Forwarded from Bug Bounty (Amir Kiani)
Most Important Cyber Attack Techniques that often used by Hackers
https://gbhackers.com/cyber-attack-technique/
https://gbhackers.com/cyber-attack-technique/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Most Important Cyber Attack Techniques
The cyber attack occurs on a daily basis, and these can range from attacks on tech giants to individuals falling foul many scams.
Industrial management systems (ICS/SCADA) are now the prime target for cyber attackers seeking to compromise the production base and public utilities. Kaspersky labs released Threat Landscape for H1 2018, according to the report the attacks increased by 41% percentage targeting ICS computers attacked when compared to H1 and H2 of 2017. The main sources of […]
The post Cyber Threat Landscape – Report on Attacks Targeted ICS Systems in the First Half of 2018 (https://gbhackers.com/ics-systems-attacks/) appeared first on GBHackers On Security (https://gbhackers.com/).
The post Cyber Threat Landscape – Report on Attacks Targeted ICS Systems in the First Half of 2018 (https://gbhackers.com/ics-systems-attacks/) appeared first on GBHackers On Security (https://gbhackers.com/).
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Cyber Threat Landscape - Report on Attacks Targeted ICS Systems in the First Half of 2018
ICS Systems are now the prime target for cyber attackers seeking to compromise the production base and public utilities and the attacks increased by 41%
Disect Android APKs like a Pro - Static code analysis (FakeBank.apk)
http://blog.dornea.nu/2014/07/07/disect-android-apks-like-a-pro-static-code-analysis/
http://blog.dornea.nu/2014/07/07/disect-android-apks-like-a-pro-static-code-analysis/
McAfee Labs Endpoint Exploit Prevention team is looking for self-motivated & passionate security researcher!! 😒
Required Skills:
* In-depth understanding of OS internals. (primarily Windows. Experience with Linux Internals is plus)
* Experience with C/C++ and Windows API, API Hooking Techniques.
* Very Strong reverse engineering and debugging skills.
* Experience with vulnerability research and malware analysis. Good understanding of different vulnerabilities like Buffer Overflow, Integer Overflow, Dangling Pointers, different exploitation techniques & different mitigation bypass techniques etc.
* Understanding of x86-x64 Assembly.
* Experience with IDA or equivalent disassembly tools.
* Experience with OllyDbg and WinDbg; or equivalent debuggers.
* Experience with MITRE ATTACK Framework.
* Development experience in noscripting languages such as Python, perl, etc is plus.
* Candidate must have good verbal and written communication skills.
for more info:
https://www.linkedin.com/feed/update/urn:li:activity:6446055276524212224
Required Skills:
* In-depth understanding of OS internals. (primarily Windows. Experience with Linux Internals is plus)
* Experience with C/C++ and Windows API, API Hooking Techniques.
* Very Strong reverse engineering and debugging skills.
* Experience with vulnerability research and malware analysis. Good understanding of different vulnerabilities like Buffer Overflow, Integer Overflow, Dangling Pointers, different exploitation techniques & different mitigation bypass techniques etc.
* Understanding of x86-x64 Assembly.
* Experience with IDA or equivalent disassembly tools.
* Experience with OllyDbg and WinDbg; or equivalent debuggers.
* Experience with MITRE ATTACK Framework.
* Development experience in noscripting languages such as Python, perl, etc is plus.
* Candidate must have good verbal and written communication skills.
for more info:
https://www.linkedin.com/feed/update/urn:li:activity:6446055276524212224
Linkedin
DEBASISH MANDAL on LinkedIn: "McAfee Labs Endpoint Exploit Prevention team is looking for self-motivated & passionate security…
September 13, 2018: DEBASISH MANDAL posted on LinkedIn
Breaking The Facebook For Android Application
https://ash-king.co.uk/facebook-bug-bounty-09-18.html
https://ash-king.co.uk/facebook-bug-bounty-09-18.html
ash-king.co.uk
Breaking The Facebook For Android Application
Ash King - Turning featues into security issues
Fallout Exploit Kit Pushing the SAVEfiles Ransomware
https://www.bleepingcomputer.com/news/security/fallout-exploit-kit-pushing-the-savefiles-ransomware/
Last week the Fallout Exploit kit was distributing the GandCrab ransomware. This week, it has started to distribute a new ransomware called SAVEfiles, for lack of a better name, through malvertising campaigns. [...]
https://www.bleepingcomputer.com/news/security/fallout-exploit-kit-pushing-the-savefiles-ransomware/
Last week the Fallout Exploit kit was distributing the GandCrab ransomware. This week, it has started to distribute a new ransomware called SAVEfiles, for lack of a better name, through malvertising campaigns. [...]
BleepingComputer
Fallout Exploit Kit Pushing the SAVEfiles Ransomware
Last week the Fallout Exploit kit was distributing the GandCrab ransomware. This week, it has started to distribute a new ransomware called SAVEfiles, for lack of a better name, through malvertising campaigns.
EternalBlue Infections Persist
https://www.darkreading.com/analytics/eternalblue-infections-persist/d/d-id/1332820?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.
https://www.darkreading.com/analytics/eternalblue-infections-persist/d/d-id/1332820?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.
Dark Reading
EternalBlue Infections Persist
Indonesia, Taiwan, Vietnam, Thailand, Egypt, Russia, China, among the top 10 nations with the most machines infected with the exploit.
A Russian man who operates Kelihos Botnet Pleads in U.S. Federal Court to Fraud, Conspiracy, Computer Crime and Identity Theft Offenses. Peter Levashov operated the botnet for decades to facilitate the malicious activities such as credentials harvesting, bulk spam e-mails, Delivering ransomware and other malware’s. U.S. Attorney Durham said, “Mr. Levashov used the Kelihos botnet […]
The post Russian Hacker Who Operated Kelihos Botnet Pleads Guilty in US Federal Court (https://gbhackers.com/russian-hacker-kelihos-botnet/) appeared first on GBHackers On Security (https://gbhackers.com/).
The post Russian Hacker Who Operated Kelihos Botnet Pleads Guilty in US Federal Court (https://gbhackers.com/russian-hacker-kelihos-botnet/) appeared first on GBHackers On Security (https://gbhackers.com/).
GBHackers - Latest Cyber Security News | Hacker News
Russian Hacker Who Operated Kelihos Botnet Pleads Guilty in US Federal Court
A Russian man who operates Kelihos Botnet Pleads in U.S. Federal Court to Fraud, Conspiracy, Computer Crime and Identity Theft Offenses.
2 Billion Bluetooth Devices are Still Vulnerable to Dangerous BlueBorne Attack After 1 Year
https://gbhackers.com/blueborne-attack/
https://gbhackers.com/blueborne-attack/
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
2B Bluetooth Devices are Still Vulnerable to BlueBorne Attack After 1 Year
A recent report revealed that more than 2 Billion Bluetooth Devices are still vulnerable to BlueBorne Attack even after 1 year later