💢 بدافزار جدید در داکر؛ استخراج ارز دیجیتال Dero!
❇️ یک بدافزار خود تکثیرشونده، نمونههای داکر با API ناامن را هدف گرفته و آنها را به رباتهای استخراج ارز دیجیتال Dero تبدیل میکند.
❇️ این بدافزار با نفوذ به کانتینرها، منابع سیستم قربانی را برای استخراج ارز دیجیتال میدزدد و خود را تکثیر میکند. این بدافزار خود را به شکل وبسرور nginx جا زده و با اسکن گسترده شبکه، کانتینرهای بیشتری را آلوده میکند.
❇️ این حمله بیشتر روی کانتینرهای مبتنی بر اوبونتو و محیطهای Kubernetes تمرکز دارد. همچنین مواردی از حمله با ماینر مونرو و درب پشتی پیشرفته نیز مشاهده شده است.
Link
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
❇️ یک بدافزار خود تکثیرشونده، نمونههای داکر با API ناامن را هدف گرفته و آنها را به رباتهای استخراج ارز دیجیتال Dero تبدیل میکند.
❇️ این بدافزار با نفوذ به کانتینرها، منابع سیستم قربانی را برای استخراج ارز دیجیتال میدزدد و خود را تکثیر میکند. این بدافزار خود را به شکل وبسرور nginx جا زده و با اسکن گسترده شبکه، کانتینرهای بیشتری را آلوده میکند.
❇️ این حمله بیشتر روی کانتینرهای مبتنی بر اوبونتو و محیطهای Kubernetes تمرکز دارد. همچنین مواردی از حمله با ماینر مونرو و درب پشتی پیشرفته نیز مشاهده شده است.
Link
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
/
Kaspersky uncovers Dero crypto miner spreading via exposed container environments
Kaspersky Security Services experts have identified a sophisticated cyberattack campaign targeting containerized environments to deploy a miner for the Dero cryptocurrency. The attackers abuse exposed Docker APIs — parts of Docker, an open-source container…
🔑 Lazy loading: Modern OSes load parts of the program only when needed, to save memory.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Q: What are the security implications of Same-Origin Policy (SOP) violations, and how does CORS mitigate these risks?
A: SOP violations can lead to unauthorized cross-origin data access. CORS mitigates this by allowing cross-origin requests only when the target server explicitly includes headers granting permission, thus preserving confidentiality and integrity while enabling controlled sharing.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
A:
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔐 What Does Forward Secrecy Do?
1)When you establish a secure connection (like HTTPS), the session uses a temporary session key to encrypt data.
2)Forward secrecy ensures that each session key is unique and ephemeral — it’s generated for that session only and not derived solely from the server’s long-term key.
3)If an attacker obtains the server’s private key later on, they cannot decrypt past communications recorded from earlier sessions.
🧠 How Is Forward Secrecy Achieved?
Typically, through ephemeral key exchange algorithms such as:
Ephemeral Diffie-Hellman (DHE)
Elliptic Curve Ephemeral Diffie-Hellman (ECDHE)
These generate a fresh temporary key pair per session.
1)When you establish a secure connection (like HTTPS), the session uses a temporary session key to encrypt data.
2)Forward secrecy ensures that each session key is unique and ephemeral — it’s generated for that session only and not derived solely from the server’s long-term key.
3)If an attacker obtains the server’s private key later on, they cannot decrypt past communications recorded from earlier sessions.
🧠 How Is Forward Secrecy Achieved?
Typically, through ephemeral key exchange algorithms such as:
Ephemeral Diffie-Hellman (DHE)
Elliptic Curve Ephemeral Diffie-Hellman (ECDHE)
These generate a fresh temporary key pair per session.
نسخهی بتای XChat به صورت تدریجی برای مشترکین X عرضه میشه. ورژن ارتقا یافته DM پلتفرم اکس که با زبان Rust نوشته شده برای رقابت با سیگنال و واتساپ طراحی شده.
اکسچت با معماری غیرقابل نظارت، رمزگذاری سرتاسری، پیامهای محوشونده، تماس صوتی و تصویری بدون نیاز به شماره تلفن و پشتیبانی از انواع فایلها سعی داره X رو به یک پلتفرم همهکاره تبدیل کنه.
🔗 bbntimes
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
اکسچت با معماری غیرقابل نظارت، رمزگذاری سرتاسری، پیامهای محوشونده، تماس صوتی و تصویری بدون نیاز به شماره تلفن و پشتیبانی از انواع فایلها سعی داره X رو به یک پلتفرم همهکاره تبدیل کنه.
🔗 bbntimes
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🔒 1. DV – Domain Validation
Purpose: Basic encryption, proves control of a domain.
✅ Validation Level: Only verifies that the applicant owns the domain (via DNS, email, or file upload)
📄 Certificate Info: Shows the domain name (e.g., example.com)
👁 Browser Bar: Padlock only, no organization name
💰 Cost: Cheapest (often free with Let's Encrypt)
🧰 Use Case: Personal websites, blogs, small projects
Example:
Issued to: example.com
No organization details shown
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Purpose: Basic encryption, proves control of a domain.
✅ Validation Level: Only verifies that the applicant owns the domain (via DNS, email, or file upload)
📄 Certificate Info: Shows the domain name (e.g., example.com)
👁 Browser Bar: Padlock only, no organization name
💰 Cost: Cheapest (often free with Let's Encrypt)
🧰 Use Case: Personal websites, blogs, small projects
Example:
Issued to: example.com
No organization details shown
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
😈A control flow graph (CFG) is a visual representation of all possible execution paths within a program. It's essentially a graph where nodes represent basic blocks of code (sequences of instructions without jumps) and edges represent the possible flow of control between those blocks. CFGs are crucial for static analysis and compiler optimizations
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
📚 OS Concepts — Named vs Unnamed Pipes 🧵
Let’s talk about how processes talk to each other in UNIX/Linux systems!
🔹 Pipes are a way for processes to send data between each other. There are two types:
🔸 1. Unnamed Pipe
🧠 Temporary, memory-based communication
👨👦 Works between related processes (like parent & child)
➡️ Unidirectional (one-way only)
⚙️ Created using pipe() in C
📂 Not visible in the file system
✅ Example:
When you run:
…the shell creates an unnamed pipe between ls and grep.
🔸 2. Named Pipe (FIFO)
📛 Has a name in the file system
🔗 Used between any processes
⏳ Persistent until deleted
⚙️ Created using mkfifo or mknod
➡️ Also unidirectional
✅ Example:
Terminal 1:
Terminal 2:
#OS #Pipes
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Let’s talk about how processes talk to each other in UNIX/Linux systems!
🔹 Pipes are a way for processes to send data between each other. There are two types:
🔸 1. Unnamed Pipe
🧠 Temporary, memory-based communication
👨👦 Works between related processes (like parent & child)
➡️ Unidirectional (one-way only)
⚙️ Created using pipe() in C
📂 Not visible in the file system
✅ Example:
When you run:
ls | grep txt
…the shell creates an unnamed pipe between ls and grep.
🔸 2. Named Pipe (FIFO)
📛 Has a name in the file system
🔗 Used between any processes
⏳ Persistent until deleted
⚙️ Created using mkfifo or mknod
➡️ Also unidirectional
✅ Example:
Terminal 1:
mkfifo mypipe
echo "Hello" > mypipe
Terminal 2:
cat < mypipe
#OS #Pipes
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
😱In computing, a daemon is a type of program that runs in the background, performing system tasks without direct user interaction. They are often associated with Unix and Unix-like operating systems like Linux and macOS. Daemons typically start automatically when a system boots up and manage system resources, handle network connections, or provide services for other programs.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
📚 OS Concepts — What is a Trap? What is a Trap Table? 🧵
Let’s break down one of the coolest mechanisms your OS uses to switch into "superpower mode" 🦸♂️
🔹 Trap = Software Interrupt
🛎 Happens when a user program needs to request OS services
📞 Example: read(), write(), fork() → These trigger traps
⚙️ Transfers control to the kernel via a safe & controlled mechanism
⏱️ Happens synchronously (exact instruction, not random)
🔹 Trap Table = Phonebook for the OS
🧠 It’s a table that maps trap numbers → handler functions
📍 When a trap happens, the CPU consults the table to know where to jump
💥 Example: Trap 0x80 in Linux → syscall handler
#OS #Traps #SystemCalls #Interrupts #TrapTable #KernelMode
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Let’s break down one of the coolest mechanisms your OS uses to switch into "superpower mode" 🦸♂️
🔹 Trap = Software Interrupt
🛎 Happens when a user program needs to request OS services
📞 Example: read(), write(), fork() → These trigger traps
⚙️ Transfers control to the kernel via a safe & controlled mechanism
⏱️ Happens synchronously (exact instruction, not random)
🔹 Trap Table = Phonebook for the OS
🧠 It’s a table that maps trap numbers → handler functions
📍 When a trap happens, the CPU consults the table to know where to jump
💥 Example: Trap 0x80 in Linux → syscall handler
#OS #Traps #SystemCalls #Interrupts #TrapTable #KernelMode
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
❌Inline hooking is a technique where malware (or legitimate software) modifies the beginning of a function's code—usually by overwriting the first few bytes with a jump (JMP) instruction to custom (malicious) code. This allows the attacker to intercept function calls and either:
Alter inputs or outputs
Inject new behavior
Hide actions or data
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Alter inputs or outputs
Inject new behavior
Hide actions or data
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
❌❌وام سامانه حمایت کلاهبرداری است
بانک مرکزی با صدور اطلاعیه ای ضمن تکذیب انتشار برخی ادعاها مبنی بر پرداخت تسهیلات بانکی از طریق سامانه هایی در فضای مجازی تاکید کرد: برنامه این بانک در خصوص تامین مالی خرد به صورت رسمی در پایگاه اطلاع رسانی این بانک اعلام می شود و هرگونه اخبار مرتبط با پرداخت تسهیلات در فضای مجازی و رسانه های غیررسمی مورد تایید این نهاد نیست.
اخیرا در فضای مجازی اخباری با محتوای «وام ۱۵۰ میلیون تومانی از طریق سامانه حمایت» در حال انتشار است که از اساس این اخبار شایعه بوده و صرفا با هدف #کلاهبرداری و جمع آوری اطلاعات اشخاص صورت می گیرد. #هشدار
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
بانک مرکزی با صدور اطلاعیه ای ضمن تکذیب انتشار برخی ادعاها مبنی بر پرداخت تسهیلات بانکی از طریق سامانه هایی در فضای مجازی تاکید کرد: برنامه این بانک در خصوص تامین مالی خرد به صورت رسمی در پایگاه اطلاع رسانی این بانک اعلام می شود و هرگونه اخبار مرتبط با پرداخت تسهیلات در فضای مجازی و رسانه های غیررسمی مورد تایید این نهاد نیست.
اخیرا در فضای مجازی اخباری با محتوای «وام ۱۵۰ میلیون تومانی از طریق سامانه حمایت» در حال انتشار است که از اساس این اخبار شایعه بوده و صرفا با هدف #کلاهبرداری و جمع آوری اطلاعات اشخاص صورت می گیرد. #هشدار
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
⛑Ubuntu 25.10 Switches to Rust-based Sudo!!
https://www.omgubuntu.co.uk/2025/05/ubuntu-25-10-rust-sudo-rs-change
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
https://www.omgubuntu.co.uk/2025/05/ubuntu-25-10-rust-sudo-rs-change
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
OMG! Ubuntu
Ubuntu 25.10 Switches to Rust-based Sudo
Ubuntu 25.10 will replace the sudo command with sudo-rs, a new Rust rewrite designed to improve memory safety and security. What does this mean for users?
🔧 What is a System Call (Syscall)?
A system call is a controlled entry point that allows user-mode applications to request services from the kernel (like reading a file, opening a network socket, etc.).
🕵️ What is Syscall Hijacking?
Syscall hijacking is when a rootkit modifies or redirects system calls to its own malicious functions, instead of letting them reach the legitimate kernel handlers.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
A system call is a controlled entry point that allows user-mode applications to request services from the kernel (like reading a file, opening a network socket, etc.).
🕵️ What is Syscall Hijacking?
Syscall hijacking is when a rootkit modifies or redirects system calls to its own malicious functions, instead of letting them reach the legitimate kernel handlers.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🏢 2. OV – Organization Validation
Purpose: Encrypts and authenticates the organization behind the domain.
✅ Validation Level: Confirms domain ownership and verifies company details (via business registration, phone, etc.)
📄 Certificate Info: Includes organization name and location
👁 Browser Bar: Padlock only, but company name visible in cert details
💰 Cost: Moderate
🧰 Use Case: Business websites, login portals, B2B platforms
Example:
Issued to: example.com
Organization: Example Corp, US
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Purpose: Encrypts and authenticates the organization behind the domain.
✅ Validation Level: Confirms domain ownership and verifies company details (via business registration, phone, etc.)
📄 Certificate Info: Includes organization name and location
👁 Browser Bar: Padlock only, but company name visible in cert details
💰 Cost: Moderate
🧰 Use Case: Business websites, login portals, B2B platforms
Example:
Issued to: example.com
Organization: Example Corp, US
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
📚 OS Concepts — What Happens When the System Runs Out of RAM? 💥🧵
Let’s break down how the OS reacts when memory is almost full! 🔍
🧠 The Problem:
Your system is running low on RAM. New apps need memory, but there’s no space left! What does the OS do?
🔹 Option 1: Swapping / Paging Out
💽 Move memory pages from RAM → disk (swap area)
🧊 Frees up RAM for urgent tasks
⚠️ Disk is much slower → system may feel sluggish ("thrashing")
📌 Think: Push books to a shelf to make space on your desk
🔹 Option 2: Killing Processes (OOM Killer / LMK)
💀 OS starts terminating processes to free memory
🧠 OOM Killer (Linux): kills least important process
📱 LMK (Android): aggressively frees memory by killing background apps
⚠️ Risk: Important work may be lost if a process is killed
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Let’s break down how the OS reacts when memory is almost full! 🔍
🧠 The Problem:
Your system is running low on RAM. New apps need memory, but there’s no space left! What does the OS do?
🔹 Option 1: Swapping / Paging Out
💽 Move memory pages from RAM → disk (swap area)
🧊 Frees up RAM for urgent tasks
⚠️ Disk is much slower → system may feel sluggish ("thrashing")
📌 Think: Push books to a shelf to make space on your desk
🔹 Option 2: Killing Processes (OOM Killer / LMK)
💀 OS starts terminating processes to free memory
🧠 OOM Killer (Linux): kills least important process
📱 LMK (Android): aggressively frees memory by killing background apps
⚠️ Risk: Important work may be lost if a process is killed
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
📚 OS & Computer Architecture — Understanding Caches & TLB 🧵
Let’s break down how your system stores & accesses memory efficiently!
🔸 A. L1 Cache (Level 1 Cache)
⚡️ Ultra-fast, small-sized cache (typically 16KB–128KB)
📍 Located inside the CPU core
🧠 Stores frequently used instructions & data
⚙️ Split into L1-I (Instructions) and L1-D (Data)
⏱️ Fastest access (~1–2 CPU cycles)
🚀 Purpose: Minimize delay between CPU and memory
🔸 B. Page Cache
🗃 Part of the OS's memory management
💾 Caches data read from or written to disk
🎯 Works at the file system level (pages, not bytes)
📈 Improves I/O performance by reducing disk access
✅ Example:
When you cat file.txt, the data goes to page cache so next reads are instant (RAM-based)!
🔸 C. TLB (Translation Lookaside Buffer)
🧭 Special cache inside the CPU
🔁 Maps virtual addresses → physical addresses
📍 Speeds up memory address translation
🔄 Without TLB, each memory access requires a page table lookup
⏱️ Much faster than walking full page tables
🚨 TLB Miss = CPU has to do extra work (slow)
🔸 D. L3 Cache (Level 3 Cache)
📦 Shared cache across multiple CPU cores
🔁 Larger but slower than L1/L2 (e.g., 4MB–64MB)
📉 Latency: ~10–20 CPU cycles
🧠 Holds data that doesn't fit in L1/L2 but is still reused often
🧰 Acts as a "last chance" before going to main memory
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Let’s break down how your system stores & accesses memory efficiently!
🔸 A. L1 Cache (Level 1 Cache)
⚡️ Ultra-fast, small-sized cache (typically 16KB–128KB)
📍 Located inside the CPU core
🧠 Stores frequently used instructions & data
⚙️ Split into L1-I (Instructions) and L1-D (Data)
⏱️ Fastest access (~1–2 CPU cycles)
🚀 Purpose: Minimize delay between CPU and memory
🔸 B. Page Cache
🗃 Part of the OS's memory management
💾 Caches data read from or written to disk
🎯 Works at the file system level (pages, not bytes)
📈 Improves I/O performance by reducing disk access
✅ Example:
When you cat file.txt, the data goes to page cache so next reads are instant (RAM-based)!
🔸 C. TLB (Translation Lookaside Buffer)
🧭 Special cache inside the CPU
🔁 Maps virtual addresses → physical addresses
📍 Speeds up memory address translation
🔄 Without TLB, each memory access requires a page table lookup
⏱️ Much faster than walking full page tables
🚨 TLB Miss = CPU has to do extra work (slow)
🔸 D. L3 Cache (Level 3 Cache)
📦 Shared cache across multiple CPU cores
🔁 Larger but slower than L1/L2 (e.g., 4MB–64MB)
📉 Latency: ~10–20 CPU cycles
🧠 Holds data that doesn't fit in L1/L2 but is still reused often
🧰 Acts as a "last chance" before going to main memory
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🐞CVE is a catalog of known software flaws, with each ID representing a specific vulnerability. CWE, on the other hand, is a category system for software and hardware weaknesses that can lead to vulnerabilities.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🥃Mitigating DDoS attacks ontheinternet ofthings using federated learning
Link
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Link
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
📚 OS Concepts — Cooperative vs Preemptive Scheduling 🧵
Ever wondered how your computer decides who gets the CPU and when? Let’s break it down:
🔹 1. Cooperative Scheduling
🤝 The process gives up the CPU voluntarily
🛑 If it never gives up, no one else runs
⚠️ One buggy program = system freeze
🏗 Used in old Windows, embedded systems
🔹 2. Preemptive Scheduling (Non-Cooperative)
⏱️ OS uses a timer to interrupt running processes
🔁 CPU is forcefully switched between tasks
💪 More stable & fair
🏃 Used in Linux, Android, Windows, etc.
📌 Key Difference:
Cooperative: “I’ll tell you when I’m done”
Preemptive: “Time’s up! Next process please”
💡
#OS #Scheduling #Preemptive #Cooperative #CSBasics #InfoSecTube
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
Ever wondered how your computer decides who gets the CPU and when? Let’s break it down:
🔹 1. Cooperative Scheduling
🤝 The process gives up the CPU voluntarily
🛑 If it never gives up, no one else runs
⚠️ One buggy program = system freeze
🏗 Used in old Windows, embedded systems
🔹 2. Preemptive Scheduling (Non-Cooperative)
⏱️ OS uses a timer to interrupt running processes
🔁 CPU is forcefully switched between tasks
💪 More stable & fair
🏃 Used in Linux, Android, Windows, etc.
📌 Key Difference:
Cooperative: “I’ll tell you when I’m done”
Preemptive: “Time’s up! Next process please”
💡
Modern OS = Preemptive, for fairness + safety!#OS #Scheduling #Preemptive #Cooperative #CSBasics #InfoSecTube
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🪡Internet Key Exchange (IKE) is a secure key management protocol that establishes secure, authenticated communication channels over IP networks. It's used to set up security associations (SAs) in Internet Protocol Security (IPsec) for VPN connections, ensuring both parties use common encryption and authentication methods for secure data exchange.
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
🎯@InfoSecTube
📌YouTube channel
🎁Boost Us