OU PHANNARITH (Cybersecurity)
12.7K subscribers
6.99K photos
278 videos
2.56K files
4.17K links
https://www.facebook.com/infosecnarith

ចំណេះដឹងបច្ចេកវិទ្យា និងសន្តិសុខឌីជីថលក្នុងយុគ្គ សម័យសេដ្ឋកិច្ច និងសង្គមឌីជីថល
Download Telegram
10 Lessons from "The 5 Elements of Effective Thinking":

1. Cultivate Curiosity: Embrace a childlike wonder and actively seek out new information and perspectives. Question everything and expand your understanding of the world.

2. Think Critically: Challenge your own assumptions and biases. Analyze, question, and evaluate information to distinguish fact from opinion and identify logical fallacies.

3. Embrace Different Perspectives: Be open-minded to ideas that differ from your own. Seek diverse viewpoints to gain a richer understanding of complex issues and avoid narrow-mindedness.

4. Simplify the Complex: Break down complex problems into smaller, manageable pieces. Focus on the essential elements and avoid getting bogged down in unnecessary details.

5. Develop Creativity: Think outside the box and explore unconventional solutions. Experiment, take risks, and use divergent thinking to generate innovative ideas.

6. Focus on the Essential: Prioritize tasks and information based on their importance and relevance to your goals. Avoid distractions and stay focused on what truly matters.

7. Master Your Emotions: Recognize how emotions influence your thinking and decision-making. Learn to manage your emotions effectively and avoid their negative impact on your judgment.

8. Communicate Effectively: Clearly articulate your thoughts and ideas, both verbally and in writing. Tailor your communication to your audience and ensure you are understood.

9. Take Action: Don't just think, do. Put your ideas into practice and implement your plans. Be proactive and take ownership of your goals.

10. Practice Makes Progress: Effective thinking is a skill that requires continuous development. Apply the five elements in your daily life, seek challenges, and actively learn and grow.

Source: Unknown

@OUPNarith
👍42
proc_inj_win_thr_pool.pdf
4.8 MB
[Technical Document]

#Red_Team_Tactics

#BlackHat Europe 2023:

"New Process Injection Techniques Using Windows Thread Pools".

@OUPNarith
This media is not supported in your browser
VIEW IN TELEGRAM
How do companies ship code to production?

@OUPNarith
👍41
This media is not supported in your browser
VIEW IN TELEGRAM
#HTTPS #encryption works through a combination of #symmetric and #asymmetric encryption techniques to #secure data transmission over the internet. Here's a succinct explanation.

@OUPNarith
1
1704403701112.pdf
116.5 KB
GVH launches market analysis on the impact of artificial intelligence

@OUPNarith
ភាពខុសគ្នានៃការវាយប្រហារសាយប័រ និងការវាយប្រហារតាមបែបប្រពៃណី៖

១. ការវាយប្រហារសាយប័រ គឺវាមានទម្រង់ខុសគ្នាទៅនឹងការវាយប្រហារតាមបែបប្រពៃណី។ ការវាយប្រហារតាមសាយប័រគឺប្រើប្រាស់មធ្យោបាយឌីធីថល ឬនិយាយឱ្យខ្លីគឺកុំព្យូទ័រ។ នៅក្នុងលំហរសាយប័រ ការវាយប្រហារអាចធ្វើដំណើរក្នុងល្បឿនពន្លឺ ដោយមិនគិតពីកត្តាភូមិសាស្ត្រ និងព្រំដែននយោបាយ ហើយវាអាចលុកទៅកាន់ទីតាំងជាច្រើនក្នុងពេលតែមួយផងដែរ។

២. ការវាយប្រហារសាយប័រ គឺតែងតែប៉ៈពាល់ដំបូងទៅដល់កុំព្យូទ័រ ឬប្រព័ន្ធកុំព្យូទ័រ ឬទីន្នន័យដែលមានផ្ទុកក្នុងនោះ ទោះបីជាមានគោលដៅបំផ្លាញទីតាំងណាមួយជាក់ស្តែងក៏ដោយ (physical damage)។

៣. ការវាយប្រហារសាយប័រ គឺមានការលំបាកណាស់ក្នុងការចោទប្រកាន់ទៅលើជនបង្ករ ហើយនឹងទំហំនៃការរីកសាយភាយរបស់វា។ ជាមួយនឹងមេរោគកុំព្យូទ័រ អ្នកមានការលំបាកណាស់នឹងកំណត់ថា កុំព្យូទ័រណាមួយចុងក្រោយដែលនឹងទទួលរងគ្រោះ ទោះបីជាអ្នកមានការព្យាករណ៍កំណង់គោលដៅហើយក៏ដោយ។

៤. ការចំណាយភាគច្រើនគឺផ្តោតទៅលើការស្រាវជ្រាវ និងការអភិវឌ្ឍបង្កើតមេរោគថ្មីៗ ដែលមានតម្លៃទាបជាងច្រើនក្នុងការទិញអាវុធយុទ្ធភ័ណ្ឌ។ យើងអាចមានការបង្កើតមេរោគសម្រាប់មុខងារផ្សេងៗគ្នា ដូចជា DDoS សម្រាប់ធ្វើឱ្យគាំងសេវាអនឡាញ ឬឯ Stuxnet សម្រាប់ធ្វើឱ្យខូចខាតដល់ឧបករណ៍សម្រាប់ ចំរាញ់អ៊ុយរ៉ាញ៉ូមមិនដំណើរការជាដើម។

ចុះអ្នកយល់យ៉ាងដូចម្តេច?

https://www.facebook.com/infosecnarith/posts/pfbid023xkRXV6dasB5jWLRH1VsdKVWGaoLbdcXFhW8hPyhcvNnaqUV7JM9hxxjc8NmD7yal

@OUPNarith
👍7
Secure_coding_best_practices_by_Veracode_1708513962.pdf
3.6 MB
Secure coding best practices Handbook by Veracode

How to secure efficiently your source code according to OWASP® Foundation Top 10 Proactive controls :
- Use secure random number generators
- Parameterize queries to prevent SQL injection
- Validate all inputs, including email addresses
- Leverage Security Frameworks and Libraries
- Use established security frameworks and libraries like NVD
- Regularly check for security flaws and keep frameworks updated

@OUPNarith
1
#hashtag = បញ្ជាប់ស្លាកទ្រុងជ្រូក

នៅរសៀលថ្ងៃពុធ ១២កើត ខែមាឃ ឆ្នាំថោះ បញ្ចស័ក ព.ស.២៥៦៧ ត្រូវនឹងថ្ងៃទី២១ ខែកុម្ភៈ ឆ្នាំ២០២៤ ក្រុមប្រឹក្សាជាតិភាសាខ្មែរ ក្រោមអធិបតីភាពឯកឧត្តមបណ្ឌិត ហ៊ាន សុខុម បានបើកកិច្ចប្រជុំដើម្បីពិនិត្យ ពិភាក្សានិង
អនុម័តបច្ចេកសព្ទរបស់គណៈកម្មការបច្ចេកទេសព័ត៌មានវិទ្យាដោយអនុម័តមេពាក្យនិងសេចក្ដីពន្យល់បានចំនួន
៨ពាក្យ។

@OUPNarith
5
Here are Lessons from "Choose Your Enemies Wisely: Business Planning for the Audacious Few" by Patrick Bet-David and Greg Dinkin

1. Differentiating between competitors and enemies: Understand the distinction between competitors and enemies in business. While competitors can be identified and analyzed objectively, enemies are those who doubt your abilities and try to hinder your progress. Recognize the importance of dealing with both effectively.

2. Harnessing emotions for success: Emotions can be powerful motivators. Learn how to channel your emotions, particularly the strong feelings that arise when thinking about your enemies, to fuel your determination and drive for success.

3. Creating a strategic business plan: Develop a comprehensive business plan that sets your company up for sustainable success. Follow the guidance provided in the book to create a strategic roadmap that aligns with your audacious goals.

4. Embracing audacity and big thinking: Embrace audacity and think big when it comes to your business. The book encourages visionary thinking and provides insights on how to overcome challenges and achieve ambitious goals.

5. Learning from the author's experiences: Benefit from the author's personal experiences and insights. Patrick Bet-David, a successful entrepreneur and author, shares his own journey and provides valuable principles and strategies for business growth.

6. Understanding the power of motivation: Recognize the importance of motivation in driving your business forward. Gain insights into how to maintain motivation, even in the face of adversity, and use it as a catalyst for success.

7. Appreciating the value of American capitalism: The book also serves as an ode to American capitalism, highlighting the opportunities it offers for individuals to achieve their dreams. It showcases the author's own success story as proof that anyone can accomplish their wildest aspirations with the right mindset and motivation.

Source: Unknwon

@OUPNarith
4👍2
Several Ukrainian media outlets attacked by Russian hackers. Why it matters:

1. The weekend's attack on major Ukrainian news outlets by Russian hackers, including the spread of misinformation about the situation in Avdiivka, emphasizes the significant role of cybersecurity in conflict situations and its potential to disrupt the information flow and skew public opinion.

2. The incident also showcases the persistent threat to media outlets as primary targets in information warfare, underlining the need for robust cyber defenses within these organizations to prevent the propagation of disinformation.

3. As these cyber incidents often go unreported, there's a pressing need for transparent reporting mechanisms and stronger international regulations against state-sponsored cyber-attacks that threaten the integrity of information and press freedom.

https://therecord.media/ukrainian-news-outlets-attacked-by-russian-hackers

@OUPNarith
Biden executive order seeks to bolster port cybersecurity. Why it matters:

1. The new executive order aimed at bolstering maritime port security will expand the U.S. Coast Guard's authority to respond to cybersecurity incidents—signalling a strategic shift toward better combat potential threats from state-backed hacking groups such as Volt Typhoon.

2. The administration is investing $20 billion in enhanced port infrastructure, pivoting away from reliance on foreign-made, potentially vulnerable technology—controlling around 80% of US port cranes—and instead focusing on "trusted" domestically-produced alternatives.

3. The plan reemphasizes the importance of the nation's ports to its economy and national security, asserting that disruptions could severely impact domestic and global supply chains. The unpublicized directive adding more security requirements for the large amount of China-made cranes underscores the concern of potential cyber-risks.

https://www.whitehouse.gov/briefing-room/statements-releases/2024/02/21/fact-sheet-biden-harris-administration-announces-initiative-to-bolster-cybersecurity-of-u-s-ports/#:~:text=President%20Biden%20will%20sign%20an,networks%20and%20systems%20are%20secure.

@OUPNarith
👍2
Police plan week of #LockBit revelations after capturing ‘unprecedented’ intelligence from gang’s infrastructure. Why it matters:

1. The National Crime Agency (NCA), in collaboration with international partners, had unprecedented access to LockBit's systems, a significant development that exemplifies the success of cross-border cooperation in countering cybercrimes.

2. The intelligence garnered from this infiltration into LockBit's systems will allow for future arrests and further understanding of the ransomware ecosystem, demonstrating the potential of breakthroughs in cybercrime operations to dismantle equally complex criminal networks.

3. The use of the LockBit website as a platform to publish updates and insights derived from this operation illustrates an innovative approach to cybercrime reporting, reinforcing the robustness of law enforcement's technology-based strategies.

https://therecord.media/lockbit-ransomware-disrupted-international-operation

@OUPNarith
Top Hacking And CyberSecurity Course For FREE.

Courses List
✅️ Learn Burp Suite
https://lnkd.in/dpswWNC5

✅️ Ethical Hacking - Basics
https://lnkd.in/dw7YjkuB

✅️ Pentesting Android Apps
https://lnkd.in/dcuD-fSG

✅️ Ethical Hacking for Beginners
https://lnkd.in/dHmFfN_a

✅️ Lee's Web Hacking (SQL & XSS)
https://lnkd.in/dRH4xrMh

✅️ Ethical Hacking with Parrot OS
https://lnkd.in/dn6935jG

✅️Ethical Hacking for Beginners
https://lnkd.in/db-KpkYw

⚠️Introduction to DarkWeb
https://lnkd.in/dHMCUSwv

@OUPNarith
4
ក្រុមហ៊ុនឧបករណ៍សុវត្ថិភាព Wyze បានធ្វើការសុំទោសដល់អតិថិជន បន្ទាប់ពីការរំលោភបំពានកាមេរ៉ាអនុញ្ញាតឲ្យអ្នកប្រើប្រាស់ប្រមាណ 13,000 នាក់ចូលមើលក្នុងផ្ទះរបស់អ្នកដទៃ។

ក្រុមហ៊ុនដែលមានមូលដ្ឋាននៅទីក្រុង Seattle ដែលមានជំនាញលើផលិតផលផ្ទះឆ្លាតវៃ និងកាមេរ៉ាឥតខ្សែបានស្តីបន្ទោសឧបទ្ទវហេតុនេះលើ "third party caching library" ដែលថ្មីៗនេះត្រូវបានដាក់បញ្ចូលទៅក្នុងប្រព័ន្ធរបស់ខ្លួន។

វាមិនមែនជាលើកទីមួយទេដែលក្រុមហ៊ុនបានទទួលរងការបំពាន។

https://www.businessinsider.com/wyze-camera-breach-customers-security-homes-2024-2

@OUPNarith
😁2
This media is not supported in your browser
VIEW IN TELEGRAM
Have you ever wondered how computer viruses manage to disrupt and damage entire systems by replicating themselves? Our latest animated poster delves into the workings of Viruses, those malicious programs designed to alter the operation of computers, without the user's knowledge or consent. 🕵️‍♂️🖥️

Viruses are characterized by their ability to copy themselves and are often transmitted through infected files or storage media. Once the virus is executed, usually by opening or running the infected file, it triggers its payload, which can range from minor annoyances to complete destruction of data and systems. 🛡️🔥

These malicious programs can perform a variety of destructive actions, such as deleting files, rewriting data, stealing personal information, or even taking complete control of the infected system. In addition, many viruses are designed to spread automatically, taking advantage of networks and media to infect as many devices as possible. 📈🔒

@OUPNarith
2
1704386414196.pdf
368.5 KB
GVH launches market analysis on the impact of artificial intelligence

@OUPNarith
1