IT Engineer with UAE experience.
The ideal candidate will possess the following skills and knowledge:
Key Requirements:
Helpdesk experience
Network expertise (switching, Firewall)
Active Directory proficiency
MS Azure knowledge
Clouding knowledge
Candidates with a valid driving license will be given more preference.
if you meet the above criteria please send your updated resume with your notice period, expected salary, and subject as IT Engineer to HR@dxcontracting.ae
@Engineer_Computer
The ideal candidate will possess the following skills and knowledge:
Key Requirements:
Helpdesk experience
Network expertise (switching, Firewall)
Active Directory proficiency
MS Azure knowledge
Clouding knowledge
Candidates with a valid driving license will be given more preference.
if you meet the above criteria please send your updated resume with your notice period, expected salary, and subject as IT Engineer to HR@dxcontracting.ae
@Engineer_Computer
اکانت شما در گوگل ؛ قابل دسترسی است.
آسیب پذیری که فعلا راهکار فنی ندارد.
اما راهکار موقت را در لینک زیر بخوانید .
@Engineer_Computer
https://www-malwarebytes-com.cdn.ampproject.org/c/s/www.malwarebytes.com/blog/news/2024/01/info-stealers-can-steal-cookies-for-permanent-access-to-your-google-account/amp
آسیب پذیری که فعلا راهکار فنی ندارد.
اما راهکار موقت را در لینک زیر بخوانید .
@Engineer_Computer
https://www-malwarebytes-com.cdn.ampproject.org/c/s/www.malwarebytes.com/blog/news/2024/01/info-stealers-can-steal-cookies-for-permanent-access-to-your-google-account/amp
Malwarebytes
Info-stealers can steal cookies for permanent access to your Google account
Several info-stealers have incorporated an exploit that allows them to gain permanent access to your Google account
تحلیلی از سوء استفاده از سایتهای مجاز در حوزه ذخیره سازی برای گسترش بدافزارها
@Engineer_Computer
https://www.cybereason.com/blog/research/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware
@Engineer_Computer
https://www.cybereason.com/blog/research/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware
Cybereason
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Cybereason is following an active campaign to deliver multiple different types of malware to victims all over the world. This attack is able to steal data, mine for cryptocurrency, and in specific cases deliver ransomware.
کپی کردن کارتهای RFID
@Engineer_Computer
https://covertaccessteam.substack.com/p/rfid-sleight-of-hand-covert-cloning
@Engineer_Computer
https://covertaccessteam.substack.com/p/rfid-sleight-of-hand-covert-cloning
Substack
RFID Sleight of Hand: Covert Cloning Techniques
On linkedin the other day I posted a video showing how an RFID card could be cloned without having a reader (eg I-copy,flipper,etc) directly on the card or using a long range reader somewhere offscreen.
❤1
استفاده NSA از هوش مصنوعی برای کشف حملات پیچیده که با روشهای معمول قابل کشف نیستند
@Engineer_Computer
https://industrialcyber.co/critical-infrastructure/senior-us-cybersecurity-official-reveals-use-of-ai-to-counter-hackers-targeting-critical-infrastructure/
@Engineer_Computer
https://industrialcyber.co/critical-infrastructure/senior-us-cybersecurity-official-reveals-use-of-ai-to-counter-hackers-targeting-critical-infrastructure/
Industrial Cyber
Senior US cybersecurity official reveals use of AI to counter hackers targeting critical infrastructure
US cybersecurity official reveals the use of AI to counter hackers targeting critical infrastructure, as cyber expertise is in short supply.
👏1
I have published 'tRPC Security Research: Hunting for Vulnerabilities in Modern APIs'. In this write-up, I examine tRPC and discuss methods for conducting reconnaissance to identify and uncover vulnerabilities within this API style.
https://medium.com/@LogicalHunter/trpc-security-research-hunting-for-vulnerabilities-in-modern-apis-b0d38e06fa71
@Engineer_Computer
https://medium.com/@LogicalHunter/trpc-security-research-hunting-for-vulnerabilities-in-modern-apis-b0d38e06fa71
@Engineer_Computer
Medium
tRPC Security Research: Hunting for Vulnerabilities in Modern APIs
In this write-up, I want to discuss my research on tRPC. Initially, we will review the concepts of tRPC before proceeding to analyse the…
🔥1
اکانت شما در گوگل ؛ قابل دسترسی است.
آسیب پذیری که فعلا راهکار فنی ندارد.
اما راهکار موقت را در لینک زیر بخوانید .
@Engineer_Computer
https://www-malwarebytes-com.cdn.ampproject.org/c/s/www.malwarebytes.com/blog/news/2024/01/info-stealers-can-steal-cookies-for-permanent-access-to-your-google-account/amp
آسیب پذیری که فعلا راهکار فنی ندارد.
اما راهکار موقت را در لینک زیر بخوانید .
@Engineer_Computer
https://www-malwarebytes-com.cdn.ampproject.org/c/s/www.malwarebytes.com/blog/news/2024/01/info-stealers-can-steal-cookies-for-permanent-access-to-your-google-account/amp
Malwarebytes
Info-stealers can steal cookies for permanent access to your Google account
Several info-stealers have incorporated an exploit that allows them to gain permanent access to your Google account
❤1
تحلیلی از سوء استفاده از سایتهای مجاز در حوزه ذخیره سازی برای گسترش بدافزارها
@Engineer_Computer
https://www.cybereason.com/blog/research/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware
@Engineer_Computer
https://www.cybereason.com/blog/research/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware
Cybereason
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Cybereason is following an active campaign to deliver multiple different types of malware to victims all over the world. This attack is able to steal data, mine for cryptocurrency, and in specific cases deliver ransomware.
❤1
کپی کردن کارتهای RFID
@Engineer_Computer
https://covertaccessteam.substack.com/p/rfid-sleight-of-hand-covert-cloning
@Engineer_Computer
https://covertaccessteam.substack.com/p/rfid-sleight-of-hand-covert-cloning
Substack
RFID Sleight of Hand: Covert Cloning Techniques
On linkedin the other day I posted a video showing how an RFID card could be cloned without having a reader (eg I-copy,flipper,etc) directly on the card or using a long range reader somewhere offscreen.
❤1
استفاده NSA از هوش مصنوعی برای کشف حملات پیچیده که با روشهای معمول قابل کشف نیستند
@Engineer_Computer
https://industrialcyber.co/critical-infrastructure/senior-us-cybersecurity-official-reveals-use-of-ai-to-counter-hackers-targeting-critical-infrastructure/
@Engineer_Computer
https://industrialcyber.co/critical-infrastructure/senior-us-cybersecurity-official-reveals-use-of-ai-to-counter-hackers-targeting-critical-infrastructure/
Industrial Cyber
Senior US cybersecurity official reveals use of AI to counter hackers targeting critical infrastructure
US cybersecurity official reveals the use of AI to counter hackers targeting critical infrastructure, as cyber expertise is in short supply.
👍2
هشدار شرکت Juniper درخصوص کشف آسیب پذیری بحرانی محصولات این شرکت
🔴شرکت Juniper اقدام به ارائه بهروزرسانیهای امنیتی فوری و مهمی کرده است تا یک آسیبپذیری مهم اجرای کد از راه دور (RCE) را در فایروالهای سری SRX و سوئیچهای سری EX خود رفع کند.
🔴این آسیبپذیری که در رابطهای پیکربندی J-Web دستگاهها یافت شده و با شناسه CVE-2024-21591 شناخته میشود، درصورتیکه Exploit شود میتواند دسترسی Root را در اختیار هکرها قرار دهد.
🔴نسخه های آسیب پذیر عبارتند از:
🟡Junos OS versions earlier than 20.4R3-S9
🟡Junos OS 21.2 versions earlier than 21.2R3-S7
🟡Junos OS 21.3 versions earlier than 21.3R3-S5
🟡Junos OS 21.4 versions earlier than 21.4R3-S5
🟡Junos OS 22.1 versions earlier than 22.1R3-S4
🟡Junos OS 22.2 versions earlier than 22.2R3-S3
🟡Junos OS 22.3 versions earlier than 22.3R3-S2
🟡Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3
🟡The bug has been addressed in Junos OS 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.
🔴به Adminها توصیه شده که فورا نسبت به ارتقا به آخرین نسخه اقدام کرده و یا J-Web interface را غیرفعال کنند.
@Engineer_Computer
🔴شرکت Juniper اقدام به ارائه بهروزرسانیهای امنیتی فوری و مهمی کرده است تا یک آسیبپذیری مهم اجرای کد از راه دور (RCE) را در فایروالهای سری SRX و سوئیچهای سری EX خود رفع کند.
🔴این آسیبپذیری که در رابطهای پیکربندی J-Web دستگاهها یافت شده و با شناسه CVE-2024-21591 شناخته میشود، درصورتیکه Exploit شود میتواند دسترسی Root را در اختیار هکرها قرار دهد.
🔴نسخه های آسیب پذیر عبارتند از:
🟡Junos OS versions earlier than 20.4R3-S9
🟡Junos OS 21.2 versions earlier than 21.2R3-S7
🟡Junos OS 21.3 versions earlier than 21.3R3-S5
🟡Junos OS 21.4 versions earlier than 21.4R3-S5
🟡Junos OS 22.1 versions earlier than 22.1R3-S4
🟡Junos OS 22.2 versions earlier than 22.2R3-S3
🟡Junos OS 22.3 versions earlier than 22.3R3-S2
🟡Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3
🟡The bug has been addressed in Junos OS 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.
🔴به Adminها توصیه شده که فورا نسبت به ارتقا به آخرین نسخه اقدام کرده و یا J-Web interface را غیرفعال کنند.
@Engineer_Computer
Black Hat USA 2023 | Briefings Schedule
Link : https://www.blackhat.com/us-23/briefings/schedule/
@Engineer_Computer
Link : https://www.blackhat.com/us-23/briefings/schedule/
@Engineer_Computer
GTAG-1-IT-risk-controls-2nd-ed.pdf
3.5 MB
برای علاقمندان به ریسک و کنترل
@Engineer_Computer
@Engineer_Computer
استفاده از MSIX installers برای رساندن پی لود به قربانی رو به فزونی است
https://redcanary.com/blog/msix-installers/
@Engineer_Computer
https://redcanary.com/blog/msix-installers/
@Engineer_Computer
Red Canary
MSIX installer malware delivery on the rise - Red Canary
Red Canary has detected multiple distinct adversaries leveraging MSIX installers to deliver a variety of malware payloads in recent months.
در این کانال یوتیوب دنبال کنید:
تشخیص خفه کننده EDR با Wazuh
@Engineer_Computer
https://www.youtube.com/watch?v=8q01xDBffmE
تشخیص خفه کننده EDR با Wazuh
@Engineer_Computer
https://www.youtube.com/watch?v=8q01xDBffmE
YouTube
EDR Silencer Detection - Part 1 (Wazuh FIM)
Article : https://medium.com/@karkoubelwali/edr-silencer-detection-part-1-wazuh-fim-308cd2cf44c4
📍ویژگی های جدید در اسپلانک ۹.۱.۱
🔗https://community.splunk.com/t5/Splunk-Tech-Talks/New-Enhancements-with-Splunk-Enterprise-9-1/ba-p/648837
#splunk
@Engineer_Computer
🔗https://community.splunk.com/t5/Splunk-Tech-Talks/New-Enhancements-with-Splunk-Enterprise-9-1/ba-p/648837
#splunk
@Engineer_Computer
Splunk
New Enhancements with Splunk Enterprise 9.1
Our latest product innovations support integrated workflows and improved user experiences. This makes it easier for you to detect and predict issues, find root cause, assess risk and impact radius, and remediate — quickly, accurately, at scale. Learn how…
گزارش کیفیت اینترنت در ایران.pdf
5.5 MB
کیفیت اینترنت در ایران
گزارش تحلیلی اختلالها، محدودیتها و سرعت اینترنت در ایران
کاری از انجمن تجارت الکترونیک تهران
گزارش دوم
@Engineer_Computer
گزارش تحلیلی اختلالها، محدودیتها و سرعت اینترنت در ایران
کاری از انجمن تجارت الکترونیک تهران
گزارش دوم
@Engineer_Computer