The CyberShield Chroniclescyberinsights.hashnode.dev·Dec 2, 2023TrueSightKiller Unleashed: A GitHub-Published Arsenal for Disabling Anti-Virus and EDR DefensesExecutive Summary On November 28, 2023, the GitHub user MaorSabag released TrueSightKiller, a C++ tool specifically designed to disable security features such as antivirus (AV) or Endpoint Detection and Response (EDR) systems. According to MaorSabag,...Discuss·6 likes·40 reads#cybersecurity
Joan Estebanjanestebans.hashnode.dev·Jun 16, 2023Basic Windows AV Bypass - Part 5 - Embed and Execute the ShellcodeNow we can finally start coding our trojan. The malware we are going to use for testing is a reverse TCP shell from Metasploit. Before coding the shellcode loader, let's see if AVs can detect the reverse shell executable. To generate the reverse TCP ...Discuss·28 readsBasic Windows AV BypassMalware
James Gallagherjamesonhacking.hashnode.dev·Mar 13, 2023Low-Tech EDR Bypasses That WorkIn this blog post, I'll share two low-tech methods I've used for defeating antivirus, EDR, MDR, XDR and whatever else the kids on my lawn are calling it these days. The first is a method I've been using for years that has yielded many wins for me dur...Discuss·107 readsEDR
Swaleha Parvinswaleha.hashnode.dev·Feb 16, 2023Enhance the Security of Your Rocket.Chat Instance with the Rocket.Chat Security BundleI'm excited to share with you about the Rocket. Chat Security Bundle and its powerful set of security features and tools that can help secure your Rocket. Chat instance. Rocket. Chat is an open-source team communication platform that offers real-time...Discuss·10 likes·135 readsAntiVirus
Hasan MahmudforCyber Aeronautycs Ltd. Blogblog.cyberaeronautycs.com·Dec 26, 202210 ways to prevent cyber threats in the workplaceCyber threats can come in many forms, from malware and ransomware to phishing attacks and data breaches. These threats can have serious consequences for businesses, ranging from financial losses and damaged reputations to regulatory fines and legal l...Discuss·1 like·35 readsthreatprevention
MetaversityOneforDeveloper DAO Blog | Web3 Tutorialsblog.developerdao.com·Jul 13, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 4This article is a primer on all things security regarding holding, transacting, and safeguarding cryptocurrencies and NFTs. I didn't mean it to be a complete compendium, but it gives you all the necessary information to start. I divided this primer i...Discuss·155 readsSecurity in CryptoCryptocurrency
MetaversityOnecryptosecurity.hashnode.dev·Mar 2, 2022Security in Crypto, Hardware Wallets and Pseudonymity - Part 4/7Part 4 discusses Software Wallets and how they are made vulnerable by poor device security and the user’s habits. We discuss how to harden devices using antivirus, anti-malware, VPN and Ad-Block; and the inevitable need to use Hardware Wallets to pro...Discuss·1 like·89 readsSecurity in Crypto, Hardware Wallets and PseudonymityCryptocurrency