menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Medium

1w

read

410

img
dot

Image Credit: Medium

Enhancing Security Intelligence with AI-Driven SIEM Solutions

  • AI-driven SIEM solutions leverage machine learning algorithms and advanced analytics to enhance threat detection, perform behavioral analysis, enable adaptive response, and streamline incident response.
  • AI can identify subtle indicators of compromise, establish baselines for normal activity, adapt and learn from previous incidents, and automate routine tasks, thus empowering security teams and improving scalability.
  • Challenges of AI-driven SIEM solutions include ensuring data quality, addressing security and privacy concerns, and bridging the skill gap required for implementation and management.

Read Full Article

like

24 Likes

source image

Kitploit

1w

read

205

img
dot

Image Credit: Kitploit

NTLM Relay Gat - Powerful Tool Designed To Automate The Exploitation Of NTLM Relays

  • NTLM Relay Gat is a powerful tool designed to automate the exploitation of NTLM relays.
  • It leverages ntlmrelayx.py from the Impacket tool suite for streamlined vulnerability exploitation.
  • Features include multi-threading support, SMB shares enumeration, SMB shell execution, secrets dumping, MSSQL database enumeration, and MSSQL command execution.
  • NTLM Relay Gat is intended for educational and ethical penetration testing purposes only.

Read Full Article

like

12 Likes

source image

Medium

1w

read

230

img
dot

Image Credit: Medium

WhizCyber Site Templates Web Templates

  • WhizCyber is a custom design package for Cyber Security Services, offering solutions for computer security, network security, and web security.
  • The template features modern, clean, and unique design based on the latest technology.
  • It includes various HTML templates for home page, about page, and blog pages.
  • The template is compatible with all modern browsers and search engine friendly.

Read Full Article

like

13 Likes

source image

Medium

1w

read

256

img
dot

Image Credit: Medium

Athena TryHackMe Walkthrough

  • The Athena TryHackMe room is a little more complicated than it seems on first inspection.
  • Nmap revealed open ports 22, 80 and 445.
  • Enumeration of SMB resulted in finding the public share and a note for the Administrator.
  • Web app exploitation followed via command injection and transfer of linpeas.sh.
  • An additional user called ‘Athena’ was found and the ‘backup.sh’ file was identified and utilised.
  • Running ‘sudo -l’ showed an unknown function ‘give_root()’ in binary 'venom.ko'.
  • Reversing the function led to killing process 57 which granted root!

Read Full Article

like

15 Likes

source image

Securityaffairs

1w

read

0

img
dot

Image Credit: Securityaffairs

Law enforcement agencies identified LockBit ransomware admin and sanctioned him

  • Law enforcement agencies have identified and sanctioned the admin of the LockBit ransomware operation.
  • The admin, Dmitry Yuryevich Khoroshev, a Russian national, is now subject to asset freezes and travel bans.
  • LockBit targeted over 100 hospitals and healthcare companies, resulting in at least 2,110 victims.
  • Law enforcement agencies have obtained decryption keys and are assisting LockBit victims in recovering their files.

Read Full Article

like

Like

source image

Coin Telegraph

1w

read

382

img
dot

My traumatic Apple ID hack showed pitfalls of centralized identity

  • A breach of your Apple ID can leave you all but helpless to prevent attackers from poring over and stealing the contents of your life.
  • The author, a tech entrepreneur, fell victim to an audacious attack on their Apple ID despite having precautions in place.
  • The attacker made multiple login attempts and then called the author, posing as Apple technical support.
  • The author recognized the call as suspicious and refused to give the code requested by the attacker.

Read Full Article

like

23 Likes

source image

Hackingblogs

1w

read

248

img
dot

Image Credit: Hackingblogs

Introduction to Tcpdump — A Free and Robust Command-Line Utility 2024

  • Tcpdump is a flexible, powerful command-line utility that helps network testers, network administrators, and information security professionals monitor activities on their networks.
  • Tcpdump is a packet analyzer that prints out a description of packets being transmitted or received over a network.
  • Tcpdump provides several options for capturing packets, including capturing from a specific interface, capturing a specific number of packets, and capturing and saving packets in a file.
  • Tcpdump is a valuable tool for network monitoring and security analysis, offering flexibility and precision in capturing and analyzing network traffic.

Read Full Article

like

14 Likes

source image

Hackingblogs

1w

read

46

img
dot

Image Credit: Hackingblogs

Quick and Easy Banner Grabbing Script with Python3

  • Banner grabbing is a common technique used in cybersecurity to gather information about a target system.
  • The Python script for banner grabbing imports the necessary library and prompts the user to enter the IP address and port.
  • The script establishes a connection to the specified IP and port, retrieves the banner, and prints it.
  • Improvements can be made by implementing exception handling and refining the banner display.

Read Full Article

like

2 Likes

source image

Hackingblogs

1w

read

391

img
dot

Image Credit: Hackingblogs

Exploiting Command Injection Vulnerability in DVWA robustly and easily in 2024

  • The article discusses Command Injection Vulnerability in DVWA and how to exploit it.
  • Command Injection is a type of cyberattack where an attacker can run arbitrary commands on a susceptible system.
  • Developers must constantly verify and purify user input to defend against command injection attacks.
  • The purpose of the command injection attack is to inject and execute commands specified by the attacker in the vulnerable application.
  • The vulnerable system executes unwanted system commands, and the attacker may use it as any authorized system user.
  • Command injection attacks are possible due to lack of correct input data validation.
  • The severity of the vulnerability can be very high and can lead to the complete degradation of the site.
  • The article details the steps to exploit the vulnerability through inputting a command to the system.
  • The article concludes by encouraging readers to conduct regular security assessments and investigate any suspected attack promptly.
  • It is important to implement necessary security measures to prevent future incidents and secure the system against command injection attacks.

Read Full Article

like

23 Likes

source image

TechCrunch

1w

read

298

img
dot

Image Credit: TechCrunch

What we learned from the indictment of LockBit’s mastermind

  • The mastermind behind LockBit, Dmitry Yuryevich Khoroshev, has been identified and charged with computer crimes, fraud, and extortion.
  • Khoroshev had an online alias, putinkrab, which may reference Russian President Vladimir Putin.
  • Surprisingly, LockBit targeted Russian victims as well, contrary to the usual unwritten rule of not targeting within the country.
  • Khoroshev closely monitored his affiliates and developed a tool called 'StealBit' to store stolen data on his servers.
  • LockBit and its affiliates extorted around $500 million from 2,500 victims, causing billions of dollars in damages worldwide.
  • In a shocking revelation, Khoroshev reached out to law enforcement offering his services in exchange for information on competitors.

Read Full Article

like

17 Likes

source image

Securityaffairs

1w

read

387

img
dot

Image Credit: Securityaffairs

MITRE attributes the recent attack to China-linked UNC5221

  • MITRE disclosed a security breach in its research and prototyping network.
  • A nation-state actor breached the systems using Ivanti Connect Secure vulnerabilities.
  • The attacker manipulated virtual machines and established control over the infrastructure.
  • MITRE attributes the attack to the China-linked UNC5221 APT group.

Read Full Article

like

23 Likes

source image

Securelist

1w

read

231

img
dot

Image Credit: Securelist

Exploits and vulnerabilities in Q1 2024

  • Kaspersky has released a report on the most prevalent vulnerabilities and exploits in Q1 2024. It analyzed the emergence of new vulnerabilities and exploits, as well as the most prevalent vulnerabilities being used by attackers. The report revealed that the number of new registered vulnerabilities has been steadily increasing year over year due to bug bounty programs, improvements in vulnerability monitoring, and new applications appearing. The software categories most affected by critical vulnerabilities with working exploits are operating systems and browsers. Vulnerability exploitation is a significant component of targeted attacks, with malicious actors typically focused on leveraging vulnerabilities within the first few weeks of their publishing.
  • The report highlights the most interesting vulnerabilities registered in Q1 2024, including a backdoor found in the XZ data compression utility package, a vulnerability in Visual Studio, a vulnerability in TeamCity, and a vulnerability found in WinRAR. The report advises organizations to maintain a comprehensive understanding of infrastructure and assets, implement a robust patch management system, and use comprehensive security solutions, among others.

Read Full Article

like

13 Likes

source image

readwrite

1w

read

366

img
dot

Image Credit: readwrite

China accused of hacking the UK Ministry of Defence in massive data breach

  • The Chinese state has reportedly hacked the UK Ministry of Defence, with MPs receiving reports of a massive data breach.
  • The Chinese state is believed to be the perpetrator of the attack.
  • The data breach targeted the payroll system, compromising personal information of current MoD personnel and some veterans.
  • China has denied the accusations and stated its opposition to all forms of cyber attacks.

Read Full Article

like

22 Likes

source image

Coinpedia

1w

read

75

img
dot

Image Credit: Coinpedia

Poloniex Hacker Laundered $308K in Ethereum Through Tornado Cash

  • The Poloniex hacker has laundered $308,000 in Ethereum through Tornado Cash.
  • The hacker is also in possession of $182 million worth of crypto assets.
  • The Poloniex hack was attributed to the Lazarus Group, a North Korean-based hacking organization.
  • The laundering of funds through Tornado Cash highlights the need for improved security measures in crypto exchanges.

Read Full Article

like

4 Likes

source image

Silicon

1w

read

101

img
dot

Image Credit: Silicon

Notorious Finnish Hacker Jailed Over Patient Records Hack

  • Finnish hacker Julius Kivimäki has been sentenced to six years and three months in prison.
  • He was found guilty of offences including data breach, blackmail attempts, and dissemination of private information.
  • The crimes were very damaging to the fragile state of mental health patients.
  • Kivimäki hacked a psychotherapy center, attempted to extort ransom, and leaked sensitive patient records.

Read Full Article

like

6 Likes

For uninterrupted reading, download the app