How Fast Can I Learn Cyber Security
https://mylargebox.com/technology/how-fast-can-i-learn-cyber-security/
@geekcode
https://mylargebox.com/technology/how-fast-can-i-learn-cyber-security/
@geekcode
Mylargebox
How Fast Can I Learn Cyber Security | MyLargeBox
This makes it a fascinating and lucrative professional route to pursue, with cyber security training being the first step. It's reasonable for anyone who has an interest in the field to ponder if it's difficult to learn and how long does one take to learn…
Forwarded from Cyber Agents
Feb 7- Feb 27 Ukraine – Russia the silent cyber conflict
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective.
Below is the timeline of Russia – Ukraine cyber dispute
February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list
Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.
February 26 – Russia restricts Twitter in the country amid conflict with Ukraine
Global internet monitor working group NetBlocks reported that Twitter has been restricted in Russia amid conflict with Ukraine.
February 25 – Ukraine calls on independent hackers to defend against Russia, Russian underground responds
While Ukraine calls for hacker underground to defend against Russia, ransomware gangs make their moves.
February 25 – Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing
The CERT of Ukraine (CERT-UA) warned of a spear-phishing campaign targeting Ukrainian armed forces personnel.
February 25 – Anonymous launched its offensive on Russia in response to the invasion of Ukraine
The popular collective Anonymous declared war on Russia for the illegitimate invasion of Ukraine and announced a series of cyber attacks calling to action its members
February 24 – Data wiper attacks on Ukraine were planned at least in November and used ransomware as decoy
Experts reported that the wiper attacks that yesterday hit hundreds of systems in Ukraine used a GoLang-based ransomware decoy.
February 19 – White House and UK Gov attribute DDoS attacks on Ukraine to Russia’s GRU
The White House has linked the recent DDoS attacks against Ukraine ‘s banks and defense agencies to Russia’s GRU.
@cyberagents
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective.
Below is the timeline of Russia – Ukraine cyber dispute
February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list
Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.
February 26 – Russia restricts Twitter in the country amid conflict with Ukraine
Global internet monitor working group NetBlocks reported that Twitter has been restricted in Russia amid conflict with Ukraine.
February 25 – Ukraine calls on independent hackers to defend against Russia, Russian underground responds
While Ukraine calls for hacker underground to defend against Russia, ransomware gangs make their moves.
February 25 – Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing
The CERT of Ukraine (CERT-UA) warned of a spear-phishing campaign targeting Ukrainian armed forces personnel.
February 25 – Anonymous launched its offensive on Russia in response to the invasion of Ukraine
The popular collective Anonymous declared war on Russia for the illegitimate invasion of Ukraine and announced a series of cyber attacks calling to action its members
February 24 – Data wiper attacks on Ukraine were planned at least in November and used ransomware as decoy
Experts reported that the wiper attacks that yesterday hit hundreds of systems in Ukraine used a GoLang-based ransomware decoy.
February 19 – White House and UK Gov attribute DDoS attacks on Ukraine to Russia’s GRU
The White House has linked the recent DDoS attacks against Ukraine ‘s banks and defense agencies to Russia’s GRU.
@cyberagents
Forwarded from Cyber Agents
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective.
March 5 – Thousands of satellite users offline in Europe following a cyberattack, is it a conflict spillover?
Thousands of satellite internet users across Europe were disconnected from the internet by a cyber-event, experts suspect a cyber attack.
March 4 – Russian watchdog Roskomnadzor also blocked Facebook in Russia
State communications watchdog Roskomnadzor has ordered to block access to Facebook in Russia amid the ongoing invasion of Ukraine.
March 4 – These are the sources of DDoS attacks against Russia, local NCCC warns
Russian government released a list containing IP addresses and domains behind DDoS attacks that hit Russian infrastructure after the invasion.
March 4 – Russia-Ukraine, who are the soldiers that crowd cyberspace?
While Russia is invading Ukraine, multiple forces are joining in the conflict, especially in the cyber space, let’s analyze them.
March 3 – Avast released a free decryptor for the HermeticRansom that hit Ukraine
Avast released a decryptor for the HermeticRansom ransomware used in recent targeted attacks against Ukrainian entities.
March 3 – Ukrainian WordPress sites under massive complex attacks
Researchers observed a spike in the attacks against Ukrainian WordPress sites since the beginning of the military invasion of the country.
March 2 – A cyberattack on Russian satellites is an act of war, the invasion of Ukraine no
Russia considers it legitimate to invade another country but warns it will consider cyberattacks on its satellites an act of war.
March 2 – Asylum Ambuscade spear-phishing campaign targets EU countries aiding Ukrainian refugees
A spear-phishing campaign, tracked as Asylum Ambuscade, targets European government personnel aiding Ukrainian refugees.
March 2 – Anonymous and its affiliates continue to cause damage to Russia
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues.
March 2 – Ukrainian researcher leaked the source code of Conti Ransomware
A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels.
March 1 – IsaacWiper, the third wiper spotted since the beginning of the Russian invasion
IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine.
March 1 – CISA and FBI warn of potential data wiping attacks spillover
US CISA and the FBI warned US organizations that data wiping attacks targeting Ukraine entities could spill over to targets worldwide.
March 1 – FoxBlade malware targeted Ukrainian networks hours before Russia’s invasion
Microsoft revealed that Ukrainian entities were targeted with a previous undetected malware, dubbed FoxBlade, several hours before the invasion.
February 28 – Anonymous hit Russian Nuclear Institute and leak stolen data
Anonymous and other hacker groups that responded to the call to war against Russia continue to launch cyberattacks on gov organizations and businesses.
February 28 – Researcher leaked Conti’s internal chat messages in response to its support to Russia
A Ukrainian researcher leaked tens of thousands of internal chat messages belonging to the Conti ransomware operation.
February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list
Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.
February 27 – Anonymous breached the internal network of Belarusian railways
The Anonymous hacker collective claims to have breached the Belarusian Railway’s data-processing network.
@cyberagents
Share ❤️
March 5 – Thousands of satellite users offline in Europe following a cyberattack, is it a conflict spillover?
Thousands of satellite internet users across Europe were disconnected from the internet by a cyber-event, experts suspect a cyber attack.
March 4 – Russian watchdog Roskomnadzor also blocked Facebook in Russia
State communications watchdog Roskomnadzor has ordered to block access to Facebook in Russia amid the ongoing invasion of Ukraine.
March 4 – These are the sources of DDoS attacks against Russia, local NCCC warns
Russian government released a list containing IP addresses and domains behind DDoS attacks that hit Russian infrastructure after the invasion.
March 4 – Russia-Ukraine, who are the soldiers that crowd cyberspace?
While Russia is invading Ukraine, multiple forces are joining in the conflict, especially in the cyber space, let’s analyze them.
March 3 – Avast released a free decryptor for the HermeticRansom that hit Ukraine
Avast released a decryptor for the HermeticRansom ransomware used in recent targeted attacks against Ukrainian entities.
March 3 – Ukrainian WordPress sites under massive complex attacks
Researchers observed a spike in the attacks against Ukrainian WordPress sites since the beginning of the military invasion of the country.
March 2 – A cyberattack on Russian satellites is an act of war, the invasion of Ukraine no
Russia considers it legitimate to invade another country but warns it will consider cyberattacks on its satellites an act of war.
March 2 – Asylum Ambuscade spear-phishing campaign targets EU countries aiding Ukrainian refugees
A spear-phishing campaign, tracked as Asylum Ambuscade, targets European government personnel aiding Ukrainian refugees.
March 2 – Anonymous and its affiliates continue to cause damage to Russia
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues.
March 2 – Ukrainian researcher leaked the source code of Conti Ransomware
A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels.
March 1 – IsaacWiper, the third wiper spotted since the beginning of the Russian invasion
IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine.
March 1 – CISA and FBI warn of potential data wiping attacks spillover
US CISA and the FBI warned US organizations that data wiping attacks targeting Ukraine entities could spill over to targets worldwide.
March 1 – FoxBlade malware targeted Ukrainian networks hours before Russia’s invasion
Microsoft revealed that Ukrainian entities were targeted with a previous undetected malware, dubbed FoxBlade, several hours before the invasion.
February 28 – Anonymous hit Russian Nuclear Institute and leak stolen data
Anonymous and other hacker groups that responded to the call to war against Russia continue to launch cyberattacks on gov organizations and businesses.
February 28 – Researcher leaked Conti’s internal chat messages in response to its support to Russia
A Ukrainian researcher leaked tens of thousands of internal chat messages belonging to the Conti ransomware operation.
February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list
Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.
February 27 – Anonymous breached the internal network of Belarusian railways
The Anonymous hacker collective claims to have breached the Belarusian Railway’s data-processing network.
@cyberagents
Share ❤️
Twitter is launching a Tor service for more secure and private tweeting
Twitter is launching a version of its site as a Tor onion service, optimizing it for the privacy-protecting and censorship-evading network.
You are to download Tor browser. We can also opt for the Brave browser for all of this.
Using Twitter with one of these two programs (through an .onion address):
✅ Improves the authenticity and availability of internet portals.
✅ This movement guarantees us access to the correct site. At the same time, onion websites like this one avoid attacks made against them.
✅ We can bypass regional blockades we will have protection against DNS censorship or TLS man-in-the-middle attacks.
@geekcode
Twitter is launching a version of its site as a Tor onion service, optimizing it for the privacy-protecting and censorship-evading network.
You are to download Tor browser. We can also opt for the Brave browser for all of this.
Using Twitter with one of these two programs (through an .onion address):
✅ Improves the authenticity and availability of internet portals.
✅ This movement guarantees us access to the correct site. At the same time, onion websites like this one avoid attacks made against them.
✅ We can bypass regional blockades we will have protection against DNS censorship or TLS man-in-the-middle attacks.
@geekcode
tg-archive
tg-archive is a tool for exporting Telegram group chats into static websites, preserving chat history like mailing list archives.
https://github.com/knadh/tg-archive
@geekcode
tg-archive is a tool for exporting Telegram group chats into static websites, preserving chat history like mailing list archives.
https://github.com/knadh/tg-archive
@geekcode
GitHub
GitHub - knadh/tg-archive: A tool for exporting Telegram group chats into static websites like mailing list archives.
A tool for exporting Telegram group chats into static websites like mailing list archives. - knadh/tg-archive
Google Chrome and Mozilla Firefox upgrades to 100th versions soon could break many websites
Right around the corner, versions of Google Chrome, Microsoft Edge and Mozilla Firefox numbered 100 will be out shortly, the first three-digit number that could break some Web sites.
The move to version 100 in the coming weeks could lead to bugs and compatibility problems on some Web sites that aren't ready to read the three-digit User-Agent number. Google, Mozilla and Microsoft are trying to prevent negative consequences of any major problems.
Browser makers have been warning users for months about the upcoming version 100 release, coming in March for Chrome and Edge and May for Firefox. Google and Mozilla are actively testing websites and periodically report observed glitches. Fortunately, the list of problems is short right now. The most notable problems are with the HBO Go, Bethesda and Yahoo websites.
@geekcode
Right around the corner, versions of Google Chrome, Microsoft Edge and Mozilla Firefox numbered 100 will be out shortly, the first three-digit number that could break some Web sites.
The move to version 100 in the coming weeks could lead to bugs and compatibility problems on some Web sites that aren't ready to read the three-digit User-Agent number. Google, Mozilla and Microsoft are trying to prevent negative consequences of any major problems.
Browser makers have been warning users for months about the upcoming version 100 release, coming in March for Chrome and Edge and May for Firefox. Google and Mozilla are actively testing websites and periodically report observed glitches. Fortunately, the list of problems is short right now. The most notable problems are with the HBO Go, Bethesda and Yahoo websites.
@geekcode
Harmful malware detected on Google Play
A dangerous Android virus Xenomorph was found on Google Play, according to the official blog of ThreatFabric security company.
The malware hides in the Fast Cleaner app. It has already managed to infect over 50,000 devices.
Once on the victim's device, Xenomorph tries to get hold of important financial data, gain control over the victim's accounts and carry out unauthorized transactions. The malware's operators then sell all the information gathered to concerned parties.
@geekcode
A dangerous Android virus Xenomorph was found on Google Play, according to the official blog of ThreatFabric security company.
The malware hides in the Fast Cleaner app. It has already managed to infect over 50,000 devices.
Once on the victim's device, Xenomorph tries to get hold of important financial data, gain control over the victim's accounts and carry out unauthorized transactions. The malware's operators then sell all the information gathered to concerned parties.
@geekcode
Ethereum to Reach Trillion Dollar Marketcap This Bull Run
https://www.analyticsinsight.net/ethereum-to-reach-trillion-dollar-marketcap-this-bull-run/
join us ❤️ @geekcode
https://www.analyticsinsight.net/ethereum-to-reach-trillion-dollar-marketcap-this-bull-run/
join us ❤️ @geekcode
#webinar #BigData
Webinar name: Dynamic Talks #85 | Build and execute Snowflake pipelines with Snowpark in Scala
Date April 21
Time 7:00 pm (CEST)
URL - https://fb.me/e/nlI8Ranx5
REGISTER HERE - https://forms.gle/QgQ9JvZyHCobY1789
@geekcode
Webinar name: Dynamic Talks #85 | Build and execute Snowflake pipelines with Snowpark in Scala
Date April 21
Time 7:00 pm (CEST)
URL - https://fb.me/e/nlI8Ranx5
REGISTER HERE - https://forms.gle/QgQ9JvZyHCobY1789
@geekcode