CISO as a Service
5.17K subscribers
4.74K photos
770 videos
1.89K files
6.99K links
Founder @ DiyakoSecureBow | CISO as a Service (vCISO)
About Me
http://about.me/Alirezaghahrood

Follow Me on
🔵LinkedIn
https://www.linkedin.com/in/AlirezaGhahrood
🔴YouTube
https://www.youtube.com/AlirezaGhahrood
X
https://twitter.com/AlirezaGhahrood
Download Telegram
NATScan_NDSS20.pdf
342.8 KB
Research
"On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways", 2020.
]-> Auxiliary material (UPnP IGD honeypot implementation + UPnP Checker):
https://github.com/RUB-SysSec/MiddleboxProtocolStudy


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
Linux_Kernel_Release_Signing.pdf
185.4 KB
Whitepaper
"Linux Kernel Release Signing. Security Assessment", 2021.


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
exploit
C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses😊
https://github.com/DamonMohammadbagher/NativePayload_DNS2

Offensive security
1. How Gopher works in escalating SSRFs
https://infosecwriteups.com/how-gopher-works-in-escalating-ssrfs-ce6e5459b630
]-> Tool:
https://github.com/tarunkant/Gopherus
2. 1-click meterpreter exploit chain with BeEF and AV/AMSI bypass
https://medium.com/@bluedenkare/1-click-meterpreter-exploit-chain-with-beef-and-av-amsi-bypass-96b0eb61f1b6

WLAN Security
Hacking the Dlink DIR-615
https://noob3xploiter.medium.com/hacking-the-dlink-dir-615-for-fun-and-no-profit-a2f1689f9920

Threat Research
1. Diavol Ransomware🥸
https://www.fortinet.com/blog/threat-research/diavol-new-ransomware-used-by-wizard-spider?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+fortinet%2Fblog%2Fthreat-research+%28Fortinet+Threat+Research+Blog%29
2. Backdoored Client from Mongolian CA MonPass
https://decoded.avast.io/luigicamastra/backdoored-client-from-mongolian-ca-monpass


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
#جذب #استخدام

٣ نفر كارشناس سرويس دسك- هلپ دسك
براي بانك ايران زمين- استخدام در شركت خصوصي ذينفع خود بانك

رنج حقوق ٥ -7 م ت

ارسال رزومه مرتبط و به روز به آي دي واتس اپ
0912.1964383


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
مشابه اين كسي محتواي آموزشي در دسترس دارد!؟
https://archive.nullcon.net/website/goa-14/training/penetration-testing-smartgrid-and-scada.php


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
Start by going to www.microsoft.com/learning and follow the screen shots below. 

https://lnkd.in/dczfFwg


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
SC-900: Microsoft Security, Compliance, and Identity Fundamentals Microsoft Official Practice Test

https://lnkd.in/d62RhNW


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
گاهی آدم باید اونقدر خوب باشه که ببخشه، اما اونقدر احمق نباشه که دوباره اعتماد کنه!


-🤲🏻-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
لیستی از مجموعه خشونت هایی که در زمان ازدواج در حق زنان میشه


-🥸-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
در صورت درگيري با ويروس كرونا، از دست دادن كار و …
قيمت امتحانات بين المللي مايكروسافت با هر قيمتي
صرفا ١٥$ با شرايط و زمان محدود🙃


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
This media is not supported in your browser
VIEW IN TELEGRAM
‎-Infinity-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
https://pythonforcybersecurity.com/courses/python3-for-infosec-professionals/


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Microsoft_Incident_Response_Playbook_1625239159.pdf
440.6 KB
response playbook: Phishing investigation ,…. Of microsoft


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
During a supply-chain attack, hackers compromised the website of Mongolian Certificate Authority and replaced legitimate MonPass CA client software with a backdoored version to distribute malware.😀😀

Details: https://thehackernews.com/2021/07/mongolian-certificate-authority-hacked.html


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
This media is not supported in your browser
VIEW IN TELEGRAM
‏شما یادتون نمیاد ولی ما ساعت‌ها به این خیره میشدیم😂


‎-😙-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Security_AWS_Cloud_1625220749.pdf
21.5 MB
Practical Guide to
AWS Cloud Security
Security in the AWS Cloud
به شدت كاربردي👍🏽


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
“Companies using on-premises environments have been leveraging DevOps processes to create close coordination between the developers, who create new applications, and operations, which provides the virtual machines they run on. The cloud brings a whole host of services to automate all aspects of the infrastructure deployment and management that on-premises services are unable to match.”


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
EWhy a Framework?
Regardless of the existing level of operations maturity, security teams face common needs:
• Adapting to changing business demands and evolving threats
• Obtaining management support for necessary resources and changes in IT or other areas
• Demonstrating improvement and providing risk assessment and forecasting
• Reducing the burden of satisfying auditors that security operations are compliant
A security framework, with its recommended set of security processes and controls, along with a risk assessment and management approach to match the appropriate set of controls to the business and threat environment, is an efficient way to meet these needs. Using an established framework can take the guesswork out of the process for smaller organizations, while allowing larger and more mature security operations to justify their decisions and resource requests to management and auditors


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
1. Which of the following is concerned with policy and direction?
a) Capacity management
b) Governance
c) Service design
d) Service level management

2.Software and technology are examples of which of the four Ps?
a) Processes
b) Performance
c) Products
d) Partners

03. Who normally chairs a change advisory board (CAB)?
a) Change initiator
b) Service owner
c) Change manager
d) Business relationship manager


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
04. Which process will regularly analyze incident data to identify discernable trends?
a) Service level management
b) Problem management
c) Change management
d) Event management
 
05. What is the MAIN reason for a service provider to understand the five aspects of service design?
a) To prevent security breaches in mission critical services
b) To ensure a holistic, results-driven approach
c) To allow service design to cut costs
d) To prevent breaches of service level agreements (SLAs)
 
06. Which three are the characteristics of ITIL guidance that help to make it successful?
a) Prescriptive, best practice and solution specific
b) Publicly available, prescriptive and best practice
c) Vendor neutral, non-prescriptive and best practice
d) Publicly available, solution specific and vendor neutral


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
07. A significant, unresolved problem is likely to cause major business disruption. Where is this MOST LIKELY to be escalated to?
a) IT service continuity management
b) Availability management
c) Incident management
d) Change management
 
08. Which is the BEST description of a service request?
a) A request from a user for information, advice or for a standard change
b) Anything that the customer wants and is prepared to pay for
c) Any request or demand that is entered by a user via a self-help web-based interface
d) Any request for change (RFC) that is low-risk and which can be approved by the change manager without a change advisory board (CAB) meeting
 
09. Which is an objective of service transition?
a) To negotiate service levels for new services
b) To ensure that service changes create the expected business value
c) To reduce the impact of business critical service outages on key services
d) To plan and manage entries in the service catalogue


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13