Network Security Channel – Telegram
Network Security Channel
2.55K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
Fast Detection , Fast Respond

PSIRT Advisories
FortiOS - Plain-text credentials in GET request via SSL VPN web portal

Summary
A use of GET request method with sensitive query strings vulnerability [CWE-598] in the FortiOS SSL VPN component may allow an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services (found in logs, referers, caches, etc...)

Affected Products FortiOS version 7.4.0
FortiOS version 7.2.0 through 7.2.5
FortiOS version 7.0.0 through 7.0.12

Solutions
Please upgrade to FortiOS version 7.4.1 or above
Please upgrade to FortiOS version 7.2.6 or above
Please upgrade to upcoming FortiOS version 7.0.13 or above

Timeline
2023-09-29: Initial publication

https://www.fortiguard.com/psirt/FG-IR-23-120

@Engineer_Computer
Cisco_Secure_Firewall_Hardening_Guide.pdf
297.7 KB
Hardening
‎( امن سازي و مقاوم سازي)
Cisco Secure Firewall Management Center Hardening Guide Ver. 7.2 2023

Cisco Hardening Guides:
https://www.cisco.com/c/en/us/support/security/defense-center/products-installation-and-configuration-guides-list.html

@Engineer_Computer
Design_Deploy_Secure_Azure.pdf
5.8 MB
Tech book
Cloud Security
Design and Deploy a Secure Azure: Environment Mapping the NIST Cybersecurity Framework to Azure Services 2023.
@Engineer_Computer
iam_sec.pdf
17.5 MB
hardening
Tech book
Cloud Security
AWS Identity and Access Management User Guide 2023.
@Engineer_Computer
یکی از بهترین مخازن کانتنت های اسپلانک
رایگان


This project gives you access to our repository of Analytic Stories, security guides that provide background on tactics, techniques and procedures (TTPs), mapped to the MITRE ATT&CK Framework, the Lockheed Martin Cyber Kill Chain, and CIS Controls. They include Splunk searches, machine learning algorithms and Splunk Phantom playbooks (where available)—all designed to work together to detect, investigate, and respond to threats


https://github.com/splunk/security_content

@Engineer_Computer
این روزها که هم کاربران برای به روزرسانی مرورگرهایشان آموزش دیده اند و هم مرورگرهایی چون کروم هفته ای یکبار به روزرسانی می‌دهد لذا به روزرسانی امری متداول شده است ؛ هکرها تلاش دارند از طریق به روزرسانی های قلابی ، بدافزار را به قربانی برسانند .

در لینک زیر نحوه عمل ۴ گروه هکری برای توزیع بدافزار به قربانیان را می‌خوانیم

https://www.tomsguide.com/news/fake-chrome-updates-infecting-pcs-with-malware-what-you-need-to-know

@Engineer_Computer
👍3
مدیریت ریسک سایبری در انگلیس

آخرین نسخه

** بخش مرتبط با نظرات و باورها( ی غلط) در خصوص روش کمی در آنالیز ریسک جالب است


Quantifying risk allows you to be explicit about how much uncertainty you have in your analysis, by allowing you to represent the likelihood or impact of a risk occurring as a ‘distribution’ rather than a single value.

https://www.ncsc.gov.uk/collection/risk-management

@Engineer_Computer
🎉2