part

  • Welcome back, my cyberwarriors! In this series, we will be detailing how an individual or small group of cyberwarriors can impact global geopolitics. The knowledge and tools that YOU hold are a superpower that can change history. Use it wisely. To begin this discussion, let’s look at the actions of a small group of hackers…

    Read More

  • Dear blog readers,I’ve decided to continue my elaboration and provide further actionable intelligence on a well known member of the Darkode cybercrime-friendly forum community Nassef.Nassef is using [email protected] as his personal email address account and is known to have registered the following domains using it – hxxp://tonymontana.cards – hxxp://tonymontana.cash – hxxp://tonymontana.biz.He’s also using the following…

    Read More

  • Hi everyone! 👋 I’m Abhijeet Kumawat — a passionate bug bounty hunter and security researcher who loves exploring and sharing knowledge…Continue reading on InfoSec Write-ups »

    Read More

  • Building Your Home Cybersecurity Lab for Pentesting: Part 2 — Setting Up the Network Using VirtualBox and VMware WorkstationIn this second part of our series on building a cybersecurity home lab, we will focus on configuring the network environment using VirtualBox and VMware Workstation. A properly configured network is essential for seamless communication between virtual machines (VMs)…

    Read More

  • Building Your Home Cybersecurity Lab for Pentesting : Part 3— Importing and Exploring KioptrixIn this final installment of our series, we’ll walk through the process of importing the Kioptrix vulnerable machine from VulnHub into VirtualBox and exploring it using Kali Linux running in VMware Workstation.Importing Kioptrix into VirtualBoxDownload Kioptrix from VulnHub:Visit the VulnHub website and search for…

    Read More

  • IntroductionHi everyone, Myself, Sarath D, as a working professional and security researcher, and I have working experience in the cybersecurity and application security domain. Today we will discuss how host headers work in client-server interaction and how it leads to host header injection when improperly misconfigured backend server settings.Table of contentsWhat is a host header, and…

    Read More

  • In our previous interview with Pryx, the threat actor briefly touched upon the concept of server-side stealers claiming it to be completely different from how traditional info-stealers work. We were interested in learning more about this new innovative approach so we decided to dive deeper in a follow-up chat-based interview. This time, Pryx not only explained…

    Read More

  • Table of contents Security Operations Center (SOC) and Detection Engineering teams frequently encounter challenges in both creating and maintaining detection rules, along with their associated documentation, over time. These difficulties stem largely from the sheer number of detection rules required to address a wide range of technologies.

    Read More

  • Based on both Microsoft Threat Intelligence’s findings and those reported by governments and other security vendors, we assess that the Russian nation-state actor tracked as Secret Blizzard has used the tools and infrastructure of at least six other threat actors during the past seven years. They also have actively targeted infrastructure where other threat actors…

    Read More

  • After co-opting the tools and infrastructure of another nation-state threat actor to facilitate espionage activities, as detailed in our last blog, Russian nation-state actor Secret Blizzard used those tools and infrastructure to compromise targets in Ukraine. Microsoft Threat Intelligence has observed that these campaigns consistently led to the download of Secret Blizzard’s custom malware, with…

    Read More

  • MalBot December 10, 2024, 6:15pm 1 The surge in online shopping and travel bookings during the holiday season offers rich pickings for cybercriminals. Black Friday, Cyber Monday, Christmas shopping, and increased travel throughout December offer ample opportunities for cybercriminals to profit from the high volume of transactions and the growing reliance on digital platforms in…

    Read More

  • This is the first of a two-part series. The holiday season is here. It’s a time for reuniting with family and friends, travel and gift-giving. It’s also a prime time for cybercrime as millions of consumers head to online checkouts on Black Friday, Cyber Monday, Giving Tuesday and throughout the holiday season. Cybercriminals capitalize on…

    Read More

  • Not The Models You’re Looking For  Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor of the Malware Binary Triage (IMBT) course starting this Black Friday and Cyber Monday!

    Read More

  • “I have not failed. I’ve just found 10,000 ways that won’t work”

    Read More

  • As businesses realized the potential of AI, the race began to incorporate machine learning operations (MLOps) into their commercial strategies. But the integration of machine learning (ML)  into the real-world proved challenging, and the vast gap between development and deployment was made clear. In fact, research from Gartner tells us 85% of artificial intelligence (AI)…

    Read More

  • Anything is a Nail When Your Exploit’s a Hammer  Previously…  In previous blogs we’ve discussed HOW to exploit vulnerable configurations and develop basic exploits for vulnerable model protocols. Now it’s time to focus all of this information – protocols, models and Hugging Face itself – into a viable attack Proof-of-Concept against various libraries. 

    Read More

  • Data Integrity controls for a more secure cloud platform using the CIA Triad model (checklist) Published in · 20 min read · 1 day ago In the last article we covered Confidentiality, CIA Triad in Cloud Security (Part 1: Confidentiality) As a quick review, there are 3 aspects of the CIA Triad which is a…

    Read More

  • MalBot November 28, 2024, 9:15am 1 The investigation revealed that the criminal network used the same modus operandi and, in part, also the same organisation and infrastructure as the perpetrators previously investigated under Operation Admiral. Announced in November 2022, the investigation is considered the largest VAT fraud ever uncovered in the EU, with damages now…

    Read More

  • Six months after announcing (and modifying and delaying) Windows Recall, Microsoft has released a first-look preview of a reworked version for Windows Insiders via its Dev Channel. 

    Read More

  • TL;DR Take lessons learned from investigation, such as reviewing how emails evaded existing phishing controls to update anti-malware policies.   Configure Defender for Office and Defender for Cloud Apps threat and alert policies to prevent and detect email-based attacks.  Don’t rely on out-of-the-box (OOTB) configuration, use KQL to identify noisy polices and adjust rule scope or…

    Read More