Source - Securelist Head Mare is a hacktivist group that emerged in 2023 on the social network X (formerly Twitter), publicly revealing information about its victims, including stolen internal documents and screenshots. The group exclusively targets companies in...
Malware campaign using Google Sheets as a command-and-control mechanism
https://www.youtube.com/watch?v=I2WE6SOU2Bo Cybersecurity researchers discovered a novel malware campaign using Google Sheets as a command-and-control (C2) mechanism. Detected by Proofpoint starting August 5, 2024, the campaign impersonates tax authorities from...
Design for Event buffering using Amazon SQS FIFO
High-Level Architecture Overview: Users send Specific events. Events are first sent to an Amazon SQS FIFO queue. An AWS Lambda function evaluates each event based on timestamps stored in a DynamoDB table. The Lambda function decides whether to process or delay the...
Preparing for Quantum Threats with NIST’s Post-Quantum Cryptography Standards
NIST has released new post-quantum cryptography standards, signaling a shift for cybersecurity teams to prepare for quantum threats. Organizations must update cryptographic methods to protect data against future quantum attacks, which could crack current encryption....
What is Cybersecurity All About? A Detailed Overview
https://www.youtube.com/watch?v=KyI9dhYKs-M Cybersecurity involves protecting systems, networks, and programs from digital attacks aimed at accessing, altering, or destroying sensitive information, extorting money, or disrupting normal operations. Challenges: The...
Oracle NetSuite e-commerce sites are vulnerable to exposing sensitive customer information
Thousands of Oracle NetSuite e-commerce sites are vulnerable to exposing sensitive customer information due to misconfigured access controls. Platform Affected: NetSuiteās SuiteCommerce platform, where misconfigured Custom Record Types (CRTs) can lead to data leakage....
Latest Post:
Career paths for Security professionals
Security professionals can follow a wide range of career paths...
CISSP Study Plan and Cheat Sheet
Study Plan, (ISC)2 CISSP Certified Information Systems Security...
Hash Identifier
The Hash Identifier tool in Kali Linux is used to identify the type...