Ron Bhubandspoke.amastelek.com·May 1, 2024Deploying a FusionRT edge - NFV functionality on a SD-WAN edgeUsing Fusion SD-WAN it is possible to deploy an edge that has a floating static IP of /32 which is associated with a fully functional router and firewall using Openwrt. This software is an exceptional open-source project revolutionizing embedded oper...DiscussLinux
Ron Bhubandspoke.amastelek.com·Apr 29, 2024Threat intelligence script updated for use with nftablesMany moons ago I create a threat intelligence script based on iptables. https://www.linkedin.com/pulse/threat-intelligence-script-ronald-bartels Here is the update variant for use with nftables. What is neat about this script is that it scrubs any ...DiscussLinux
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 20, 2024Threat Actor "232" Re-Sells 795,495,961 Records of ICMR Data BreachThreat Summary On April 21, 2024, a threat actor with the username "232" on BreachForums has uploaded a post indicating the sale of ICMR data breach database. The data breach contains different PII parameters such as "Name", "Father Name", "Phone Num...DiscussData Breach
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 19, 202423 Vulnerabilities in Google Chrome Browser that Allows Remote Code Execution PatchedThreat Summary Google addressed 23 vulnerabilities in its Chrome browser on April 16, 2024, covering Windows, Mac, and Linux platforms. These vulnerabilities spanned various issues, from object corruption in V8 and WebAssembly to multiple use-after-f...Discussthreat intelligence
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 11, 2024Threat Actor Leaks Kaushal Bharat Database on BreachForumsExecutive Summary On April 11, 2024, the Threat Actor named "KryptonZambie" has posted on BreachForums stating that they were successful in breaching into the the domain kaushalbharat.gov.in. The threat actor stated that they now contain a total of 2...Discuss·26 reads#cybersecurity
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 10, 2024JiaTansSSHAgent: Replicating XZ Utils Backdoor for Enhanced SSH Access and Security BypassThreat Analysis On April 9, 2024, GitHub user blasty, known as @bl4sty on X (previously Twitter), released JiaTansSSHAgent, an SSH agent tool that mimics some functions of the XZ Utils backdoor. This backdoor arose from the insertion of malicious cod...Discuss·40 readsGitHub
Bhumika bhumiwrites.hashnode.dev·Mar 23, 2024Cyber security in the Age of Remote WorkIn the wake of the COVID-19 pandemic, remote work has evolved from a convenience to a necessity for many organizations worldwide. While this shift offers numerous benefits in terms of flexibility and efficiency, it also presents significant challenge...Discuss#cybersecurity
Maik Romaikroservice.com·Mar 4, 2024Malware Analysis I - Detecting Indicators of Compromise and malicious InfrastructureToday we will see how we can identify malware urls / indicators of compromise from malware and the malware sample we will use is: https://bazaar.abuse.ch/sample/41f76926477c7f8759900567ced4e5e1f9057e40d2a151badc873d23f372997e/ Stage 1 - comprobante_s...Discuss·152 readshacking
Swapnoneel Senswapnoneelsen.hashnode.dev·Feb 17, 2024Cyber Security Education in West Bengal as my TOC (Thing Of Concern).This is the beginning of 2024 and the era of Technologies where we are continuously exploring new things which are quite cool and useful and easy-to-use stuff. One of these evolving techs is Cyber Security which is now evolving as a thing of great co...Discusscyber security
Keith CaseyforPangea Blogpangea.cloud·Jan 2, 2024Using IPs, Domains, and Geolocation to secure your AuthenticationWhen I say “secure authentication,” what comes to mind? You probably think of SSL, password policies, and MFA. Those are a good starting point but what if we could look into the authentication request itself? What if we could use that request context...Discuss·67 readsauthentication