Browsing category

Tutorials

The 11 Essential Falco Cloud Security Rules for Securing Containerized Applications at No Cost

In the evolving landscape of container orchestration, Kubernetes has emerged as the de facto standard due to its flexibility, scalability, and robust community support. However, as with any complex system, securing a Kubernetes environment presents unique challenges. Containers, by their very nature, are transient and multi-faceted, making traditional security methods less effective. This is where […]

Web-Based PLC Malware: A New Technique to Hack Industrial Control Systems

In a significant development that could reshape the cybersecurity landscape of industrial control systems (ICS), a team of researchers from the Georgia Institute of Technology has unveiled a novel form of malware targeting Programmable Logic Controllers (PLCs). The study, led by Ryan Pickren, Tohid Shekari, Saman Zonouz, and Raheem Beyah, presents a comprehensive analysis of […]

The API Security Checklist: 10 strategies to keep API integrations secure

In the interconnected world of modern software development, Application Programming Interfaces (APIs) play a pivotal role in enabling systems to communicate and exchange data. As the linchpins that allow diverse applications to work together, APIs have become indispensable to offering rich, feature-complete software experiences. However, this critical position within technology ecosystems also makes APIs prime […]

11 ways of hacking into ChatGpt like Generative AI systems

In the rapidly evolving landscape of artificial intelligence, generative AI systems have become a cornerstone of innovation, driving advancements in fields ranging from language processing to creative content generation. However, a recent report by the National Institute of Standards and Technology (NIST) sheds light on the increasing vulnerability of these systems to a range of […]

Silent Email Attack CVE-2023-35628 : How to Hack Without an Email Click in Outlook

CVE-2023-35628 is a critical remote code execution (RCE) vulnerability affecting the Microsoft Windows MSHTML platform, with a Common Vulnerability Scoring System (CVSS) score of 8.1, indicating a high level of risk. This flaw is particularly concerning because it can be exploited without any interaction from the user. The vulnerability can be triggered when Microsoft Outlook […]

How to Bypass EDRs, AV with Ease using 8 New Process Injection Attacks

In the ever-evolving landscape of cybersecurity, researchers are continually uncovering new methods that challenge existing defense mechanisms. A recent study by SafeBreach, a leader in cybersecurity research, has brought to light a novel process injection technique that exploits Windows thread pools, revealing vulnerabilities in current Endpoint Detection and Response (EDR) solutions. This groundbreaking research not […]

Is Your etcd an Open Door for Cyber Attacks? How to Secure Your Kubernetes Clusters & Nodes

Kubernetes has become the de facto orchestration platform for managing containerized applications, but with its widespread adoption, the security of Kubernetes clusters has come under greater scrutiny. Central to Kubernetes’ architecture is etcd, a highly-available key-value store used to persist the cluster’s state and its configuration details. While etcd is essential for the Kubernetes cluster’s […]

CVSS 4.0 Explained: From Complexity to Clarity in Vulnerability Assessment

The Common Vulnerability Scoring System (CVSS) has been updated to version 4.0, which has been formally announced by the Forum of Incident Response and Security Teams (FIRST). This update comes eight years after the debut of CVSS v3.0, the previous version of the system. At its 35th annual conference, which took place in June in […]

The Art of Interception :Active and Passive Surveillance in Mobile Signaling Networks

Mobile network data might be one of our most recent and thorough dossiers. Our mobile phones are linked to these networks and expose our demographics, social circles, purchasing habits, sleeping patterns, where we live and work, and travel history. Technical weaknesses in mobile communications networks threaten this aggregate data. Such vulnerabilities may reveal private information […]

Azure cloud security tutorial series – Chapter 2 [Virtual Network]

Basic Overview  Network is combination of many different systems connected together. In the Azure cloud security tutorial series – Chapter 1 [Azure Account] we talked about virtual network is a private space in a network where you can play around within systems in that virtual network. It’s a more secure way of putting your own […]

Azure cloud security tutorial series – Chapter 1 [Azure Account]

Basic Overview  Azure is the mostly used cloud in IT organizations. Before cloud came into existence many companies or organizations were using Microsoft products in their organization like Windows OS, MS Office and even Microsoft server OS on their servers for running internal authentication server called AD and others. So it is easy for all […]

10 impossible mobile patterns to break

Mobile patterns are the used by everyone to unlock their mobile phones. Everyone loves to mobile patterns over the pass code or password. One of the most important factor is its ease to unlock the mobile phone. The more stylize your pattern is, more you look cool while unlocking mobile phone.  Even this also prevent […]

How to hack ChatGPT & Bard AI to do evil stuff

ChatGPT and its AI cousins have undergone extensive testing and modifications to ensure that they cannot be coerced into spitting out offensive material like hate speech, private information, or directions for making an IED. However, scientists at Carnegie Mellon University recently demonstrated how to bypass all of these safeguards in several well-known chatbots at once […]

Top 9 techniques to secure your DevOps Continuous Integration/Continuous Delivery (CI/CD) pipeline in 2023

This cybersecurity information sheet (CSI) is being released by the National Security Agency (NSA) in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA). The purpose of this document is to provide recommendations and best practices for improving defenses in cloud implementations of development, security, and operations (DevSecOps). This CSI explains how to integrate security […]

Unlock any Android Smartphone with this fingerprint hack

Researchers from Tencent Labs and Zhejiang University have collaborated to develop a new technique known as “BrutePrint,” which enables the forcible extraction of fingerprints from modern smartphones. This technique was recently shown to the public. This approach sidesteps user authentication, therefore providing unauthorized access and complete control over the device that is the focus of […]

BGP BooFuzzer: New tool to find vulnerabilities in BGP implementation

The most important routing protocol for the internet is called BGP. It makes it possible for autonomous systems (ASes), which are groups of IP addresses that are leased to an organization for a certain period of time by a registrar, to share routing and reachability information with one another. When BGP stops working, an autonomous […]