایکروسافتی
- آشنایی با راهکارهایEndpoint Security
- گذراندن دورههای شبکه و امنیت همچون CCNA , MCSE , MCITP و …
- توانایی مستندسازی
ارسال رزومه:
📧 [email protected]
@Engineer_Computer
#فرصت_همکاری متخصص امنیت شبکه در شرکت رمیس
- مسلط به مباحث شبکه (داشتن مدرک CCNP مزیت محسوب میشود.)
- تسلط بر مفاهیم پایه ای امنیت شبکه
- تسلط بر پیکربندی تجهیزات Cisco
- تسلط بر پیکربندی تجهیزات FortiGate و FortiWEB
- مسلط به راهبری تجهیزات F5 BIG-IP (تسلط بر مباحث LTM، BIG-IQ)
- آشنایی با ماژول های F5 AFM, ASM مزیت محسوب میشود.
- تسلط بر پروتکل های OSPF و BGP
- حداقل ۵ سال سابقه کار مرتبط
- توانایی کار بصورت On-Call
ارسال رزومه:
📧 [email protected]
@Engineer_Computer
- مسلط به مباحث شبکه (داشتن مدرک CCNP مزیت محسوب میشود.)
- تسلط بر مفاهیم پایه ای امنیت شبکه
- تسلط بر پیکربندی تجهیزات Cisco
- تسلط بر پیکربندی تجهیزات FortiGate و FortiWEB
- مسلط به راهبری تجهیزات F5 BIG-IP (تسلط بر مباحث LTM، BIG-IQ)
- آشنایی با ماژول های F5 AFM, ASM مزیت محسوب میشود.
- تسلط بر پروتکل های OSPF و BGP
- حداقل ۵ سال سابقه کار مرتبط
- توانایی کار بصورت On-Call
ارسال رزومه:
📧 [email protected]
@Engineer_Computer
ISO/IEC 27556:2022
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
#ISO #ISMS #PII
@Engineer_Computer
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
#ISO #ISMS #PII
@Engineer_Computer
ISO IEC 27556-2022.pdf
1.7 MB
ISO/IEC 27556:2022
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
#ISO #ISMS #PII
@Engineer_Computer
Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework
#ISO #ISMS #PII
@Engineer_Computer
#NIST SP 800-124r2
Guidelines for Managing the Security of Mobile Devices in the Enterprise
May 2023
@Engineer_Computer
Guidelines for Managing the Security of Mobile Devices in the Enterprise
May 2023
@Engineer_Computer
NIST_SP_800-124r2.pdf
8.1 MB
#NIST SP 800-124r2
Guidelines for Managing the Security of Mobile Devices in the Enterprise
May 2023
@Engineer_Computer
Guidelines for Managing the Security of Mobile Devices in the Enterprise
May 2023
@Engineer_Computer
Authoritative
Guide to SBOM
Implement and optimize use of Software Bill of Materials
#OWASP
@Engineer_Computer
Guide to SBOM
Implement and optimize use of Software Bill of Materials
#OWASP
@Engineer_Computer
OWASP CDX.pdf
5.3 MB
Authoritative
Guide to SBOM
Implement and optimize use of Software Bill of Materials
#OWASP
@Engineer_Computer
Guide to SBOM
Implement and optimize use of Software Bill of Materials
#OWASP
@Engineer_Computer
#OWASP Threat and Safeguard Matrix (TaSM)
🔸 https://owasp.org/www-project-threat-and-safeguard-matrix/
#Site
@Engineer_Computer
🔸 https://owasp.org/www-project-threat-and-safeguard-matrix/
#Site
@Engineer_Computer
Microsoft uncovers the ruthless efficiency of ransomware attacks.
In just 5 days, hackers complete the entire attack process, breaching systems, encrypting vital data, and holding organizations hostage.
Details: https://thehackernews.com/2023/07/blackbyte-20-ransomware-infiltrate.html
🔒 Yet another critical SQL injection vulnerability (CVE-2023-36934) uncovered in popular MOVEit Transfer—the same software that was exploited in a series of recent cyberattacks to deploy Clop #ransomware.
Read details: https://thehackernews.com/2023/07/another-critical-unauthenticated-sqli.html
@Engineer_Computer
In just 5 days, hackers complete the entire attack process, breaching systems, encrypting vital data, and holding organizations hostage.
Details: https://thehackernews.com/2023/07/blackbyte-20-ransomware-infiltrate.html
🔒 Yet another critical SQL injection vulnerability (CVE-2023-36934) uncovered in popular MOVEit Transfer—the same software that was exploited in a series of recent cyberattacks to deploy Clop #ransomware.
Read details: https://thehackernews.com/2023/07/another-critical-unauthenticated-sqli.html
@Engineer_Computer
tools
Offensive security
1. CMseeK - WordPress, Joomla, Drupal and over 180 other CMSs Detection and Exploitation Suite
https://github.com/Tuhinshubhra/CMSeeK
2. Shell backdoor free bypass
https://github.com/Mr-7Mind/MiniShell
@Engineer_Computer
Offensive security
1. CMseeK - WordPress, Joomla, Drupal and over 180 other CMSs Detection and Exploitation Suite
https://github.com/Tuhinshubhra/CMSeeK
2. Shell backdoor free bypass
https://github.com/Mr-7Mind/MiniShell
@Engineer_Computer
GitHub
GitHub - Tuhinshubhra/CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs - Tuhinshubhra/CMSeeK
Offensive security
1. Modified DomainPasswordSpray version to enumerate machine accounts and perform a pre2k password spray
https://github.com/eversinc33/Invoke-Pre2kSpray
2. Hunting for Bitwarden master passwords stored in memory
https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords
]-> https://github.com/markuta/bw-dump
@Engineer_Computer
1. Modified DomainPasswordSpray version to enumerate machine accounts and perform a pre2k password spray
https://github.com/eversinc33/Invoke-Pre2kSpray
2. Hunting for Bitwarden master passwords stored in memory
https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords
]-> https://github.com/markuta/bw-dump
@Engineer_Computer
GitHub
GitHub - eversinc33/Invoke-Pre2kSpray: Enumerate domain machine accounts and perform pre2k password spraying.
Enumerate domain machine accounts and perform pre2k password spraying. - eversinc33/Invoke-Pre2kSpray
FREE Cyber Security Certifications/Training
1. Introduction to Cybersecurity: https://lnkd.in/ghQY8cKA
2. Cybersecurity Essentials: https://lnkd.in/gZe6bf-t
3. Networking Essentials: https://lnkd.in/gjipDpgG
4. Intro to Information Security by Udacity: https://lnkd.in/ggdYxnUp
5. Network Security by Udacity: https://lnkd.in/gSHx2tJQ
6. NSE 1,2 & 3: https://lnkd.in/gsQJhn2a
7. Information Security by OpenLearn: https://lnkd.in/gvfghKNs
8. Network Security by OpenLearn: https://lnkd.in/gS2KWNfN
9. Risk Management by Open Learn: https://lnkd.in/gGPTDU2g
10. Certified in Cybersecurity℠ - CC: https://lnkd.in/gW3w8Jqu
11. CCNA Security Courses: https://lnkd.in/gfby3CR2
12. Network Defense Essentials (NDE): https://lnkd.in/g6mRKt2t
13. Ethical Hacking Essentials (EHE): https://lnkd.in/gRBGCud7
14. Digital Forensics Essentials (DFE): https://lnkd.in/gPrkYcDH
15. Dark Web, Anonymity, and Cryptocurrency: https://lnkd.in/gUrCCGdf
16. Digital Forensics by Open Learn: https://lnkd.in/gdv8emgt
17. AWS Cloud Certifications (Cybersecurity) : https://lnkd.in/gaDGWdkm
18. Microsoft Learn for Azure: https://lnkd.in/gDpkXiik
19. Google Cloud Training: https://lnkd.in/get8rnkh
20. Android Bug Bounty Hunting: Hunt Like a Rat: https://lnkd.in/gMNT8saN
21. Vulnerability Management: https://lnkd.in/gvNKJnni
22. Software Security: https://lnkd.in/gG4P5bkn
23. Developing Secure Software: https://lnkd.in/gQRwTzKU
24. PortSwigger Web Hacking - https://lnkd.in/eEa-fNfu
25. RedTeaming - https://lnkd.in/et_T2DEa
26. Splunk - https://lnkd.in/et5bkjeY
27. Secure Software Development - https://lnkd.in/ebGpA4wG
28. Maryland Software Security - https://lnkd.in/e3z4zFmJ
29. Stanford Cyber Resiliency - https://lnkd.in/eg9BM5Bv
30. Cyber Threat Intelligience - https://lnkd.in/eWY_tD72
@Engineer_Computer
1. Introduction to Cybersecurity: https://lnkd.in/ghQY8cKA
2. Cybersecurity Essentials: https://lnkd.in/gZe6bf-t
3. Networking Essentials: https://lnkd.in/gjipDpgG
4. Intro to Information Security by Udacity: https://lnkd.in/ggdYxnUp
5. Network Security by Udacity: https://lnkd.in/gSHx2tJQ
6. NSE 1,2 & 3: https://lnkd.in/gsQJhn2a
7. Information Security by OpenLearn: https://lnkd.in/gvfghKNs
8. Network Security by OpenLearn: https://lnkd.in/gS2KWNfN
9. Risk Management by Open Learn: https://lnkd.in/gGPTDU2g
10. Certified in Cybersecurity℠ - CC: https://lnkd.in/gW3w8Jqu
11. CCNA Security Courses: https://lnkd.in/gfby3CR2
12. Network Defense Essentials (NDE): https://lnkd.in/g6mRKt2t
13. Ethical Hacking Essentials (EHE): https://lnkd.in/gRBGCud7
14. Digital Forensics Essentials (DFE): https://lnkd.in/gPrkYcDH
15. Dark Web, Anonymity, and Cryptocurrency: https://lnkd.in/gUrCCGdf
16. Digital Forensics by Open Learn: https://lnkd.in/gdv8emgt
17. AWS Cloud Certifications (Cybersecurity) : https://lnkd.in/gaDGWdkm
18. Microsoft Learn for Azure: https://lnkd.in/gDpkXiik
19. Google Cloud Training: https://lnkd.in/get8rnkh
20. Android Bug Bounty Hunting: Hunt Like a Rat: https://lnkd.in/gMNT8saN
21. Vulnerability Management: https://lnkd.in/gvNKJnni
22. Software Security: https://lnkd.in/gG4P5bkn
23. Developing Secure Software: https://lnkd.in/gQRwTzKU
24. PortSwigger Web Hacking - https://lnkd.in/eEa-fNfu
25. RedTeaming - https://lnkd.in/et_T2DEa
26. Splunk - https://lnkd.in/et5bkjeY
27. Secure Software Development - https://lnkd.in/ebGpA4wG
28. Maryland Software Security - https://lnkd.in/e3z4zFmJ
29. Stanford Cyber Resiliency - https://lnkd.in/eg9BM5Bv
30. Cyber Threat Intelligience - https://lnkd.in/eWY_tD72
@Engineer_Computer
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
https://gbhackers.com/stackrot-new-linux-kernel-privilege-escalation-vulnerability/
یه vulnerability داخل کرنل لینوکس پیدا شده که به هکر اجازه دسترسی به کرنل لینوکس و بالابردن سطح دسترسی و امتیاز رو میده .
درموردش میتونید اینجا بیشتر مطالعه کنید .
@Engineer_Computer
یه vulnerability داخل کرنل لینوکس پیدا شده که به هکر اجازه دسترسی به کرنل لینوکس و بالابردن سطح دسترسی و امتیاز رو میده .
درموردش میتونید اینجا بیشتر مطالعه کنید .
@Engineer_Computer
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
StackRot - New Linux kernel Privilege Escalation Vulnerability
The stockpot is a Linux kernel vulnerability that lets an attacker compromise the kernel and escalate the privileges.
Another Critical Unauthenticated SQLi Flaw Discovered in MOVEit Transfer Software
https://thehackernews.com/2023/07/another-critical-unauthenticated-sqli.html
@Engineer_Computer
https://thehackernews.com/2023/07/another-critical-unauthenticated-sqli.html
@Engineer_Computer