گستره آلوده شدن توسط نرم افزار جاسوسی پگاسوس بزرگتر شد
هدف قرار گرفته شدن افراد برای جاسوسی
درمورد پگاسوس قبلا در کانال مطلب گذاشته ایم که اختصاصا برای جاسوسی از افراد طراحی شده است.
https://cybersecuritynews-com.cdn.ampproject.org/c/s/cybersecuritynews.com/pegasus-spyware-detected-in-new-mobile-devices/amp/
@Engineer_Computer
هدف قرار گرفته شدن افراد برای جاسوسی
درمورد پگاسوس قبلا در کانال مطلب گذاشته ایم که اختصاصا برای جاسوسی از افراد طراحی شده است.
https://cybersecuritynews-com.cdn.ampproject.org/c/s/cybersecuritynews.com/pegasus-spyware-detected-in-new-mobile-devices/amp/
@Engineer_Computer
Cyber Security News
Isreali NSO Group's Pegasus Spyware Detected in New Mobile Devices
Pegasus spyware, developed by NSO Group, shows that spyware targets not only activists and journalists but also professionals and civilians
کال بک هایی در سیستم عامل که بدافزار نویسان و امنیت چی ها دنبال آن هستند
https://codemachine.com/articles/kernel_callback_functions.html
@Engineer_Computer
https://codemachine.com/articles/kernel_callback_functions.html
@Engineer_Computer
Codemachine
CodeMachine - Article - Kernel Callback Functions
Comprehensive list of documented and undocumented APIs available in the Windows kernel to register callback routines.
Discover how Zero-Trust Network Access (ZTNA) strengthens cybersecurity, reduces costs, and streamlines remote access.
Explore best practices for seamlessly integrating ZTNA into your existing security systems.
Read:
https://thehackernews.com/expert-insights/2024/08/best-practices-for-integrating-ztna.html
Gartner's latest CTEM report highlights Adversarial Exposure Validation (AEV) as vital for cybersecurity, combining breach simulation with pentesting to streamline security assessments, automate testing, and enhance resilience.
Learn more:
https://thehackernews.com/2024/08/ctem-in-spotlight-how-gartners-new.html
@Engineer_Computer
Explore best practices for seamlessly integrating ZTNA into your existing security systems.
Read:
https://thehackernews.com/expert-insights/2024/08/best-practices-for-integrating-ztna.html
Gartner's latest CTEM report highlights Adversarial Exposure Validation (AEV) as vital for cybersecurity, combining breach simulation with pentesting to streamline security assessments, automate testing, and enhance resilience.
Learn more:
https://thehackernews.com/2024/08/ctem-in-spotlight-how-gartners-new.html
@Engineer_Computer
🔒 U.S. agencies have identified an Iranian hacking group, Pioneer Kitten, as the force behind a wave of ransomware attacks.
Key sectors like education, healthcare, and defense are under fire, with sensitive data hanging in the balance.
Read:
https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html
Discover how Identity Threat Detection & Response (ITDR) solutions safeguard both human and non-human identities across across multi-environment cloud services, enhancing security against sophisticated identity-based attacks.
Read Guide:
https://thehackernews.com/2024/08/identity-threat-detection-and-response.html
@Engineer_Computer
Key sectors like education, healthcare, and defense are under fire, with sensitive data hanging in the balance.
Read:
https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html
Discover how Identity Threat Detection & Response (ITDR) solutions safeguard both human and non-human identities across across multi-environment cloud services, enhancing security against sophisticated identity-based attacks.
Read Guide:
https://thehackernews.com/2024/08/identity-threat-detection-and-response.html
@Engineer_Computer
WebApp Security
Government Emails at Risk:
Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
https://www.sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail
A critical security flaw in Atlassian Confluence has been exploited for cryptocurrency mining. This vulnerability, CVE-2023-22527, allows unauthorized access, leading to potential severe financial and operational damage.
Read:
https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
Confluence Vulnerabilty Exploited for Crypto Miners
https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
@Engineer_Computer
Government Emails at Risk:
Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
https://www.sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail
A critical security flaw in Atlassian Confluence has been exploited for cryptocurrency mining. This vulnerability, CVE-2023-22527, allows unauthorized access, leading to potential severe financial and operational damage.
Read:
https://thehackernews.com/2024/08/atlassian-confluence-vulnerability.html
Confluence Vulnerabilty Exploited for Crypto Miners
https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
@Engineer_Computer
Sonarsource
Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
Sonar’s R&D team discovered a Cross-Site Scripting vulnerability in Roundcube. Similar vulnerabilities in Roundcube have been used by APTs to steal government emails.
SOC Analyst Tier1 Interview Form.pdf
212.8 KB
نمونه فرم مصاحبه کارشناس مرکز عملیات امنیت SOC T1
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
لینک مقاله را در readmedium بگذارید
https://readmedium.com/threat-modeling-and-risk-assessment-with-example-3d8bc6177e8d
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
Readmedium
Threat modeling and Risk Assessment with example
1. Threat Modeling:
چند نوع حمله
2024-12-05 10:12:34 - User Logon - User: student1 - Source IP: 192.168.1.5 - Workstation: WORKSTATION01
2024-12-05 10:15:12 - Kerberos Service Ticket Request - User: attacker01 - Service: HTTP/[email protected]
2024-12-05 10:15:18 - Security Warning - Suspicious ticket request detected for user attacker01 from IP 192.168.1.101.
2024-12-05 10:20:45 - Service Account Enumeration - Host: DC01 - User: attacker01 - Process: Mimikatz.exe
2024-12-05 10:23:30 - Privilege Escalation - User: attacker01 - Action: SeImpersonatePrivilege enabled.
2024-12-05 10:25:11 - Lateral Movement Detected - Source IP: 192.168.1.101 - Destination: 192.168.1.12 - Protocol: SMB
2024-12-05 10:30:00 - Pass-the-Hash - NTLM Authentication - Source: 192.168.1.12 - Account: admin01 - Hash Used: abcd1234abcd1234abcd1234abcd1234
2024-12-05 10:35:22 - Directory Replication Attempt - User: attacker01 - Command: DCSync - Target: DC01
2024-12-05 10:35:50 - Security Alert - Unauthorized replication detected! Account: attacker01.
2024-12-05 10:40:00 - Malware Executed - Process: lsass.exe - Host: 192.168.1.12 - User: attacker01 - Code Injection Detected
2024-12-05 10:45:13 - DCShadow Attack - New Schema Update Initiated by attacker01.
2024-12-05 10:50:00 - Security Alert - Unauthorized attribute modification - Target: DC01 - Attributes: msDS-AllowedToActOnBehalfOfOtherIdentity
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
https://securityonline.info/poc-exploit-releases-for-critical-zabbix-vulnerability-cve-2024-42327/
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
Daily CyberSecurity
PoC Exploit Releases for Critical Zabbix Vulnerability - CVE-2024-42327 (CVSS 9.9)
Security researcher Alejandro Ramos has published a detailed technical analysis and proof-of-concept (PoC) exploit code for CVE-2024-42327
JShunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying sensitive data, such as API endpoints and potential security vulnerabilities, making it an essential resource for developers and security researchers.
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #bugbountyTools
Please open Telegram to view this post
VIEW IN TELEGRAM
THE BEST SOC ANALYST TOOLS.pdf
3.4 MB
ابزار های مهم برای SOC
#infosec #cybersecurity #SOC #pentest #SOCTools
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉1
State of Physical Security 2025.pdf
8.9 MB
Strategizing, planning, and investing wisely
The integration of artificial intelligence (AI) into physical security systems is promising development and one end users are eager to explore (10% did in 2024 and 37% plan to in 2025)
Analytics and Al techniques will continue to usher in new possibilities, allowing businesses to capitalize on existing physical security data, infrastructure, and sensors to automate mundane tasks and drive higher levels of operational efficiency company-wide.
#infosec #cybersecurity #SOC #pentest #SOCTools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
👈سرمایهگذاری ۲ میلیارد دلاری شرکتهای آمریکایی: شرکت ServiceNow اعلام کرده که قصد داره ۲ میلیارد دلار برای ساخت مراکز داده در ژاپن سرمایهگذاری کنه. این اقدام با هدف تقویت خدمات هوش مصنوعی و پاسخگویی بهتر به نیازهای مشتریان ژاپنی انجام میشه. بخشی از این بودجه هم به توسعه هوش مصنوعی مولد اختصاص داره.
#NEWS
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1
#استخدام #تهران
🔖 شرکت خدمات انفورماتیک به دنبال جذب کارشناس حرفهای در حوزه تست نفوذ برای پیوستن به تیم امنیتی خود است. اگر در امنیت سایبری تجربه دارید و علاقهمندید در پروژههای مهم و چالشبرانگیز کار کنید، این فرصت میتواند مسیر شغلی شما را متحول کند. در این نقش، شما مسئولیت حفاظت از زیرساختهای حساس بانکی کشور را بر عهده خواهید داشت
شرایط عمومی
- حداقل یک سال تجربه عملی در زمینه تست نفوذ
- توانایی کار تیمی و برقراری ارتباط موثر
- روحیه تحقیقاتی و تمایل به یادگیری مستمر در حوزه امنیت سایبری
- کارت پایان خدمت یا معافیت دائم برای آقایان الزامی است
شرایط تخصصی
- تسلط به استانداردهای امنیتی
- تسلط به ابزارهای تست نفوذ
- تجربه عملی در شناسایی و بهره برداری از آسیب پذیری ها
- توانایی تهیه گزارش های دقیق فنی و مدیریتی از نتایج تست ها
اگر آماده اید که دانش و تخصص خود را در محیطی حرفه ای و پویا به کار بگیرید، رزومه خود را به آدرس زیر ارسال کنید و به ما بپیوندید
[email protected]
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
شرایط عمومی
- حداقل یک سال تجربه عملی در زمینه تست نفوذ
- توانایی کار تیمی و برقراری ارتباط موثر
- روحیه تحقیقاتی و تمایل به یادگیری مستمر در حوزه امنیت سایبری
- کارت پایان خدمت یا معافیت دائم برای آقایان الزامی است
شرایط تخصصی
- تسلط به استانداردهای امنیتی
- تسلط به ابزارهای تست نفوذ
- تجربه عملی در شناسایی و بهره برداری از آسیب پذیری ها
- توانایی تهیه گزارش های دقیق فنی و مدیریتی از نتایج تست ها
اگر آماده اید که دانش و تخصص خود را در محیطی حرفه ای و پویا به کار بگیرید، رزومه خود را به آدرس زیر ارسال کنید و به ما بپیوندید
[email protected]
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
یکی از پیامدهای آلوده شدن سیستم به بدافزار (hashtag#Malware)، امکان ایجاد تغییراتی در فایلها و فولدرهای سیستم توسط کدهای مخرب است. برای تحلیل زنده (Live Analysis) سیستمهای آلوده، یک روش مؤثر صحتسنجی فایلها و فولدرها به کمک ابزارهایی مانند:
این ابزارها تغییرات ایجادشده را شناسایی میکنند و تحلیل دقیقی ارائه میدهند.
اگر دسترسی به ابزارهای تخصصی فوق وجود ندارد، ابزار داخلی Windows به نام Sigverif میتواند برای بررسی تغییرات در فایلهای سیستمی مورد استفاده قرار گیرد.
#CyberSecurity #MalwareAnalysis #FileIntegrity #ThreatDetection #WindowsTools #SystemSecurity #Sigverif #Tripwire #NetwrixAuditor #ITSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2
SOC ANALYST.pdf
2.4 MB
🌐 What is a Security Operations Center (SOC)?
A SOC is the frontline of cybersecurity, where teams monitor, detect, and respond to threats in real-time. It’s the beating heart of an organization’s defense strategy! 💻
💡 Why should you learn about SOC?
✔️ 24/7 Threat Monitoring: Stay ahead of potential breaches.
✔️ Incident Response Expertise: Act swiftly and effectively during attacks.
✔️ Proactive Defense: Mitigate risks before they escalate.
✔️ Career Growth: SOC skills are in high demand in the cybersecurity industry!
📚 Want to enhance your skills and explore the SOC framework?
#SOC #Cybersecurity #InformationSecurity #IncidentResponse #ThreatDetection #NetworkSecurity #TechCareers #CyberDefense #ITSecurity #TechCommunity
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
وبیناری از مندینت
https://www.brighttalk.com/webcast/17758/629438?utm_source=social_organic_marketing&utm_medium=linkedin&utm_campaign=629438&linkId=11860348
Please open Telegram to view this post
VIEW IN TELEGRAM
BrightTALK
Google Cloud EMEA Cybersecurity Forecast 2025
Cyber threats are constantly evolving. Learn how to stay ahead of them in 2025 with security expert Jamie Collier.
Join this deep-dive session based on the Cybersecurity Forecast 2025 report, where we will cover key trends and insights to help strengthen…
Join this deep-dive session based on the Cybersecurity Forecast 2025 report, where we will cover key trends and insights to help strengthen…
https://medium.com/offensive-black-hat-hacking-security/kali-new-release-2024-3-explore-11-new-tools-for-hacking-37e571a6434b
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Kali New Release 2024.3 | Explore 11 New Tools for Hacking
Advanced Penetration Testing using Kali Linux | Hacker Associate