Are Virtual Machines the New Gold for Cyber Criminals? https://www.mcafee.com/blogs/other-blogs/mcafee-labs/are-virtual-machines-the-new-gold-for-cyber-criminals/
McAfee Blog
Are Virtual Machines the New Gold for Cyber Criminals? | McAfee Blog
Introduction Virtualization technology has been an IT cornerstone for organization for years now. It revolutionized the way organizations can scale up IT
The Cyber Swiss Army Knife.
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, creating binary and hexdumps, compression and decompression of data, calculating hashes and checksums, IPv6 and X.509 parsing, changing character encodings, and much more.
The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years.
https://github.com/gchq/CyberChef
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, creating binary and hexdumps, compression and decompression of data, calculating hashes and checksums, IPv6 and X.509 parsing, changing character encodings, and much more.
The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years.
https://github.com/gchq/CyberChef
GitHub
GitHub - gchq/CyberChef: The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis - gchq/CyberChef
Microsoft SharePoint Server Remote Code Execution Vulnerability
In a network-based attack, an authenticated attacker can gain access to create a site and could execute code remotely within the Sharepoint Server.
Security updates:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474
In a network-based attack, an authenticated attacker can gain access to create a site and could execute code remotely within the Sharepoint Server.
Security updates:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474
Automation in Reverse Engineering: String Decryption https://synthesis.to/2021/06/30/automating_string_decryption.html
A good historic background of Pegasus, a weapon system by NSO Group and role of Israel 🇮🇱 (government) in supporting the cyber espionage and specifics to India 🇮🇳
Israeli government is trying to evade sanctioning NSO and similar companies under international pressure. Lobbying is not working for Israel. Public is aware and only thing in Israels favour is to stay quiet till the heat dies out.
https://youtu.be/0OWw8IEj9oQ
Israeli government is trying to evade sanctioning NSO and similar companies under international pressure. Lobbying is not working for Israel. Public is aware and only thing in Israels favour is to stay quiet till the heat dies out.
https://youtu.be/0OWw8IEj9oQ