In the Team UCC’s telegram channel monitored by SOCRadar, the cyber attack announcement is detected for University of Prof.Dr. Moestopo.
Prof. University Dr. Moestopo (FACULTY OF COMMUNICATION) Official Website Of …
In the Team UCC’s telegram channel monitored by SOCRadar, the cyber attack announcement is detected for University of Prof.Dr. Moestopo.
Prof. University Dr. Moestopo (FACULTY OF COMMUNICATION) Official Website Of …
One of the primary propagation methods for Darkgate is phishing emails. By hijacking email accounts, distributing malicious attachment and it propagate itself to a wider network of potential victims. Darkgate …
In the Team UCC’s telegram channel monitored by SOCRadar, the DDoS attack announcement is detected for Bank of India Indonesia.
Bank of Indonesia Taken Down By Team UCC
✅ Site …
In a hacker forum monitored by SOCRadar, an unauthorized VPN access sale is detected allegedly belongs to an industry enterprise that operates in Indonesia.
Price 6000 Contacts Tox: *** Country:…In a hacker forum monitored by SOCRadar, a new alleged database leak is detected for Klinik Basmallah (Indonesia).
Free dumps klinik-basmallah.com-7z-181.7 mb Date: 05/12/24 File: **** Additional channel: *** ****…In a hacker forum monitored by SOCRadar, a new alleged database leak is detected for Hak Asasi Manusia.
"1****************** PRESIDEN RE******************TENTANG AKSI ******************NULL,NULL,NULL,"1"******************"24","INPRES",NULL,NUL******************",,NULL,"1",,******************","2020-04-07******************"3******************ATAN) MODUL ******************APARAT PENEGA******************KSAAN",NULL,,"-",N******************","1",NULL,"-",NULL,,"******************ULL,"-","-","******************,"1","2019-06******************:36:47"Nature of Dark Web …
In a hacker forum monitored by SOCRadar, a new alleged database leak is detected for Indonesian hotel guests.
Leak Date: 12/05/2024 Lines: 4.7kk EXAMPLE INSERT INTO `ghest_member` (`id`, `guest_id`, `reg_date`,…The purpose of the Defense Doctrine is to present to the Israeli economy an orderly professional method for managing cyber risks in the organization. Using the method presented in this document, the …
In a hacker forum monitored by SOCRadar, a new alleged pasiens data leak is detected for Indonesian citizens.
Leak Date: 06/05/2024Lines: 100k+EXAMPLE
INSERT INTO `pasiens` (`id`, `merchant_id`, `name`, `no_surat`, `nomor_identitas`,…The TXT files often contain sensitive information like passwords, configuration details, or system logs, due to which it attracts hackers.
Even TEXT files are commonly used for storing plaintext data, …
In a hacker forum monitored by SOCRadar, a new alleged database leak is detected for BPK RI.
BPK.go.idIn April 2024, more than 700K+ rows of data from the store company …
In a concerning development for cybersecurity, over 150 SSH accounts with root access are currently being advertised for sale on various hacker forums.
These accounts reportedly provide unrestricted administrative access …
CyberGordon quickly provides you threat and risk information about observables like IP address or web domain. This great tool is created by Marc-Henry Geay (contact page).
30+ fast engines …
This cyber security advisory is intended for IT professionals and managers within government and all sectors.
Effective DateThis publication takes effect on April 24, 2024
Revision History First…A few weeks ago a critical vulnerability was discovered in the plugin WP‑Automatic. This vulnerability, a SQL injection (SQLi) flaw, poses a severe threat as attackers can exploit it to …
A sophisticated cyberattack campaign leveraging Agent Tesla and Taskun malware has been actively targeting the education and government sectors in the U.S. This blog post delves into the intricacies of …
Microarchitectural side-channel attacks misuse shared processor state to transmit information between security domains.
Although they can be used in isolation, they are frequently employed as building blocks for more sophisticated …
This video provides an in-depth analysis of how a seemingly innocuous file on a Windows desktop can be used to steal passwords by exploiting the properties of Shell Command Files …
In this educational summary, we explore the integration of Discord into the Mythic C2 (Command and Control) framework, highlighting its utility in cybersecurity and communication manipulation. The video provides a …
FortiGuard Outbreak Alerts provides key information about on-going cybersecurity attack with significant ramifications affecting numerous companies, organizations and industries.
Threat EncyclopediaBrowse the Fortiguard …
In the previous article https://8ksec.io/dissecting-windows-malware-series-process-injections-part-2/, we introduced the mechanism of Process Injection that malware use to achieve Stealth and Evasion. We saw direct implementation of:
Process Injection Process HollowingAnd the use of other …
Key Points
Escalated tensions between Iran and Israel could give rise to cyber threats. Several advanced persistent threat (APT) groups are involved on both sides: APT34, APT35, and CyberAv3ngers in…A collective awesome list of public (JSON) APIs for use in security.The list is supported by https://alexanderjaeger.deLearn about REST: https://github.com/marmelab/awesome-rest
Sample API used by hendryadrian.com https://www.hendryadrian.com/ransom/all.php
APIDescriptionAuthHTTPSLinkFree / CommercialAlexaAlexa Top…Over the past quarter, the Cado team has been hard at work bringing new features and enhancements to the Cado platform. Here’s an overview of what we’ve been up to:…
Microsoft Threat Intelligence is publishing results of our longstanding investigation into activity by the Russian-based threat actor Forest Blizzard (STRONTIUM) using a custom tool to elevate privileges and steal credentials …
In the previous article https://8ksec.io/dissecting-windows-malware-series-beginner-to-advanced-part-1/, we introduced the components of Malware Analysis: Basic Static, Advanced Static, Basic Dynamic, Advanced Dynamic – then, we delved into the analysis of a malware sample that was presented.
The analysis …
Robot Name : Warehouse Drone Robot Capability : Automated inventory tracking and management Robot Category : Drones/UAVs Key Point :
Drones are used for automated inventory tracking and management in…The cloud presents opportunities for agility and scalability, but its shared responsibility model exposes organizations to new security challenges. In the face of …
McLean, Va., April 19, 2024 – MITRE today disclosed that despite its fervent commitment to safeguarding its digital assets, it experienced a breach that underscores the nature of modern cyber threats. After detecting …
Passbolt, an Open Source Password Manager, is using the Pwned Passwords service from HaveIBeenPwned to alert users if their password is present in a previous data breach. Pwned Passwords API …
Infostealers are one of the most lucrative types of malware employed by criminals. And because this is a tried and tested approach, there are still new players entering this illegal …
Curated list of bookmarks that are usefulf or OSINT activities. They are broken down into appropriate categories such as:
Search Engines Services Lists Leak Sites (to monitor if yours or…Robot Name : Vecna AMR at Geodis Robot Capability : Autonomous mobile robots (AMRs), self-driving forklifts, pallet jacks and trucks, tuggers Robot Category : Warehouse automation Key Point :
“Robot…Robot Name : Stationary Robotics In The Warehouse Robot Capability : Supporting and promoting the utilization of stationary robots in the dynamic world of warehousing Robot Category : Industrial Robot …
Robot Name : PUDU T300 Robot Capability : VSLAM+ navigation, Internet of Things (loT), multimodal interaction, efficient charging, safety compliance Robot Category : Industrial robot Key Point :
VSLAM+ navigation:…Curated bookmark list categorized by area and event monitoring, person of interest search, corporate profiling, mapping, AI, intelligence analysis, reporting tools, collective tools, cryptocurrency, country specific, verification and fact-checking.
They …
The video demonstrates a potent method to compromise Windows computers using a relay attack via the WebClient service and the WebDAV protocol. Here are the main points:
🔑 Vulnerability Exploitation:…How to use:
Enter the username(s) in the search box, select any category filters & click the search icon or press CTRL+Enter Results will present as icons on the…This video presents an enlightening discussion on the advancements in AI-driven cyber defense technologies, specifically focusing on a groundbreaking product introduced by Cisco called “Cisco HyperShield.” Here are the critical …
Privileged Access Management (PAM) is a critical aspect of information security that focuses on controlling, managing, and monitoring the access and activities of privileged users within an IT environment. Privileged …
Email Security Appliances (ESAs) are hardware or software solutions designed to protect an organization’s email system from a wide range of email-based threats. These appliances play a crucial role in …
“There are too many firewall features available today; I am using Cisco ASA as an example for this firewall topic.” Cisco ASA is a versatile network security device that combines …
As the digital landscape continues to evolve, the United States finds itself at the forefront of emerging cybersecurity challenges. With its critical infrastructure, extensive government networks, and vibrant economy, the …
This video provides a thorough tutorial on using Process Monitor (ProcMon) to identify and analyze malicious activities in system processes. Here are the main points covered in the session:
🔍…The video provides an in-depth look at how to effectively use VirusTotal for triaging files, a crucial step for malware analysts in identifying and analyzing potential threats. The presenter, an …
Hacklido.com is a cybersecurity community platform focused on various aspects of ethical hacking, security research, and cybersecurity knowledge sharing. The website hosts a range of content including blogs on topics …
Telegram’s Windows application was recently updated to address a critical zero-day flaw that permitted the execution of Python scripts without triggering security alerts, due to a typo in processing certain …
General Information
The Government Computer Emergency Response Team of Ukraine CERT-UA received information about an attempt to attack a computer of a representative of the Defense Forces of Ukraine with …
General Information
In March 2024, the government computer emergency response team of Ukraine CERT-UA revealed a malicious plan of the Sandworm group, aimed at disrupting the stable functioning of the …
General Information
The government computer emergency response team of Ukraine CERT-UA takes organizational and technical measures to prevent, detect and respond to cyber incidents and cyber attacks.
Therefore, during 2024, …