The report delves into FireScam, a sophisticated Android malware disguised as a Telegram Premium app, highlighting its distribution methods, operational features, and implications for user security. The findings underscore the urgent need for enhanced cybersecurity measures to combat such threats. #FireScam #AndroidMalware #Cybersecurity

Keypoints :

FireScam is an information-stealing malware with spyware capabilities.…
Read More

Victim: asjp.cerist.dz Country : DZ Actor: funksec Source: http://7ixfdvqb4eaju5lzj4gg76kwlrxg4ugqpuog5oqkkmgfyn33h527oyyd.onion/Breach62.html Discovered: 2024-12-28 11:37:54.568393 Published: 2024-12-28 11:37:52.958393

Description : [AI generated] The website “asjp.cerist.dz” is associated with the Algerian Scientific Journal Platform (ASJP), a digital platform managed by CERIST (Centre de Recherche sur l’Information Scientifique et Technique). It serves as a repository for Algerian academic and scientific journals, facilitating access to scholarly articles across various disciplines.…

Read More

Discover the essentials of cybersecurity in an increasingly connected world. Explore foundational principles, key practices, and expert guidance on topics like adversarial exposure validation, cyber threats, data protection, exposure management and more. Your journey to a secure digital presence starts here with Cybersecurity 101.

https://www.picussecurity.com/resource/glossary A Advanced Persistent Threat (APT) Adversarial Exposure Validation Tools Adversary Emulation Attack Path Validation (APV) Attack Path Visualization Attack Simulation Attack Surface Attack Surface Management Automated Penetration Testing Automated Red Teaming Automated Security Control Assessment (ASCA) B BAS Assessment BAS Tools Blue Teaming Breach and Attack Simulation (BAS) C Cloud Security Posture Management (CSPM) Common Vulnerability Scoring System (CVSS) Common Vulnerabilities and Exposures (CVE) Continuous Security Validation Continuous Threat Exposure Management (CTEM) Cyber Asset Attack Surface Management (CAASM) Cyber Threat Intelligence (CTI) D Data Leakage Detection Rule Validation (DRV) E Exposure Assessment Exposure Management External Attack Surface Management (EASM) L Lateral Movement M MITRE ATT&CK MITRE D3FEND Matrix P Penetration Testing Purple Team Pyramid of Pain R Ransomware Red Team Red Team Tools Risk Posture S Security Automation Security Control Effectiveness Security Control Rationalization Security Control Validation (SCV) Security Controls Security Posture Security Posture Assessment Sigma Rule V Vulnerability Prioritization Vulnerability Management Lifecycle W White Hat Hacker Y YARA Rule…
Read More

Bounty Webinar Summary

Short Summary

The video discusses the capabilities of HackerOne’s bug bounty platform, emphasizing its role in enhancing cybersecurity through the collaboration of organizations with a global community of ethical hackers. Chris Campbell, a lead solution engineer, provides insights into the setup, management, and benefits of bug bounty programs, highlighting the processes involved in vulnerability reporting and triaging.…

Read More

This article discusses the detection and exploitation of a second-order SQL injection vulnerability using Out-of-Band techniques. It highlights the process of identifying the vulnerability, leveraging DNS requests for data exfiltration, and the challenges faced during the exploitation phase. The insights provided aim to enhance understanding of SQL injection vulnerabilities and their implications for application security.…
Read More

Credential-based attacks pose significant risks to organizations, leveraging weak credentials for unauthorized access. Picus Attack Path Validation (APV) helps identify and mitigate these vulnerabilities through automated penetration testing and credential harvesting simulations. #CyberSecurity #CredentialAttacks #PenetrationTesting

Keypoints :

Credential-based attacks exploit weak or misconfigured credentials for unauthorized access.…
Read More

Summary :

2024 was marked by significant cyber threats, including the emergence of LLMjacking, automated attacks, and the abuse of open source tools. As we move into 2025, organizations must adapt their cybersecurity strategies to address these evolving risks. #CyberSecurity #LLMjacking #ThreatTrends

Keypoints :

LLMjacking emerged as a significant threat, costing organizations over $100,000 daily.…
Read More

Victim: Archetype Group Country : VN Actor: hunters Source: https://hunters55rdxciehoqzwv7vgyv6nt37tbwax2reroyzxhou7my5ejyid.onion/companies/7490154364 Discovered: 2024-12-18 20:13:35.207846 Published: 2024-12-18 12:06:23.000000

Description : Country : Viet Nam – Exfiltraded data : yes – Encrypted data : yes

Ransomware Victims – ALL Other Victims by hunters

Ransomware Landscape in Vietnam

Ransomware Landscape in Vietnam Victim: Archetype Group Archetype Group is a prominent entity in Vietnam, often targeted due to its significant data assets.…
Read More

Whether you’re a beginner or looking to transition into cybersecurity, Ethical Hacking Simplified is your roadmap to understanding penetration testing and securing digital infrastructures.📖 What You’ll Learn:

Hacking Basics: Different hacker types (White Hat, Black Hat, Grey Hat) and their motivations. Penetration Testing Lifecycle: Reconnaissance: Gather intelligence without breaking into systems.…
Read More

Pentest Report Summary

Short Summary

The video discusses the importance of creating professional penetration testing (pentest) reports that can effectively communicate findings to both executives and technical teams. It emphasizes that merely identifying vulnerabilities is not enough; the real challenge lies in making these reports actionable and understandable for all stakeholders involved.…

Read More

AWS Resource Control Policy Summary

Short Summary

The video discusses the importance of AWS Resource Control Policies (RCP) in enhancing security by allowing AWS member accounts to restrict access to their resources, particularly against external principals who may pose a security risk.

Key Points AWS Resource Control Policies allow user-defined restrictions on resources to block external access, thereby enhancing security.…
Read More

Video Summary

Short Summary

The video discusses recent cybercrime trends, including how platforms like Spotify are exploited by criminals to distribute malware disguised as legitimate content, the case of a hacker attempting to market his penetration testing services through unauthorized access, and police efforts in Thailand to disrupt a gang using fake cellular networks for mass SMS scams.…

Read More

### #IndustrialIoT #AccessPointExploits #RemoteCodeExecution

Summary: A series of critical vulnerabilities in Advantech EKI industrial-grade wireless access points could allow attackers to execute remote code with elevated privileges, posing severe risks to device security. These flaws could enable unauthorized access and control over affected devices, leading to potential network infiltration.…

Read More