Splunk Enterprise Troubleshooting Use Cases 1.pdf
1.8 MB
نکته ای کوچک اما مهم در عیب یابی اسپلانک
@Engineer_Computer
@Engineer_Computer
The Deep and Dark Web Guide.pdf
2.2 MB
کتاب راهنمای دیپ وب و دارک وب
@Engineer_Computer
@Engineer_Computer
OpenAI's ChatGPT Breaches Privacy Rules, Says Italian Watchdog
Italy was the first West European country to curb ChatGPT, whose rapid development has attracted attention from lawmakers and regulators.
Under the EU's General Data Protection Regulation (GDPR) introduced in 2018, any company found to have broken rules faces fines of up to 4% of its global turnover.
@Engineer_Computer
Italy was the first West European country to curb ChatGPT, whose rapid development has attracted attention from lawmakers and regulators.
Under the EU's General Data Protection Regulation (GDPR) introduced in 2018, any company found to have broken rules faces fines of up to 4% of its global turnover.
@Engineer_Computer
Reuters
OpenAI's ChatGPT breaches privacy rules, says Italian watchdog
Italy's data protection authority has told OpenAI that its artificial intelligence chatbot application ChatGPT breaches data protection rules, the watchdog said on Monday, as it presses ahead with an investigation started last year.
Southern Water Reports Major Data Breach Impacting Hundreds of Thousands
The incident has been reported to the U.K.’s Information Commissioner’s Office, as Southern Water continues to assess the breach’s impact and work on bolstering its cybersecurity measures to prevent future attacks.
@Engineer_Computer
The incident has been reported to the U.K.’s Information Commissioner’s Office, as Southern Water continues to assess the breach’s impact and work on bolstering its cybersecurity measures to prevent future attacks.
@Engineer_Computer
ReadWrite
Southern Water reports major data breach impacting hundreds of thousands
Southern Water has confirmed a significant data breach affecting up to 470,000 customers, with hackers accessing sensitive personal information.
Check Point Debuts AI Copilot to Streamline and Automate Cybersecurity Management
Karpati said the vendor plans to integrate AI copilot functions into many of its core products in the future.
“Ultimately, Infinity AI Copilot will allow access to cross-product information, address inquiries and execute actions seamlessly across multiple consoles.”
Currently, Check Point’s threat prevention blocks over 3 billion attacks each year with 50 AI engines and 2 billion security decisions made daily, he added, one key aspect of the AI implementations is the collaborative sharing of threat insights across the platform to prevent attacks effectively.
@Engineer_Computer
Karpati said the vendor plans to integrate AI copilot functions into many of its core products in the future.
“Ultimately, Infinity AI Copilot will allow access to cross-product information, address inquiries and execute actions seamlessly across multiple consoles.”
Currently, Check Point’s threat prevention blocks over 3 billion attacks each year with 50 AI engines and 2 billion security decisions made daily, he added, one key aspect of the AI implementations is the collaborative sharing of threat insights across the platform to prevent attacks effectively.
@Engineer_Computer
SDxCentral
Check Point debuts AI copilot to streamline and automate cybersecurity management
Check Point unveiled its generative artificial intelligence (genAI) powered security copilot tool, dubbed Infinity AI Copilot.
Microsoft Azure HDInsight Bugs Expose Big Data to Breaches
This new trio opens the door to performance issues and unauthorized administrative access, and all that comes with it: attackers reading, writing, deleting, and performing any other management operations over an organization's sensitive data.
@Engineer_Computer
This new trio opens the door to performance issues and unauthorized administrative access, and all that comes with it: attackers reading, writing, deleting, and performing any other management operations over an organization's sensitive data.
@Engineer_Computer
Dark Reading
Microsoft Azure HDInsight Bugs Expose Big Data to Breaches
Security holes in a big data tool can open the door to big data compromises.
نکاتی که باید در هانت رعایت کنید
https://medium.com/@chandrak.trivedi/threat-hunting-important-things-on-how-to-start-hunting-2b0f2efc90ac
@Engineer_Computer
https://medium.com/@chandrak.trivedi/threat-hunting-important-things-on-how-to-start-hunting-2b0f2efc90ac
@Engineer_Computer
Medium
Threat Hunting: Important things on how to start hunting?
Threat Hunting is one of the important part of cybersecurity to hunt manually for threats on the network to help reduced the dwell time and…
♨️ Active Directory Enumeration for Red Teams
🚩 https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
#RedTeam
#Enumeration
@Engineer_Computer
🚩 https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
#RedTeam
#Enumeration
@Engineer_Computer
MDSec
Active Directory Enumeration for Red Teams - MDSec
The Directory Service is the heart and soul of many organisations, and whether its Active Directory, OpenLDAP or something more exotic, as a source of much knowledge it often acts...
♨ ZTE F660 Routers Authentication Bypass Leading to RCE.
⭕ https://github.com/MaherAzzouzi/ZTE-F660-Exploit
🔰 This bug was already reported to ZTE.
#exploit
#POC
@Engineer_Computer
⭕ https://github.com/MaherAzzouzi/ZTE-F660-Exploit
🔰 This bug was already reported to ZTE.
#exploit
#POC
@Engineer_Computer
GitHub
GitHub - MaherAzzouzi/ZTE-F660-Exploit: ZTE F660 Routers Authentication Bypass Leading to RCE.
ZTE F660 Routers Authentication Bypass Leading to RCE. - MaherAzzouzi/ZTE-F660-Exploit
🛑 Unauthenticated Remote Code Execution – Bricks <= 1.9.6
🌐 https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6
💠 https://github.com/Chocapikk/CVE-2024-25600
🧩 Affected plugin Bricks Builder
🌀 Active installs
Commercial ~ 25000
♨ Vulnerable version <= 1.9.6
♨ Audited version 1.9.6
🔰 Fully patched version 1.9.6.1
⚠ Recommended remediation
Upgrade immediately to version to 1.9.6.1 or higher
#exploit
#POC
@Engineer_Computer
🌐 https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6
💠 https://github.com/Chocapikk/CVE-2024-25600
🧩 Affected plugin Bricks Builder
🌀 Active installs
Commercial ~ 25000
♨ Vulnerable version <= 1.9.6
♨ Audited version 1.9.6
🔰 Fully patched version 1.9.6.1
⚠ Recommended remediation
Upgrade immediately to version to 1.9.6.1 or higher
#exploit
#POC
@Engineer_Computer
snicco
Unauthenticated Remote Code Execution – Bricks <= 1.9.6 – snicco
Affected plugin Bricks Builder Active installs Commercial ~ 25000 Vulnerable version <= 1.9.6 Audited version 1.9.6 Fully patched version 1.9.6.1 Recommended
🔱 Golang scanner to find web cache poisoning vulnerabilities in a list of URLs and test multiple injection techniques.
🪩 https://github.com/xhzeem/toxicache
@Engineer_Computer
🪩 https://github.com/xhzeem/toxicache
@Engineer_Computer
GitHub
GitHub - xhzeem/toxicache: Go scanner to find web cache poisoning vulnerabilities in a list of URLs
Go scanner to find web cache poisoning vulnerabilities in a list of URLs - xhzeem/toxicache
🍥 muddy
یک کتابخانه مبهم کننده برای جلوگیری از شناسایی توسط ابزارهای ساده تجزیه و تحلیل باینری استاتیک مانند strings یا YARA Rules طراحی شده است که با رمزگذاری برنامه در زمان ساخت و رمزگشایی آن در زمان اجرا عمل می کند.
💠 https://github.com/orph3usLyre/muddy-waters
#RedTeam
#obfuscation
@Engineer_Computer
یک کتابخانه مبهم کننده برای جلوگیری از شناسایی توسط ابزارهای ساده تجزیه و تحلیل باینری استاتیک مانند strings یا YARA Rules طراحی شده است که با رمزگذاری برنامه در زمان ساخت و رمزگشایی آن در زمان اجرا عمل می کند.
💠 https://github.com/orph3usLyre/muddy-waters
#RedTeam
#obfuscation
@Engineer_Computer
GitHub
GitHub - orph3usLyre/muddy-waters: A literal string obfuscation library for rust projects
A literal string obfuscation library for rust projects - orph3usLyre/muddy-waters
بررسی windbg در حالت نت ورک
https://www.aparat.com/v/x2Yzv
بفرست برای باینری کارا😎
#windbg
#binary
#security
@Engineer_Computer
https://www.aparat.com/v/x2Yzv
بفرست برای باینری کارا😎
#windbg
#binary
#security
@Engineer_Computer
آپارات - سرویس اشتراک ویدیو
بررسی winDbg در حالت Network
windbg دیباگری است که توسط ماکروسافت تولید شده و در قالب بسته ای به نام Debugging Tools for Windows از سایت ماکروسافت قابل دریافت است.
توانایی Kernel Debugging یکی از مهمترین مهارتهایی است که در زمینههای مختلف مانند اکسپلویتنویسی، تحلیل بدافزار، مدیریت…
توانایی Kernel Debugging یکی از مهمترین مهارتهایی است که در زمینههای مختلف مانند اکسپلویتنویسی، تحلیل بدافزار، مدیریت…
بیش از 97 هزار میل سرور آسیب پذیر مایکروسافت در جهان و 1992 سرور آسیب پذیر در ایران، در حال حاظر هیچ پوک عمومی مشاهده نشده است. پیشنهاد میشود آپدیت که در پچ تیوزدی فبریه 2024 توسط مایکروسافت منتشر شده است را بر روی میل سرورهای خود اعمال کنید.
@Engineer_Computer
@Engineer_Computer
چه قابلِ ستایشند
ذهنهایی؛
که محاسبه می کنند
و دست هایی؛
که می آفرینند!
خداوند
“مهندسان” را آفرید؛
تا جهان؛
هر روز زیباتر شود!
روزتان مبارک مهندسین عزیز ❤️
5 اسفند روز بزرگداشت خواجه نصیرالدین طوسی
@Engineer_Computer
ذهنهایی؛
که محاسبه می کنند
و دست هایی؛
که می آفرینند!
خداوند
“مهندسان” را آفرید؛
تا جهان؛
هر روز زیباتر شود!
روزتان مبارک مهندسین عزیز ❤️
5 اسفند روز بزرگداشت خواجه نصیرالدین طوسی
@Engineer_Computer
❤10👎1