Tag: SMTP
Keypoints :
Nmap is used for network probing, service discovery, and operating system identification.…➡️ 𝐏𝐫𝐞-𝐫𝐞𝐪𝐮𝐢𝐬𝐢𝐭𝐞𝐬⭐ Introduction to Malware Analysis https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Introduction-to-Malware-Analysis.md⭐ Malware Analyst Guide 2024 https://youtu.be/tUsx0I0TK54➡️ 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬 𝐏𝐫𝐨𝐣𝐞𝐜𝐭𝐬⭐ Static Analysis of a Simple Malware Sample https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Project Static Analysis of a Simple Malware Sample.md⭐ Analyzing FTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%232-analyzing-ftp-logs-using-splunk-siem.md⭐ Analyzing HTTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%233-analyzing-http-logs-using-splunk-siem.md⭐…
Keypoints :
The box “Escape” is rated Medium and is the author’s first Active Directory machine.…Keypoints :
Ivanti disclosed two high-severity vulnerabilities (CVE-2025–0282, CVE-2025–0283) affecting its products.…Gmail For Exfiltration: Malicious npm Packages Target Solana Private Keys and Drain Victims’ Wallets
Summary: A newly discovered SSRF vulnerability in Invoice Ninja could allow attackers to read sensitive files from the host server, posing significant risks to users and organizations. This flaw, tracked as CVE-2024-53353, can be exploited through the platform’s PDF generation feature by both local and low-privileged users.…
Keypoints :
Kimsuky, also known as Black Banshee, has been active since 2013 and is state-sponsored by North Korea.…Keypoints :
Targeted businesses through deceptive email phishing campaigns.…Summary: Nova, a newly identified variant of the Snake Keylogger family, employs sophisticated techniques to steal sensitive information while avoiding detection. Its advanced capabilities pose significant challenges in the realm of cybersecurity, particularly in credential theft and data exfiltration.
Threat Actor: Unknown | Nova Victim: Individuals and organizations | individuals and organizations
Key Point :
Nova gathers detailed victim information through network behavior, including public IP and geographical location.…Summary: Microsoft has disclosed a critical vulnerability (CVE-2024-49040) in Exchange Server that allows attackers to spoof legitimate email senders, potentially enhancing the effectiveness of phishing attacks. Discovered by researcher Vsevolod Kokorin, the flaw affects Exchange Server 2016 and 2019, prompting Microsoft to implement detection and warning measures in recent updates.…
Summary:
HawkEye, also known as PredatorPain, is a long-standing malware primarily functioning as a keylogger but has evolved to include functionalities typical of stealers. Initially emerging in 2008, it gained notoriety through spearphishing campaigns and has been utilized by various threat actors. Its delivery methods have diversified over time, and it has shown resilience in adapting to new evasion techniques and maintaining persistence on infected systems.…