Published inOSINT TeamThe Most Significant Telecom Hack in History: Inside the Salt Typhoon Cyberattack (Part — III) —…Here is the recap of PART I and PART IIJan 9Jan 9
Published inOSINT TeamThe Most Significant Telecom Hack in History: Inside the Salt Typhoon Cyberattack (Part — II) —…Here is the recap of the Part — IDec 29, 2024Dec 29, 2024
Published inOSINT TeamThe Most Significant Telecom Hack in History: Inside the Salt Typhoon Cyberattack (Part — 1)In what experts call the most significant telecom hack in history, a cyberattack linked to the Chinese government disrupted the U.S…Dec 21, 2024Dec 21, 2024
Published inCyberScribersRapid7 Uncovers Sophisticated Microsoft Exchange Domain Compromise via SharePoint VulnerabilityRapid7’s Incident Response team recently unearthed a complex cyberattack involving a Microsoft Exchange service account with domain…Nov 23, 2024Nov 23, 2024
Published inInfoSec Write-upsGoldenJackal Strikes Again: APT Group Breaches Air-Gapped European Government SystemsA shadowy threat looms over European governments — an advanced persistent threat (APT) group known as GoldenJackal has successfully…Oct 24, 2024Oct 24, 2024
Published inInfoSec Write-upsModded Versions of Popular Android Apps Used to Distribute New Variant of Necro MalwareA recent investigation by Kaspersky has uncovered a new wave of malicious activity involving modded versions of legitimate Android apps…Sep 29, 2024Sep 29, 2024
Published inOSINT TeamSophisticated Malware Masquerades as Palo Alto GlobalProtect Tool to Infiltrate Middle Eastern…Cybercriminals have upped the ante in their relentless pursuit of valuable corporate data, with a new campaign targeting Middle Eastern…Sep 6, 2024Sep 6, 2024
Published inTowards AWSAWS Lambda Command InjectionCommand Injection vulnerability is a daunting one. In this vulnerability, a threat actor can execute arbitrary commands on a host.Dec 31, 20211Dec 31, 20211
Published inInfoSec Write-upsOWASP-Access Control VulnerabilityThis article is going to focus on Access control security and Broken Access control, it will summarize the thoughts, procedures and…Oct 3, 2021Oct 3, 2021
Published inInfoSec Write-upsWEB APPLICATION — BUSINESS LOGIC VULNERABILITIESBuisness logic vulnerabilities are flaw in the design, implementation and concept of an application, that allow an attacker to evoke…Sep 13, 2021Sep 13, 2021