Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค US to Blacklist Sophgo After Chip Found in #Huawei #AI Processor
https://undercodenews.com/us-to-blacklist-sophgo-after-chip-found-in-huawei-ai-processor/
@Undercode_News
https://undercodenews.com/us-to-blacklist-sophgo-after-chip-found-in-huawei-ai-processor/
@Undercode_News
UNDERCODE NEWS
US to Blacklist Sophgo After Chip Found in Huawei AI Processor - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฑ The #Microsoft 365 App Gets a #Copilot-Centric Makeover
https://undercodenews.com/the-microsoft-365-app-gets-a-copilot-centric-makeover/
@Undercode_News
https://undercodenews.com/the-microsoft-365-app-gets-a-copilot-centric-makeover/
@Undercode_News
UNDERCODE NEWS
The Microsoft 365 App Gets a Copilot-Centric Makeover - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Level Up Your Tech Skills: Free IT Training for Nigerians by the Government
https://undercodenews.com/level-up-your-tech-skills-free-it-training-for-nigerians-by-the-government/
@Undercode_News
https://undercodenews.com/level-up-your-tech-skills-free-it-training-for-nigerians-by-the-government/
@Undercode_News
UNDERCODE NEWS
Level Up Your Tech Skills: Free IT Training for Nigerians by the Government - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฎ Streamlining Success: 21 #Digital Marketing Strategies to Automate Repetitive Tasks
https://undercodenews.com/streamlining-success-21-digital-marketing-strategies-to-automate-repetitive-tasks/
@Undercode_News
https://undercodenews.com/streamlining-success-21-digital-marketing-strategies-to-automate-repetitive-tasks/
@Undercode_News
UNDERCODE NEWS
Streamlining Success: 21 Digital Marketing Strategies to Automate Repetitive Tasks - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ 20-Year Prison Sentence for Romanian Hacker Involved in NetWalker #Ransomware Attacks
https://undercodenews.com/20-year-prison-sentence-for-romanian-hacker-involved-in-netwalker-ransomware-attacks/
@Undercode_News
https://undercodenews.com/20-year-prison-sentence-for-romanian-hacker-involved-in-netwalker-ransomware-attacks/
@Undercode_News
UNDERCODE NEWS
20-Year Prison Sentence for Romanian Hacker Involved in NetWalker Ransomware Attacks - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฅ๏ธ #YouTube to Crack Down on Clickbait in India: A Step Towards a More Trustworthy Platform
https://undercodenews.com/youtube-to-crack-down-on-clickbait-in-india-a-step-towards-a-more-trustworthy-platform/
@Undercode_News
https://undercodenews.com/youtube-to-crack-down-on-clickbait-in-india-a-step-towards-a-more-trustworthy-platform/
@Undercode_News
UNDERCODE NEWS
YouTube to Crack Down on Clickbait in India: A Step Towards a More Trustworthy Platform - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆ[๐
๐๐๐ ๐๐๐๐๐๐๐๐๐ - ๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐]
Whether you are preparing for a certification or need to sharpen your skills for your pentests.
๐คHere is a list of resources ๐ค:
๐๐๐๐ ๐ญ๐จ ๐ฉ๐ซ๐๐๐ญ๐ข๐๐?
๐Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA
๐You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr
๐ Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt
๐Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM
๐Julien Provenzano โ๏ธ shared a great document full of resources here:
https://lnkd.in/d-skx-R3
๐Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT
Resources Credit : Gabrielle
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Whether you are preparing for a certification or need to sharpen your skills for your pentests.
๐คHere is a list of resources ๐ค:
๐๐๐๐ ๐ญ๐จ ๐ฉ๐ซ๐๐๐ญ๐ข๐๐?
๐Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA
๐You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr
๐ Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt
๐Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM
๐Julien Provenzano โ๏ธ shared a great document full of resources here:
https://lnkd.in/d-skx-R3
๐Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT
Resources Credit : Gabrielle
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
security_SOC_2025.pdf
647.9 KB
๐ฆ SOC Architectures & Frameworks: Key to Cybersecurity! ๐จ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโs a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโs a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
medium_com_aitichoumustapha_lab_15_practical_malware_analysis_discover.pdf
3.6 MB
๐๐๐ 15 ๐๐ซ๐๐๐ญ๐ข๐๐๐ฅ ๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: ๐๐ข๐ฌ๐๐จ๐ฏ๐๐ซ ๐๐ง๐ญ๐ข-๐๐ข๐ฌ๐๐ฌ๐ฌ๐๐ฆ๐๐ฅ๐ฒ ๐๐๐๐ก๐ง๐ข๐ช๐ฎ๐๐ฌ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWebshell Testing for Defenders ๐ก
Having automated tools to spin up web servers isnโt just convenientโitโs a game-changer for defenders. Here's why:
๐ Detection Opportunities:
Use these servers to validate analytic coverage for:
๐ File modifications (webshell uploads)
โ๏ธ Process executions (commands from shells)
๐ฏ Suspicious behaviors triggered by shells
๐ป How to Use:
1๏ธโฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโฃObserve logs, alerts, and behaviors to identify gaps in your coverage.
๐ฅ Tools for Testing:
โก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Having automated tools to spin up web servers isnโt just convenientโitโs a game-changer for defenders. Here's why:
๐ Detection Opportunities:
Use these servers to validate analytic coverage for:
๐ File modifications (webshell uploads)
โ๏ธ Process executions (commands from shells)
๐ฏ Suspicious behaviors triggered by shells
๐ป How to Use:
1๏ธโฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโฃObserve logs, alerts, and behaviors to identify gaps in your coverage.
๐ฅ Tools for Testing:
โก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
FusionCharts Targeted by #Ransomware Group
https://undercodenews.com/fusioncharts-targeted-by-ransomware-group/
@Undercode_News
https://undercodenews.com/fusioncharts-targeted-by-ransomware-group/
@Undercode_News
UNDERCODE NEWS
FusionCharts Targeted by Ransomware Group - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Enhanced Browser Security: #Microsoft Edge Tackles Scareware with #AI
https://undercodenews.com/enhanced-browser-security-microsoft-edge-tackles-scareware-with-ai/
@Undercode_News
https://undercodenews.com/enhanced-browser-security-microsoft-edge-tackles-scareware-with-ai/
@Undercode_News
UNDERCODE NEWS
Enhanced Browser Security: Microsoft Edge Tackles Scareware with AI - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Allied Packing And Rubber Inc
https://undercodenews.com/killsec-ransomware-targets-allied-packing-and-rubber-inc/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-allied-packing-and-rubber-inc/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Allied Packing And Rubber Inc - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Killsec #Ransomware Targets Abrasive Supply Corporation
https://undercodenews.com/killsec-ransomware-targets-abrasive-supply-corporation/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-abrasive-supply-corporation/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Abrasive Supply Corporation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Ransomware Group killsec Targets Albert Paper Company
https://undercodenews.com/ransomware-group-killsec-targets-albert-paper-company/
@Undercode_News
https://undercodenews.com/ransomware-group-killsec-targets-albert-paper-company/
@Undercode_News
UNDERCODE NEWS
Ransomware Group killsec Targets Albert Paper Company - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Avana Electrotek
https://undercodenews.com/killsec-ransomware-targets-avana-electrotek/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-avana-electrotek/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Avana Electrotek - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Badger Popcorn and Albert Paper Company
https://undercodenews.com/killsec-ransomware-targets-badger-popcorn-and-albert-paper-company/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-badger-popcorn-and-albert-paper-company/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Badger Popcorn and Albert Paper Company - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Hundreds of SocialStream Accounts Breached Due to #Account Takeover Vulnerability
https://undercodenews.com/hundreds-of-socialstream-accounts-breached-due-to-account-takeover-vulnerability/
@Undercode_News
https://undercodenews.com/hundreds-of-socialstream-accounts-breached-due-to-account-takeover-vulnerability/
@Undercode_News
UNDERCODE NEWS
Hundreds of SocialStream Accounts Breached Due to Account Takeover Vulnerability - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ Zero Trust Security: The Future of Cyber Defense ๐
In todayโs rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.
Hereโs a quick Zero Trust Security Cheatsheet to break it down:
๐ What is Zero Trust?
Itโs a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.
๐ Key Pillars of Zero Trust:
1๏ธโฃ Authentication Types:
๐ป Single-Factor Authentication (SFA): Basic, but less secure.
๐ป Multi-Factor Authentication (MFA): A core requirement for enhanced security.
2๏ธโฃ Verticals Leveraging Zero Trust:
๐ป Banking & Financial Services
๐ป Government & Defense
๐ป IT & Healthcare
๐ป Retail, E-commerce, and more.
3๏ธโฃ Top Technologies and Applications:
๐ป Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
๐ป Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).
4๏ธโฃ Core Security Areas:
๐ป Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
๐ป Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
๐ป IoT Security: Securing IoT devices with firewalls and device management.
๐ป Data Security: Preventing breaches with DLP, encryption, and data masking.
๐ป Network Security: Employing IDS, IPS, and segmentation to protect networks.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In todayโs rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.
Hereโs a quick Zero Trust Security Cheatsheet to break it down:
๐ What is Zero Trust?
Itโs a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.
๐ Key Pillars of Zero Trust:
1๏ธโฃ Authentication Types:
๐ป Single-Factor Authentication (SFA): Basic, but less secure.
๐ป Multi-Factor Authentication (MFA): A core requirement for enhanced security.
2๏ธโฃ Verticals Leveraging Zero Trust:
๐ป Banking & Financial Services
๐ป Government & Defense
๐ป IT & Healthcare
๐ป Retail, E-commerce, and more.
3๏ธโฃ Top Technologies and Applications:
๐ป Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
๐ป Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).
4๏ธโฃ Core Security Areas:
๐ป Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
๐ป Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
๐ป IoT Security: Securing IoT devices with firewalls and device management.
๐ป Data Security: Preventing breaches with DLP, encryption, and data masking.
๐ป Network Security: Employing IDS, IPS, and segmentation to protect networks.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ