OU PHANNARITH (Cybersecurity)
12.7K subscribers
6.99K photos
278 videos
2.56K files
4.17K links
https://www.facebook.com/infosecnarith

ចំណេះដឹងបច្ចេកវិទ្យា និងសន្តិសុខឌីជីថលក្នុងយុគ្គ សម័យសេដ្ឋកិច្ច និងសង្គមឌីជីថល
Download Telegram
The 'SECGov' X account was compromised, and an unauthorized post was posted. The SEC has not approved the listing and trading of spot bitcoin exchange-traded products.

https://twitter.com/SECGov/status/1744837121406349714
👍2
This media is not supported in your browser
VIEW IN TELEGRAM
"Visualizing a Popular Network Protocol with use cases"

🔹HTTP - stands for HyperText Transfer Protocol, which is used to transfer web pages from a web server to a browser.

🔹HTTP/3 (QUIC) - is the latest version of HTTP, which uses a different transport protocol called QUIC (Quick UDP Internet Connections) to improve performance.

🔹HTTPS - is the secure version of HTTP, which adds an extra layer of encryption to protect sensitive data such as passwords and credit card information.

🔹WebSocket - is a protocol that enables bidirectional communication between a web browser and a server, allowing for real-time data transfer.

🔹TCP - stands for Transmission Control Protocol, which provides reliable, ordered, and error-checked delivery of data between applications.

🔹UDP - stands for User Datagram Protocol, which provides a connectionless and unreliable delivery of data between applications, making it suitable for real-time applications like online gaming and video conferencing.

🔹SMTP - stands for Simple Mail Transfer Protocol, which is used to send email messages between servers.

🔹FTP - stands for File Transfer Protocol, which is used to transfer files between computers on a network.

Credit: Alex Xu
Via : ByteByteGo

@OUPNarith
9👍5
សេចក្ដីប្រកាសព័ត៌មានស្ដីពី ការក្លែងបន្លំសញ្ញាបត្រមធ្យមសិក្សាទុតិយភូមិក្នុងការដាក់ពាក្យប្រឡងជ្រើសរើសចូលរៀនថ្នាក់ឆ្នាំសិក្សាមូលដ្ឋានសម្រាប់កម្រិតបរិញ្ញាបត្រ និងថ្នាក់ឆ្នាំទី១ សម្រាប់កម្រិតបរិញ្ញាបត្ររង

https://www.facebook.com/moeys.gov.kh/posts/pfbid0xYL5WtTaFdVhSdfTdg4h9qF3zP3QRRcmoWMEPhVodFLUmjrmsasjWyhVraHrTbR1l

@OUPNarith
2😱2
ISTANBUL :Turkey's competition authority said on Wednesday it had decided to fine Facebook parent Meta Platforms Inc 4.8 million lira ($160,000) a day for failing to provide sufficient documentation as part of a previous investigation.

In a statement, the Turkish Competition Board said the result of a 2022 online video advertising market investigation required Meta to submit a document detailing compliance measures to stop its violation of the law and to reestablish competition in the market.

https://www.channelnewsasia.com/business/turkish-competition-board-fine-meta-160000-day-non-compliance-4037986

@OUPNarith
1
This media is not supported in your browser
VIEW IN TELEGRAM
In the realm of cybersecurity, staying ahead of threats is paramount. Today, let's explore the dynamic duo of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in the visual realm. 🌐

👁️‍🗨️ Intrusion Detection System (IDS): Think of IDS as the vigilant watchtower of your digital infrastructure. It diligently monitors network and system activities, raising an alert when suspicious behavior is detected. 🚨

🛡️ Intrusion Prevention System (IPS): Now, meet the proactive guardian – IPS. Not content with just raising the alarm, IPS takes it a step further by actively blocking potential threats. It's the digital shield that fortifies your defenses. 💪🔒

🔄 Balancing Act: The key lies in striking the right balance between detection and prevention. While IDS provides valuable insights, IPS adds an extra layer of defense, actively thwarting threats in real-time. Together, they create a robust security ecosystem. 🌐🤝

@OUPNarith
👍21
𝐂𝐘𝐁𝐄𝐑 𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘 𝐎𝐏𝐄𝐍 𝐒𝐎𝐔𝐑𝐂𝐄 𝐓𝐎𝐎𝐋𝐒

🎯 1. Zeek: https://zeek.org/ Network Security Monitoring
🎯 2. ClamAV: https://www.clamav.net/ Antivirus
🎯 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
🎯 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
🎯 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
🎯 6. Elastic: https://www.elastic.co/de/ Analytics
🎯 7. Osquery: https://www.osquery.io/ Endpoint visibility
🎯 8. Arkime: https://arkime.com/ Packet capture and search
🎯 9. Wazuh: https://wazuh.com/ XDR and SIEM
🎯 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
🎯 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
🎯 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
🎯 13. Kali: https://www.kali.org/ Security OS
🎯 14. Parrot: https://www.parrotsec.org/ Security OS
🎯 15. OpenIAM: https://www.openiam.com/ IAM
🎯 16. Yara: https://lnkd.in/eEJegEak Patterns
🎯 17. Wireguard: https://www.wireguard.com/ VPN
🎯 18. OSSEC: https://www.ossec.net/ HIDS
🎯 19. Suricata: https://suricata.io/ IDS/IPS
🎯 20. Shuffler: https://shuffler.io/ SOAR
🎯 21. Phish Report: https://phish.report/ Anti Phishing
🎯 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
🎯 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
🎯 24. OpenEDR: https://openedr.com/ EDR
🎯 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
🎯 26. NMAP: https://nmap.org/ Old but gold

JOIN: https://t.me/OUPNarith

Credits: Seyed Arshia Ahmadi

@OUPNarith
👍21
Blackjack hackers linked to Ukraine’s SBU breached computer systems at a Moscow-based M9 internet provider in retaliation for a Russian cyberattack on Ukrainian Kyivstar, deleting 20 terrabytes of data and leaving some Moscow residents without internet.

https://www.reuters.com/technology/cybersecurity/hackers-hit-moscow-internet-provider-response-kyivstar-cyber-attack-source-2024-01-09/

@OUPNarith
👍31😱1
Don't burn your energy to things which are beyond your control.

@OUPNarith
6👍4
WEF The Global Risks Reprot 2024 - 19th Edition.pdf
12.6 MB
WEF The Global Risks Report 2024 - 19th Edition

1. Misinformation and Disinformation
2. Extreme weather events
3. Social Polarisation
4. Cyber insecurity
5. Interstate armed conflict
6. Lack of economic opportunity
7. Inflation
8. Involuntary migration
9. Economic downturn
10. Pollution

@OUPNarith
This media is not supported in your browser
VIEW IN TELEGRAM
The visualization of the MGM Resorts Cyber Attack.

The MGM Resorts Cyber Attack was a complex and sophisticated attack that involved multiple techniques. The attackers employed a series of tactics, starting with scanning LinkedIn to identify MGM employees likely to have privileged access, particularly to Okta, a critical identity management service. Next, they used impersonation techniques to deceive the IT help desk vendor, who believed they were dealing with a privileged MGM user. As a result, the help desk was tricked into resetting Multi-Factor Authentication (MFA) for a privileged user, giving the attackers access to Okta.

With privileged access, the attackers were able to compromise more administrative accounts and move laterally through the MGM network. They gained control over Domain Admins on the domain controllers, implemented org-to-org authentication using inbound federation, and the new Identity Provider (IdP) gained full access to MGM's authorization systems. Through the IdP, the attackers obtained Global Admin rights in Azure.

The attackers also employed an extensive system of encryption and ransomware. Around 100 ESXi servers were encrypted, disrupting critical applications, while critical systems were locked down with ransomware, and files were exfiltrated. The impact of the attack was significant and required an extensive response effort to contain and remediate.

Overall, the MGM Resorts cyber attack was a highly coordinated and sophisticated attack that employed a wide range of techniques to bypass security measures and gain access to sensitive systems. The attack serves as a reminder of the importance of maintaining strong security protocols and staying vigilant against the ever-evolving threat landscape.

Credit: Reco.ai

@OUPNarith
ប្រភេទទាំង ៣ នៃប្រព័ន្ធកុំព្យូទ័រក្លោដ

#Cambodia4point0 #CloudComputing #Cloud #ប្រព័ន្ធកុំព្យូទ័រក្លោដ

@OUPNarith
👍32