Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ A Festive New Year on #WhatsApp: Animated Reactions, Special Effects, and New Stickers
https://undercodenews.com/a-festive-new-year-on-whatsapp-animated-reactions-special-effects-and-new-stickers/
@Undercode_News
https://undercodenews.com/a-festive-new-year-on-whatsapp-animated-reactions-special-effects-and-new-stickers/
@Undercode_News
UNDERCODE NEWS
A Festive New Year on WhatsApp: Animated Reactions, Special Effects, and New Stickers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Samsung's Tight Grip on Secrets: Employees Fired After #Galaxy S25 Leak
https://undercodenews.com/samsungs-tight-grip-on-secrets-employees-fired-after-galaxy-s25-leak/
@Undercode_News
https://undercodenews.com/samsungs-tight-grip-on-secrets-employees-fired-after-galaxy-s25-leak/
@Undercode_News
UNDERCODE NEWS
Samsung's Tight Grip on Secrets: Employees Fired After Galaxy S25 Leak - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
India's Tarnished Tourism Image: A Cry for Change
https://undercodenews.com/indias-tarnished-tourism-image-a-cry-for-change/
@Undercode_News
https://undercodenews.com/indias-tarnished-tourism-image-a-cry-for-change/
@Undercode_News
UNDERCODE NEWS
India's Tarnished Tourism Image: A Cry for Change - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π #Samsung's Holiday Sale: Flagship Phones at Unbeatable Prices
https://undercodenews.com/samsungs-holiday-sale-flagship-phones-at-unbeatable-prices/
@Undercode_News
https://undercodenews.com/samsungs-holiday-sale-flagship-phones-at-unbeatable-prices/
@Undercode_News
UNDERCODE NEWS
Samsung's Holiday Sale: Flagship Phones at Unbeatable Prices - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ Infosys Inaugurates New Development Center in West Bengal
https://undercodenews.com/infosys-inaugurates-new-development-center-in-west-bengal/
@Undercode_News
https://undercodenews.com/infosys-inaugurates-new-development-center-in-west-bengal/
@Undercode_News
UNDERCODE NEWS
Infosys Inaugurates New Development Center in West Bengal - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
π¦2025 π
πππ ππππ ππππ πππππ ππππππππ ππππππππ (New Urls):
π HackerSploit Training Course -Part 1- (YouTube):
https://lnkd.in/eH3UYgp5
π HackerSploit Training Course -Part 2- (Linode Live):
https://lnkd.in/ebEGVdGY
π Network Defense/Digital Forensics (EC-Council):
https://lnkd.in/ewiVUkYt
π Introduction to Cyber Security -with Case Study: WhatsApp Attack- (Great Learning):
https://lnkd.in/eUdRn8Km
π Digital Forensics (Infosec Train):
https://lnkd.in/eR58kTPJ
π Introduction Courses (Security Blue Team):
https://lnkd.in/efuAKp4h
π Introduction to Cyber Security/Cloud Security/CISSP (Simplilearn):
https://lnkd.in/ey5TPBdr
π Network Security NSE1/NSE2/NSE3 (Fortinet NETWORK SECURITY):
https://lnkd.in/ehV9aUm7
π SOC Analyst (Splunk):
https://lnkd.in/esq4zFTg
π Proactive Security Operations Center (Picus Security Academy):
https://lnkd.in/eYA26eN5
π Certified in Cybersecurityβ - CC (ISC2):
https://lnkd.in/eq2E2ci8
π Cyber Aces (SANS Institute):
https://lnkd.in/eNCPrtdd
π Introduction to IT and Cybersecurity (Cybrary):
https://lnkd.in/emAES4i7
π SOC Analyst Pathway: LetsDefend https://letsdefend.io/
π Computer Systems Security (Massachusetts Institute of Technology):
https://lnkd.in/eUDQeT3v
Ref: Adnan AlamAdnan Alam
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π HackerSploit Training Course -Part 1- (YouTube):
https://lnkd.in/eH3UYgp5
π HackerSploit Training Course -Part 2- (Linode Live):
https://lnkd.in/ebEGVdGY
π Network Defense/Digital Forensics (EC-Council):
https://lnkd.in/ewiVUkYt
π Introduction to Cyber Security -with Case Study: WhatsApp Attack- (Great Learning):
https://lnkd.in/eUdRn8Km
π Digital Forensics (Infosec Train):
https://lnkd.in/eR58kTPJ
π Introduction Courses (Security Blue Team):
https://lnkd.in/efuAKp4h
π Introduction to Cyber Security/Cloud Security/CISSP (Simplilearn):
https://lnkd.in/ey5TPBdr
π Network Security NSE1/NSE2/NSE3 (Fortinet NETWORK SECURITY):
https://lnkd.in/ehV9aUm7
π SOC Analyst (Splunk):
https://lnkd.in/esq4zFTg
π Proactive Security Operations Center (Picus Security Academy):
https://lnkd.in/eYA26eN5
π Certified in Cybersecurityβ - CC (ISC2):
https://lnkd.in/eq2E2ci8
π Cyber Aces (SANS Institute):
https://lnkd.in/eNCPrtdd
π Introduction to IT and Cybersecurity (Cybrary):
https://lnkd.in/emAES4i7
π SOC Analyst Pathway: LetsDefend https://letsdefend.io/
π Computer Systems Security (Massachusetts Institute of Technology):
https://lnkd.in/eUDQeT3v
Ref: Adnan AlamAdnan Alam
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
π¦AI Agents: The Security Approach π
AI agents are changing the game, helping us solve problems and innovate faster than ever. But with all this power comes many questions, some of them: How do we keep them safe? What should be the security considerations for each layer of this future AI framework?
*οΈβ£ Input Layer
> Security Risk: Data poisoning and adversarial attacks could corrupt input data or manipulate real-time feedback loops.
> Tip: Implement data validation pipelines to sanitize incoming data.
Use secure APIs for real-time inputs and Continuously monitor for anomalies in user feedback patterns.
*οΈβ£ Agent Orchestration Layer
> Security Risk: Inter-agent communication could be exploited for unauthorized data sharing or infiltration.
> Tip: Use end-to-end encryption for inter-agent communication. Employ RBAC to ensure agents only perform tasks for which theyβre authorized and Monitor orchestration processes for unexpected task allocation behaviors.
*οΈβ£ AI Agents Layer
> Security Risk: Malicious actors could exploit self-learning loops to insert harmful behaviors or compromise models.
> Tip: Regularly test models with adversarial simulation frameworks to identify vulnerabilities. Log and review planning, reflection, and tool usage steps to detect anomalies and secure model updates to prevent injection attacks during retraining.
*οΈβ£ Retrieval Layer
> Security Risk: Vector stores and knowledge graphs are high-value targets for attackers seeking to steal or manipulate critical information.
> Tip: Encrypt data at rest and in transit using robust protocols like AES-256. Apply zero-trust principles to storage accessβverify every request. Maintain immutable logs to track data access and modifications.
*οΈβ£ Output Layer
> Security Risk: Unauthorized enrichment or synthetic data generation could leak sensitive information or introduce malicious payloads.
> Tip: Use watermarking and audit trails for enriched outputs. Apply strict controls to ensure customizable outputs donβt expose sensitive data and
Integrate DLP policies into output workflows.
*οΈβ£ Service Layer
> Security Risk: Automated insight generation and multi-channel delivery could introduce phishing or unauthorized data dissemination risks.
> Tip: Implement AI-generated output verification to prevent spoofing or misinformation. Regularly audit multi-channel delivery systems for misconfigured endpoints. Enforce secure delivery protocols to safeguard automated insights.
π‘ Foundational Security Principles
> Ethics & Responsible AI: Regularly assess models for biases that attackers could exploit.
> Compliance: Align with frameworks like GDPR, CCPA, and AI-specific laws.
> Human-AI Collaboration: Build explainability into every decision to reduce the "black box" effect.
Ref: Elli Shlomo (IR)Elli Shlomo (IR)
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
AI agents are changing the game, helping us solve problems and innovate faster than ever. But with all this power comes many questions, some of them: How do we keep them safe? What should be the security considerations for each layer of this future AI framework?
*οΈβ£ Input Layer
> Security Risk: Data poisoning and adversarial attacks could corrupt input data or manipulate real-time feedback loops.
> Tip: Implement data validation pipelines to sanitize incoming data.
Use secure APIs for real-time inputs and Continuously monitor for anomalies in user feedback patterns.
*οΈβ£ Agent Orchestration Layer
> Security Risk: Inter-agent communication could be exploited for unauthorized data sharing or infiltration.
> Tip: Use end-to-end encryption for inter-agent communication. Employ RBAC to ensure agents only perform tasks for which theyβre authorized and Monitor orchestration processes for unexpected task allocation behaviors.
*οΈβ£ AI Agents Layer
> Security Risk: Malicious actors could exploit self-learning loops to insert harmful behaviors or compromise models.
> Tip: Regularly test models with adversarial simulation frameworks to identify vulnerabilities. Log and review planning, reflection, and tool usage steps to detect anomalies and secure model updates to prevent injection attacks during retraining.
*οΈβ£ Retrieval Layer
> Security Risk: Vector stores and knowledge graphs are high-value targets for attackers seeking to steal or manipulate critical information.
> Tip: Encrypt data at rest and in transit using robust protocols like AES-256. Apply zero-trust principles to storage accessβverify every request. Maintain immutable logs to track data access and modifications.
*οΈβ£ Output Layer
> Security Risk: Unauthorized enrichment or synthetic data generation could leak sensitive information or introduce malicious payloads.
> Tip: Use watermarking and audit trails for enriched outputs. Apply strict controls to ensure customizable outputs donβt expose sensitive data and
Integrate DLP policies into output workflows.
*οΈβ£ Service Layer
> Security Risk: Automated insight generation and multi-channel delivery could introduce phishing or unauthorized data dissemination risks.
> Tip: Implement AI-generated output verification to prevent spoofing or misinformation. Regularly audit multi-channel delivery systems for misconfigured endpoints. Enforce secure delivery protocols to safeguard automated insights.
π‘ Foundational Security Principles
> Ethics & Responsible AI: Regularly assess models for biases that attackers could exploit.
> Compliance: Align with frameworks like GDPR, CCPA, and AI-specific laws.
> Human-AI Collaboration: Build explainability into every decision to reduce the "black box" effect.
Ref: Elli Shlomo (IR)Elli Shlomo (IR)
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Exploiting Crew (Pr1vAt3)
π¦ The Data Privacy Checklist: 7 Must-Have Practices for Every Organization
Protecting data is no longer optional, it's a necessity. Whether you're a startup or a global enterprise, safeguarding sensitive information must be at the core of your operations. Here are 7 essential data privacy practices that every organization should implement:
π Data Encryption: Encrypt sensitive data at rest and in transit to shield it from unauthorized access.
π Regular Software Updates: Keep systems up to date to eliminate vulnerabilities.
π Strong Authentication: Implement multi-factor authentication (MFA) for robust security.
π©βπ« Employee Training: Educate your team on phishing, social engineering, and data protection protocols.
πΎ Backup and Recovery: Regularly back up data and establish a recovery plan for emergencies.
π€ Third-Party Risk Management: Vet vendors to ensure their practices align with your standards.
β‘οΈ Incident Response Plan: Be ready to manage and mitigate breaches swiftly.
π By integrating these practices into your cybersecurity strategy, you can reduce risks and ensure compliance with data protection standards.
Ref: Fadi Kazdar
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Protecting data is no longer optional, it's a necessity. Whether you're a startup or a global enterprise, safeguarding sensitive information must be at the core of your operations. Here are 7 essential data privacy practices that every organization should implement:
π Data Encryption: Encrypt sensitive data at rest and in transit to shield it from unauthorized access.
π Regular Software Updates: Keep systems up to date to eliminate vulnerabilities.
π Strong Authentication: Implement multi-factor authentication (MFA) for robust security.
π©βπ« Employee Training: Educate your team on phishing, social engineering, and data protection protocols.
πΎ Backup and Recovery: Regularly back up data and establish a recovery plan for emergencies.
π€ Third-Party Risk Management: Vet vendors to ensure their practices align with your standards.
β‘οΈ Incident Response Plan: Be ready to manage and mitigate breaches swiftly.
π By integrating these practices into your cybersecurity strategy, you can reduce risks and ensure compliance with data protection standards.
Ref: Fadi Kazdar
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β οΈ North Korean Hackers Target Nuclear Organization with Deceptive Job Offers and New #Malware
https://undercodenews.com/north-korean-hackers-target-nuclear-organization-with-deceptive-job-offers-and-new-malware/
@Undercode_News
https://undercodenews.com/north-korean-hackers-target-nuclear-organization-with-deceptive-job-offers-and-new-malware/
@Undercode_News
UNDERCODE NEWS
North Korean Hackers Target Nuclear Organization with Deceptive Job Offers and New Malware - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
π¦ How to Hunt LFI Using Google Dorks - PoC π¨
Welcome to another exciting episode on HackWithRohit! π
In this video, weβll dive deep into:
π Local File Inclusion (LFI) vulnerabilities and how they can expose sensitive files on web servers.
π‘ Leveraging Google Dorks as a powerful tool to uncover vulnerable endpoints.
π A step-by-step demonstration of identifying and exploiting LFI in real-world scenarios.
π‘ Disclaimer:
This video is strictly for educational purposes only. Always ensure you have permission to test and follow ethical hacking guidelines. Unauthorized testing or exploitation is illegal and against the principles of ethical hacking.
π¬ Discussion Time:
Have you encountered LFI during your bug hunting journey?
Share your tips and tricks in the comments!
π Donβt forget to like, comment, and subscribe to stay updated on the latest bug bounty techniques and tools.
Ref: ROHITH SROHITH S
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Welcome to another exciting episode on HackWithRohit! π
In this video, weβll dive deep into:
π Local File Inclusion (LFI) vulnerabilities and how they can expose sensitive files on web servers.
π‘ Leveraging Google Dorks as a powerful tool to uncover vulnerable endpoints.
π A step-by-step demonstration of identifying and exploiting LFI in real-world scenarios.
π‘ Disclaimer:
This video is strictly for educational purposes only. Always ensure you have permission to test and follow ethical hacking guidelines. Unauthorized testing or exploitation is illegal and against the principles of ethical hacking.
π¬ Discussion Time:
Have you encountered LFI during your bug hunting journey?
Share your tips and tricks in the comments!
π Donβt forget to like, comment, and subscribe to stay updated on the latest bug bounty techniques and tools.
Ref: ROHITH SROHITH S
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Informative Automating #CrowdStrike RFM Reporting with #AI and Tines
https://undercodenews.com/informative-automating-crowdstrike-rfm-reporting-with-ai-and-tines/
@Undercode_News
https://undercodenews.com/informative-automating-crowdstrike-rfm-reporting-with-ai-and-tines/
@Undercode_News
UNDERCODE NEWS
Informative Automating CrowdStrike RFM Reporting with AI and Tines - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π‘οΈ A Call to Action: Bolstering Your #Digital Security
https://undercodenews.com/a-call-to-action-bolstering-your-digital-security/
@Undercode_News
https://undercodenews.com/a-call-to-action-bolstering-your-digital-security/
@Undercode_News
UNDERCODE NEWS
A Call to Action: Bolstering Your Digital Security - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE TESTING
EIGRP, GRE, IPSEC, and DMVPN. .pdf
867 KB
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Beware the Disguised Delivery: Malicious Christmas LNK Exploits SSH for File Transfer
https://undercodenews.com/beware-the-disguised-delivery-malicious-christmas-lnk-exploits-ssh-for-file-transfer/
@Undercode_News
https://undercodenews.com/beware-the-disguised-delivery-malicious-christmas-lnk-exploits-ssh-for-file-transfer/
@Undercode_News
UNDERCODE NEWS
Beware the Disguised Delivery: Malicious Christmas LNK Exploits SSH for File Transfer - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π₯οΈ FBI Warns of Hiatus RAT Targeting Vulnerable #IoT Devices
https://undercodenews.com/fbi-warns-of-hiatus-rat-targeting-vulnerable-iot-devices/
@Undercode_News
https://undercodenews.com/fbi-warns-of-hiatus-rat-targeting-vulnerable-iot-devices/
@Undercode_News
UNDERCODE NEWS
FBI Warns of Hiatus RAT Targeting Vulnerable IoT Devices - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
bloodhound.pdf
2.3 MB
π¦Mastering Active Directory Enumeration with BloodHound ππ»
Just explored the "BloodHound Active Directory Enumeration Tool"βan essential resource for both offensive and defensive security professionals. This guide simplifies the process of visualizing and understanding Active Directory attack paths and security gaps, helping organizations stay secure.
Highlights from the guide:
βοΈ Step-by-step installation for Linux and Windows
βοΈ Techniques to extract and analyze domain data
βοΈ Pre-built queries to identify vulnerabilities like AS-REP roasting, Kerberoasting, and DC Sync attacks
βοΈ Utilizing SharpHound and PowerShell for efficient data collection
βοΈ Practical advice for Red and Blue Teams alike
Whether you're on the offensive or working to harden your network's defenses, BloodHound is a game-changer for Active Directory enumeration and analysis.
Ref: in pdf
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Just explored the "BloodHound Active Directory Enumeration Tool"βan essential resource for both offensive and defensive security professionals. This guide simplifies the process of visualizing and understanding Active Directory attack paths and security gaps, helping organizations stay secure.
Highlights from the guide:
βοΈ Step-by-step installation for Linux and Windows
βοΈ Techniques to extract and analyze domain data
βοΈ Pre-built queries to identify vulnerabilities like AS-REP roasting, Kerberoasting, and DC Sync attacks
βοΈ Utilizing SharpHound and PowerShell for efficient data collection
βοΈ Practical advice for Red and Blue Teams alike
Whether you're on the offensive or working to harden your network's defenses, BloodHound is a game-changer for Active Directory enumeration and analysis.
Ref: in pdf
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Peruvian Government Website Targeted by Notorious Cloak #Ransomware Group
https://undercodenews.com/peruvian-government-website-targeted-by-notorious-cloak-ransomware-group/
@Undercode_News
https://undercodenews.com/peruvian-government-website-targeted-by-notorious-cloak-ransomware-group/
@Undercode_News
UNDERCODE NEWS
Peruvian Government Website Targeted by Notorious Cloak Ransomware Group - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Water Utilities Corporation
https://undercodenews.com/killsec-ransomware-targets-water-utilities-corporation/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-water-utilities-corporation/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Water Utilities Corporation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦