OOusH4xinoush4x.hashnode.dev💳 RFID Cloners & NFC Snipers: The 3-Second Breach of Corporate Security 🎯Millions of employees walk into office buildings every day. They tap a plastic badge against a reader on a turnstile or a secured door. They hear a "beep," the light turns green, and they walk in. It feels secure. It feels authenticated. To a physica...3d ago·5 min read
Sspaceranger005incyberremedy.hashnode.devCyberRemedy — Enterprise SIEM Features, Zero Cost - Version 1.0TL;DR — CyberRemedy is a free, self-hosted SIEM that runs on a single machine in ~200MB. ML detection, SOAR playbooks, MITRE ATT&CK mapping, honeypots. No subscriptions. No cloud. What is CyberRemedy6d ago·3 min read
AEArinze Egbo (NrArinze)inapexxsynapse.hashnode.devQuantum Readiness 2027: Is Your Encryption Already Obsolete?Quantum Readiness 2027: Transitioning Infrastructure from Legacy to Lattice The countdown to "Q-Day" the theoretical moment a quantum computer becomes powerful enough to shatter modern encryption has Mar 5·5 min read
RRridesh raju bijweinrideshcyber.hashnode.dev⭐ SOC239 – Remote Code Execution Detected in Splunk Enterprise Walkthrough (EventID: 201)A Real SOC Investigation | LetsDefend Walkthrough Today’s alert is a serious one: ⭐ SOC239 -Remote Code Execution Detected in Splunk Enterprise Whenever “RCE” appears in an alert title, the severityMar 2·5 min read
RRridesh raju bijweinrideshcyber.hashnode.devSOC168 – Whoami Command Detected in Request Body Walkthrough (EventID:118)A Command Injection Investigation | LetsDefend SOC Lab Today’s alert immediately caught my attention: Whoami Command Detected in Request Body At first glance, it may look like a harmless Linux commandFeb 28·4 min read
OOusH4xinoush4x.hashnode.dev🏎️ Car Hacking in 2026: The Brutal Reality of Wireless TheftYou’re asleep. Your $100,000 luxury SUV is parked in your driveway. You have the keys on the kitchen counter. The doors are locked, the alarm is set, and you think the "Rolling Code" encryption is youFeb 26·5 min read
RRridesh raju bijweinrideshcyber.hashnode.devSOC169 – Possible IDOR Attack Detected Walkthrough (EventID:119)Today, we’ll be investigating another LetsDefend SOC alert: SOC169 — Possible IDOR Attack Detected In this walkthrough, we’ll analyze how repeated web requests exposed a serious web application vulnerFeb 26·4 min read
RRridesh raju bijweinrideshcyber.hashnode.devSOC175 Walkthrough – PowerShell Found in Requested URL-Possible CVE-2022-41082 Exploitation Walkthrough (EventID:125)In today’s walkthrough, we’re investigating another LetsDefend alert: SOC175 – PowerShell Found in Requested URL – Possible CVE-2022-41082 Exploitation During this analysis, I made a small but impoFeb 21·5 min read
RRridesh raju bijweinrideshcyber.hashnode.devSOC164 – Suspicious Mshta Behavior Walkthrough (EventID:114)Today we’re investigating another LetsDefend alert: SOC164 – Suspicious Mshta Behavior This alert focuses on detecting suspicious usage of a legitimate Windows binary often abused by attackers. 🔎 AlFeb 22·4 min read
MRMohammad Reza Mirzadzareinblog.mirzadzare.netIP Spoofing to Account Takeover: You Patched It? Really?Abstract In my previous article, I described how I found a security flaw in a popular desktop app's OAuth flow that allowed me to steal any user's account with just one click. I reported it, saw it paFeb 20·7 min read