Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
☁️ #Microsoft and Incase Partner to Revive PC Accessories
https://undercodenews.com/microsoft-and-incase-partner-to-revive-pc-accessories/
@Undercode_News
https://undercodenews.com/microsoft-and-incase-partner-to-revive-pc-accessories/
@Undercode_News
UNDERCODE NEWS
Microsoft and Incase Partner to Revive PC Accessories - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ Russia Blacklists Cybersecurity Firm Recorded Future
https://undercodenews.com/russia-blacklists-cybersecurity-firm-recorded-future/
@Undercode_News
https://undercodenews.com/russia-blacklists-cybersecurity-firm-recorded-future/
@Undercode_News
UNDERCODE NEWS
Russia Blacklists Cybersecurity Firm Recorded Future - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
🦑DNS Record Types You Should Know!
Here are the 8 most commonly used DNS Record Types.
1 - A (Address) Record
Maps a domain name to an IPv4 address. It is one of the most essential records for translating human-readable domain names into IP addresses.
2 - CNAME (Canonical Name) Record
Used to alias one domain name to another. Often used for subdomains, pointing them to the main domain while keeping the actual domain name hidden.
3 - AAAA Record
Similar to an A record but maps a domain name to an IPv6 address. They are used for websites and services that support the IPv6 protocol.
4 - PTR Record
Provides reverse DNS lookup, mapping an IP address back to a domain name. It is commonly used in verifying the authenticity of a server.
5 - MX Record
Directs email traffic to the correct mail server.
6 - NS (Name Server) Record
Specifies the authoritative DNS servers for the domain. These records help direct queries to the correct DNS servers for further lookups.
7 - SRV (Service) Record
SRV record specifies a host and port for specific services such as VoIP. They are used in conjunction with A records.
8 - TXT (Text) Record
Allows the administrator to add human-readable text to the DNS records. It is used to include verification records, like SPF, for email security.
Over to you: Which other DNS Record Type have you seen?
Ref: Alex Xu
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Here are the 8 most commonly used DNS Record Types.
1 - A (Address) Record
Maps a domain name to an IPv4 address. It is one of the most essential records for translating human-readable domain names into IP addresses.
2 - CNAME (Canonical Name) Record
Used to alias one domain name to another. Often used for subdomains, pointing them to the main domain while keeping the actual domain name hidden.
3 - AAAA Record
Similar to an A record but maps a domain name to an IPv6 address. They are used for websites and services that support the IPv6 protocol.
4 - PTR Record
Provides reverse DNS lookup, mapping an IP address back to a domain name. It is commonly used in verifying the authenticity of a server.
5 - MX Record
Directs email traffic to the correct mail server.
6 - NS (Name Server) Record
Specifies the authoritative DNS servers for the domain. These records help direct queries to the correct DNS servers for further lookups.
7 - SRV (Service) Record
SRV record specifies a host and port for specific services such as VoIP. They are used in conjunction with A records.
8 - TXT (Text) Record
Allows the administrator to add human-readable text to the DNS records. It is used to include verification records, like SPF, for email security.
Over to you: Which other DNS Record Type have you seen?
Ref: Alex Xu
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from DailyCVE
🔴 Craft CMS Remote Code Execution Vulnerability (Critical)
https://dailycve.com/craft-cms-remote-code-execution-vulnerability-critical/
@Daily_CVE
https://dailycve.com/craft-cms-remote-code-execution-vulnerability-critical/
@Daily_CVE
DailyCVE
Craft CMS Remote Code Execution Vulnerability (Critical) - DailyCVE
2024-12-18 : A critical remote code execution (RCE) vulnerability has been discovered in Craft CMS versions prior to 5.5.2 and […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Benchmarking Arabic and English LLMs for Retrieval-Augmented Question Answering: Introducing SILMA RAGQA V10
https://undercodenews.com/benchmarking-arabic-and-english-llms-for-retrieval-augmented-question-answering-introducing-silma-ragqa-v10/
@Undercode_News
https://undercodenews.com/benchmarking-arabic-and-english-llms-for-retrieval-augmented-question-answering-introducing-silma-ragqa-v10/
@Undercode_News
UNDERCODE NEWS
Benchmarking Arabic and English LLMs for Retrieval-Augmented Question Answering: Introducing SILMA RAGQA V10 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 Chat with #ChatGPT on #WhatsApp or Call it on Your Phone - #AI Goes Retro for Wider Reach
https://undercodenews.com/chat-with-chatgpt-on-whatsapp-or-call-it-on-your-phone-ai-goes-retro-for-wider-reach/
@Undercode_News
https://undercodenews.com/chat-with-chatgpt-on-whatsapp-or-call-it-on-your-phone-ai-goes-retro-for-wider-reach/
@Undercode_News
UNDERCODE NEWS
Chat with ChatGPT on WhatsApp or Call it on Your Phone - AI Goes Retro for Wider Reach - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🤖 The Looming Shadow of Ads on #AI #Chatbots
https://undercodenews.com/the-looming-shadow-of-ads-on-ai-chatbots/
@Undercode_News
https://undercodenews.com/the-looming-shadow-of-ads-on-ai-chatbots/
@Undercode_News
UNDERCODE NEWS
The Looming Shadow of Ads on AI Chatbots - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Archetype Group
https://undercodenews.com/hunters-ransomware-targets-archetype-group/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-archetype-group/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Archetype Group - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🕵️ Level Up Your Fitness Journey with the Feature-Packed #Samsung #Galaxy Watch 7
https://undercodenews.com/level-up-your-fitness-journey-with-the-feature-packed-samsung-galaxy-watch-7/
@Undercode_News
https://undercodenews.com/level-up-your-fitness-journey-with-the-feature-packed-samsung-galaxy-watch-7/
@Undercode_News
UNDERCODE NEWS
Level Up Your Fitness Journey with the Feature-Packed Samsung Galaxy Watch 7 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Microsoft's New Ads in #Windows 11: A Closer Look
https://undercodenews.com/microsofts-new-ads-in-windows-11-a-closer-look/
@Undercode_News
https://undercodenews.com/microsofts-new-ads-in-windows-11-a-closer-look/
@Undercode_News
UNDERCODE NEWS
Microsoft's New Ads in Windows 11: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #ChatGPT Goes Mobile: #OpenAI Expands Accessibility with Phone and #WhatsApp Integration
https://undercodenews.com/chatgpt-goes-mobile-openai-expands-accessibility-with-phone-and-whatsapp-integration/
@Undercode_News
https://undercodenews.com/chatgpt-goes-mobile-openai-expands-accessibility-with-phone-and-whatsapp-integration/
@Undercode_News
UNDERCODE NEWS
ChatGPT Goes Mobile: OpenAI Expands Accessibility with Phone and WhatsApp Integration - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑Chatgpt Hack:
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
Official Repo of ChatGPT "DAN" (and other "Jailbreaks"):
https://github.com/0xk1h0/ChatGPT_DAN
GitHub
GitHub - 0xk1h0/ChatGPT_DAN: ChatGPT DAN, Jailbreaks prompt
ChatGPT DAN, Jailbreaks prompt. Contribute to 0xk1h0/ChatGPT_DAN development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🎮 #Windows 11 24H2: A Buggy #Update for Gamers
https://undercodenews.com/windows-11-24h2-a-buggy-update-for-gamers/
@Undercode_News
https://undercodenews.com/windows-11-24h2-a-buggy-update-for-gamers/
@Undercode_News
UNDERCODE NEWS
Windows 11 24H2: A Buggy Update for Gamers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 Apache Struts Flaw Under Active Attack: Urgent Patching Needed
https://undercodenews.com/apache-struts-flaw-under-active-attack-urgent-patching-needed/
@Undercode_News
https://undercodenews.com/apache-struts-flaw-under-active-attack-urgent-patching-needed/
@Undercode_News
UNDERCODE NEWS
Apache Struts Flaw Under Active Attack: Urgent Patching Needed - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Russia's Undesirable Label: A Badge of Honor for Recorded Future
https://undercodenews.com/russias-undesirable-label-a-badge-of-honor-for-recorded-future/
@Undercode_News
https://undercodenews.com/russias-undesirable-label-a-badge-of-honor-for-recorded-future/
@Undercode_News
UNDERCODE NEWS
Russia's Undesirable Label: A Badge of Honor for Recorded Future - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Microvision
https://undercodenews.com/hunters-ransomware-targets-microvision/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-microvision/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Microvision - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Hunters #Ransomware Targets Trev Deeley Motorcycles, Another Victim Falls Prey
https://undercodenews.com/hunters-ransomware-targets-trev-deeley-motorcycles-another-victim-falls-prey/
@Undercode_News
https://undercodenews.com/hunters-ransomware-targets-trev-deeley-motorcycles-another-victim-falls-prey/
@Undercode_News
UNDERCODE NEWS
Hunters Ransomware Targets Trev Deeley Motorcycles, Another Victim Falls Prey - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ Pushing the Boundaries: Fitness, Fire Safety, and Life Support Advancements on the International Space Station
https://undercodenews.com/pushing-the-boundaries-fitness-fire-safety-and-life-support-advancements-on-the-international-space-station/
@Undercode_News
https://undercodenews.com/pushing-the-boundaries-fitness-fire-safety-and-life-support-advancements-on-the-international-space-station/
@Undercode_News
UNDERCODE NEWS
Pushing the Boundaries: Fitness, Fire Safety, and Life Support Advancements on the International Space Station - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑What is Honeypot: Simplified
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine you’re protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking it’s the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Follow Santosh Nandakumar for daily simplified infosec learnings.
A honeypot is a security mechanism designed to detect, deflect, or study hacking attempts by acting as a decoy system. It looks like a legitimate target but is isolated from the actual network to gather intelligence on attackers.
Example
Imagine you’re protecting a house (your network) from burglars. You set up a fake house nearby, filled with dummy valuables. Burglars are attracted to this fake house, thinking it’s the real one. You monitor their actions to learn their techniques and better secure your actual house.
Technical Example
You deploy a honeypot server within your corporate network that mimics a database server. It contains no real data but appears authentic to attackers. When an attacker tries to access it, their activities (such as IP, methods, and tools) are logged for analysis.
Types of Honeypots
1. Production Honeypot
Used to improve overall security by distracting attackers from real systems.
Example: A fake customer login page for a banking website.
2. Research Honeypot
Used for studying attack methods and gathering intelligence.
Example: A honeypot server that simulates IoT devices to study botnet attacks.
Usage
- Intrusion Detection: Identify unauthorized access attempts.
- Threat Intelligence: Understand attackers' tools, techniques, and goals.
- Deception Strategy: Divert attackers away from real resources.
- Vulnerability Testing: Study how attackers exploit weaknesses.
Benefits
1. Early Threat Detection: Identifies threats before they reach critical systems.
2. Data Collection: Offers valuable insights into attack patterns and behaviors.
3. Improved Defense: Helps in identifying security gaps and improving defenses.
4. Resource Efficiency: Reduces the workload on actual systems by diverting attacks.
5. Training Ground: Useful for security teams to practice handling real-world threats.
Limitations
1. Limited Scope: Cannot detect attacks on systems outside the honeypot.
2. Risk of Exploitation: If not properly isolated, attackers could use the honeypot to attack real systems.
3. Resource Intensive: Requires setup, monitoring, and maintenance.
Ref: Santosh Nandakumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁