Forwarded from UNDERCODE TESTING
security_SOC_2025.pdf
647.9 KB
๐ฆ SOC Architectures & Frameworks: Key to Cybersecurity! ๐จ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโs a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโs a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
medium_com_aitichoumustapha_lab_15_practical_malware_analysis_discover.pdf
3.6 MB
๐๐๐ 15 ๐๐ซ๐๐๐ญ๐ข๐๐๐ฅ ๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: ๐๐ข๐ฌ๐๐จ๐ฏ๐๐ซ ๐๐ง๐ญ๐ข-๐๐ข๐ฌ๐๐ฌ๐ฌ๐๐ฆ๐๐ฅ๐ฒ ๐๐๐๐ก๐ง๐ข๐ช๐ฎ๐๐ฌ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWebshell Testing for Defenders ๐ก
Having automated tools to spin up web servers isnโt just convenientโitโs a game-changer for defenders. Here's why:
๐ Detection Opportunities:
Use these servers to validate analytic coverage for:
๐ File modifications (webshell uploads)
โ๏ธ Process executions (commands from shells)
๐ฏ Suspicious behaviors triggered by shells
๐ป How to Use:
1๏ธโฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโฃObserve logs, alerts, and behaviors to identify gaps in your coverage.
๐ฅ Tools for Testing:
โก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Having automated tools to spin up web servers isnโt just convenientโitโs a game-changer for defenders. Here's why:
๐ Detection Opportunities:
Use these servers to validate analytic coverage for:
๐ File modifications (webshell uploads)
โ๏ธ Process executions (commands from shells)
๐ฏ Suspicious behaviors triggered by shells
๐ป How to Use:
1๏ธโฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโฃObserve logs, alerts, and behaviors to identify gaps in your coverage.
๐ฅ Tools for Testing:
โก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
FusionCharts Targeted by #Ransomware Group
https://undercodenews.com/fusioncharts-targeted-by-ransomware-group/
@Undercode_News
https://undercodenews.com/fusioncharts-targeted-by-ransomware-group/
@Undercode_News
UNDERCODE NEWS
FusionCharts Targeted by Ransomware Group - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Enhanced Browser Security: #Microsoft Edge Tackles Scareware with #AI
https://undercodenews.com/enhanced-browser-security-microsoft-edge-tackles-scareware-with-ai/
@Undercode_News
https://undercodenews.com/enhanced-browser-security-microsoft-edge-tackles-scareware-with-ai/
@Undercode_News
UNDERCODE NEWS
Enhanced Browser Security: Microsoft Edge Tackles Scareware with AI - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Allied Packing And Rubber Inc
https://undercodenews.com/killsec-ransomware-targets-allied-packing-and-rubber-inc/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-allied-packing-and-rubber-inc/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Allied Packing And Rubber Inc - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Killsec #Ransomware Targets Abrasive Supply Corporation
https://undercodenews.com/killsec-ransomware-targets-abrasive-supply-corporation/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-abrasive-supply-corporation/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Abrasive Supply Corporation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Ransomware Group killsec Targets Albert Paper Company
https://undercodenews.com/ransomware-group-killsec-targets-albert-paper-company/
@Undercode_News
https://undercodenews.com/ransomware-group-killsec-targets-albert-paper-company/
@Undercode_News
UNDERCODE NEWS
Ransomware Group killsec Targets Albert Paper Company - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Avana Electrotek
https://undercodenews.com/killsec-ransomware-targets-avana-electrotek/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-avana-electrotek/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Avana Electrotek - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Killsec #Ransomware Targets Badger Popcorn and Albert Paper Company
https://undercodenews.com/killsec-ransomware-targets-badger-popcorn-and-albert-paper-company/
@Undercode_News
https://undercodenews.com/killsec-ransomware-targets-badger-popcorn-and-albert-paper-company/
@Undercode_News
UNDERCODE NEWS
Killsec Ransomware Targets Badger Popcorn and Albert Paper Company - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Hundreds of SocialStream Accounts Breached Due to #Account Takeover Vulnerability
https://undercodenews.com/hundreds-of-socialstream-accounts-breached-due-to-account-takeover-vulnerability/
@Undercode_News
https://undercodenews.com/hundreds-of-socialstream-accounts-breached-due-to-account-takeover-vulnerability/
@Undercode_News
UNDERCODE NEWS
Hundreds of SocialStream Accounts Breached Due to Account Takeover Vulnerability - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ Zero Trust Security: The Future of Cyber Defense ๐
In todayโs rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.
Hereโs a quick Zero Trust Security Cheatsheet to break it down:
๐ What is Zero Trust?
Itโs a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.
๐ Key Pillars of Zero Trust:
1๏ธโฃ Authentication Types:
๐ป Single-Factor Authentication (SFA): Basic, but less secure.
๐ป Multi-Factor Authentication (MFA): A core requirement for enhanced security.
2๏ธโฃ Verticals Leveraging Zero Trust:
๐ป Banking & Financial Services
๐ป Government & Defense
๐ป IT & Healthcare
๐ป Retail, E-commerce, and more.
3๏ธโฃ Top Technologies and Applications:
๐ป Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
๐ป Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).
4๏ธโฃ Core Security Areas:
๐ป Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
๐ป Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
๐ป IoT Security: Securing IoT devices with firewalls and device management.
๐ป Data Security: Preventing breaches with DLP, encryption, and data masking.
๐ป Network Security: Employing IDS, IPS, and segmentation to protect networks.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In todayโs rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.
Hereโs a quick Zero Trust Security Cheatsheet to break it down:
๐ What is Zero Trust?
Itโs a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.
๐ Key Pillars of Zero Trust:
1๏ธโฃ Authentication Types:
๐ป Single-Factor Authentication (SFA): Basic, but less secure.
๐ป Multi-Factor Authentication (MFA): A core requirement for enhanced security.
2๏ธโฃ Verticals Leveraging Zero Trust:
๐ป Banking & Financial Services
๐ป Government & Defense
๐ป IT & Healthcare
๐ป Retail, E-commerce, and more.
3๏ธโฃ Top Technologies and Applications:
๐ป Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
๐ป Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).
4๏ธโฃ Core Security Areas:
๐ป Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
๐ป Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
๐ป IoT Security: Securing IoT devices with firewalls and device management.
๐ป Data Security: Preventing breaches with DLP, encryption, and data masking.
๐ป Network Security: Employing IDS, IPS, and segmentation to protect networks.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Windows 11 December 2024 #Update: Start Menu Glitches and Other Troubles
https://undercodenews.com/windows-11-december-2024-update-start-menu-glitches-and-other-troubles/
@Undercode_News
https://undercodenews.com/windows-11-december-2024-update-start-menu-glitches-and-other-troubles/
@Undercode_News
UNDERCODE NEWS
Windows 11 December 2024 Update: Start Menu Glitches and Other Troubles - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Tech Mahindra CEO Eyes BFSI Dominance to Catch Up with Rivals
https://undercodenews.com/tech-mahindra-ceo-eyes-bfsi-dominance-to-catch-up-with-rivals/
@Undercode_News
https://undercodenews.com/tech-mahindra-ceo-eyes-bfsi-dominance-to-catch-up-with-rivals/
@Undercode_News
UNDERCODE NEWS
Tech Mahindra CEO Eyes BFSI Dominance to Catch Up with Rivals - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โ ๏ธ The Perils of Profitless Growth: A Warning for Fintechs
https://undercodenews.com/the-perils-of-profitless-growth-a-warning-for-fintechs/
@Undercode_News
https://undercodenews.com/the-perils-of-profitless-growth-a-warning-for-fintechs/
@Undercode_News
UNDERCODE NEWS
The Perils of Profitless Growth: A Warning for Fintechs - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆCloud Security Attacks - Repositorys
https://github.com/CyberSecurityUP/GCP-Pentest-Checklist
https://github.com/CyberSecurityUP/Cloud-Security-Attacks
https://github.com/CyberSecurityUP/GCP-Pentest-Checklist
https://github.com/CyberSecurityUP/Cloud-Security-Attacks
GitHub
GitHub - CyberSecurityUP/GCP-Pentest-Checklist
Contribute to CyberSecurityUP/GCP-Pentest-Checklist development by creating an account on GitHub.
Forwarded from UNDERCODE TESTING
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฆManipulation of OTP Email Content via User-Injected Parameters in SAP SuccessFactors Career Portal
Ref: Aditay Kumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Ref: Aditay Kumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
title: Illinois Awarded 99 Million to Electrify School Buses
https://undercodenews.com/title-illinois-awarded-99-million-to-electrify-school-buses/
@Undercode_News
https://undercodenews.com/title-illinois-awarded-99-million-to-electrify-school-buses/
@Undercode_News
UNDERCODE NEWS
title: Illinois Awarded 99 Million to Electrify School Buses - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ The Evolving Threat of BADBOX: A Global #Malware Epidemic
https://undercodenews.com/the-evolving-threat-of-badbox-a-global-malware-epidemic/
@Undercode_News
https://undercodenews.com/the-evolving-threat-of-badbox-a-global-malware-epidemic/
@Undercode_News
UNDERCODE NEWS
The Evolving Threat of BADBOX: A Global Malware Epidemic - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ