Tag: LEARN
Keypoints :
ESXi environments are often considered legacy and may lack effective maintenance and security controls.…Key Points :
University of Rwanda has experienced a significant data breach. The breach may involve sensitive personal information of students and faculty. Details regarding the extent of the breach and the data compromised are still emerging.…Threat Actor: Chinese and Russian state-sponsored cyber actors | Volt Typhoon Victim: U.S.…
Threat Actor: Salt Typhoon, Volt Typhoon | Salt Typhoon, Volt Typhoon Victim: U.S.…
Threat Actor: Black Basta | Black Basta Victim: Mortgage Investors Group | Mortgage Investors Group
Key Point :
Unauthorized access to MIG’s computer environment led to the exposure of sensitive personal information.…Threat Actor: Yellow Drift | Yellow Drift Victim: Roseltorg | Roseltorg
Key Point :
Roseltorg initially reported service outages due to maintenance before revealing a cyberattack.…Threat Actor: Cybercriminals | cybercriminals Victim: Organizations using SaaS | organizations using SaaS
Key Point :
Modern work heavily relies on SaaS, leading to rapid account creation and an expanded attack surface.…➡️ 𝐏𝐫𝐞-𝐫𝐞𝐪𝐮𝐢𝐬𝐢𝐭𝐞𝐬⭐ Introduction to Malware Analysis https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Introduction-to-Malware-Analysis.md⭐ Malware Analyst Guide 2024 https://youtu.be/tUsx0I0TK54➡️ 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬 𝐏𝐫𝐨𝐣𝐞𝐜𝐭𝐬⭐ Static Analysis of a Simple Malware Sample https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Project Static Analysis of a Simple Malware Sample.md⭐ Analyzing FTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%232-analyzing-ftp-logs-using-splunk-siem.md⭐ Analyzing HTTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%233-analyzing-http-logs-using-splunk-siem.md⭐…
Threat Actor: N/A | CISA Victim: N/A | critical infrastructure sectors
Key Point :
CISA’s CPGs are voluntary practices aimed at enhancing cybersecurity for critical infrastructure.…Keypoints :
Critical vulnerability allows full remote control of CentOS systems.…