۲۸ مارس وبیناری از نحوه استفاده شرکتهای ثالث از زیرساخت آرک سایت برای تولید محصولاتی که کشف تهدیدات را انجام میدهند.
ثبت نام :
https://goo.gl/ghBX3e
@roozbeh_learning 👈🏼
ثبت نام :
https://goo.gl/ghBX3e
@roozbeh_learning 👈🏼
سرویس دفاعی گوگل برای حفاظت در مقابل app های غیر مجاز و اطلاع رسانی به گوگل در مورد app های مشکوک
@roozbeh_learning 👈🏼
@roozbeh_learning 👈🏼
گزینه های سرویس دفاعی گوگل برای حفاظت در مقابل app های غیر مجاز و اطلاع رسانی به گوگل در مورد app های مشکوک .
در بخش Security گوگل در گوشی اندرویید ببینید
@roozbeh_learning 👈🏼
در بخش Security گوگل در گوشی اندرویید ببینید
@roozbeh_learning 👈🏼
آکادمی آموزش روزبه 📚
گزینه های سرویس دفاعی گوگل برای حفاظت در مقابل app های غیر مجاز و اطلاع رسانی به گوگل در مورد app های مشکوک . در بخش Security گوگل در گوشی اندرویید ببینید @roozbeh_learning 👈🏼
توضیح : در نوار جستجوی گوشی خود ، کلمه گوگل را جستجو کرده ، بعد به بخش امنیت بروید آنگاه
Google Play Protect
را خواهید دید .
@roozbeh_learning 👈🏼
Google Play Protect
را خواهید دید .
@roozbeh_learning 👈🏼
at-a-glance-c45-739010.pdf
100.5 KB
مستند آشنایی با مدیریت متمرکز و خودکار شبکه های مبتنی بر فناوری سیسکو
Cisco DNA Center
@roozbeh_learning 👈🏼
Cisco DNA Center
@roozbeh_learning 👈🏼
به روزرسانی مهم برای کرنل لینوکس
@roozbeh_learning 👈🏼
https://vulners.com/suse/OPENSUSE-SU-2018:0781-1?utm_source=hs_email&utm_medium=email&utm_content=61583731&_hsenc=p2ANqtz-950cTRmtDtWS6on2ccGQMbzbtiPr414TwxW5-rBapQYdamrhfy34AH0zgpYu2HU_rVLGYGXGoMbAr5CzjV0jggl1IQlQ&_hsmi=61583731
@roozbeh_learning 👈🏼
https://vulners.com/suse/OPENSUSE-SU-2018:0781-1?utm_source=hs_email&utm_medium=email&utm_content=61583731&_hsenc=p2ANqtz-950cTRmtDtWS6on2ccGQMbzbtiPr414TwxW5-rBapQYdamrhfy34AH0zgpYu2HU_rVLGYGXGoMbAr5CzjV0jggl1IQlQ&_hsmi=61583731
Vulners Database
Security update for the Linux Kernel (important)
The openSUSE Leap 42.3 kernel was updated to 4.4.120 to receive various security and bugfixes. The following security bugs were fixed: CVE-2018-8087: Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c allowed…
at-a-glance-c45-729541.pdf
448.1 KB
محصول سیسکو برای مدیریت انرژی در بخش IT:
EnergyWise
پشتیبانی کننده تمامی برند ها و محصولات
@roozbeh_learning 👈🏼
EnergyWise
پشتیبانی کننده تمامی برند ها و محصولات
@roozbeh_learning 👈🏼
Forwarded from ناویا، ماشین کاوش اپلای
افبیآی ۹ ایرانی رو به توطئه کامپیوتری متهم کرده. هرکدوم از این افراد نقش رهبری، پیمانکاری و جذب نیروی هکر برای شرکت مبنا (وابسته به سپاه) رو داشته. سایر توضیحات در تصویر.
@offsecmag
@offsecmag
ناویا، ماشین کاوش اپلای
افبیآی ۹ ایرانی رو به توطئه کامپیوتری متهم کرده. هرکدوم از این افراد نقش رهبری، پیمانکاری و جذب نیروی هکر برای شرکت مبنا (وابسته به سپاه) رو داشته. سایر توضیحات در تصویر. @offsecmag
Gholamreza Rafatnejad (Rafatnejad) was a founding member of the Mabna Institute and organized the Mabna Institute hacking campaign.
Ehsan Mohammadi (Mohammadi) was also a founding member of the Mabna Institute. Along with Rafatnejad,Mohammadi also helped organize Mabna’s university hacking campaign and received from others compromised account credentials belonging to university professors.
Seyed Ali Mirkarimi (Mirkarimi) was a hacker and Mabna Institute contractor. Mirkarimi engaged in a variety of phases of Mabna’s university hacking campaign, including the crafting and testing of malicious, spearphishing emails and organizing of stolen credentials.
Mostafa Sadeghi (Sadeghi) was a hacker and affiliate of the Mabna Institute. Sadeghi compromised more than 1,000 university professor accounts. Sadeghi exchanged credentials for compromised professor accounts with other Mabna-affiliated actors. Sadeghi was also involved in the operation of, and maintained a financial interest in, one of the websites selling access to the stolen university data.
Sajjad Tahmasebi (Tahmasebi) was a Mabna Institute contractor. He helped facilitate the spearphishing campaign targeting universities by, among other things, conducting online network surveillance of victim university computer systems and maintaining lists of credentials stolen from victim professors.
Abdollah Karima (Karima) was a businessman who owned and operated a company that sold, through a website, access to stolen academic materials obtained through computer intrusions.Karima contracted with the Mabna Institute to direct hackingactivities. Mabna affiliates regularly provided compromised university professor login credentials to Karima.
Abuzar Gohari Moqadam (Gohari Moqadam) was a professor and affiliate of the Mabna Institute. Gohari Moqadamexchanged stolen credentials for compromised accounts with Mabna Institute founders Rafatnejad and Mohammadi.
Roozbeh Sabahi (Sabahi) was a contractor for the Mabna Institute. Roozbeh Sabahi assisted in the execution of the various Mabna hacking activities, including its university campaign by, among other things, organizing stolen credentials obtained by Mabna Institute hackers.
Mohammed Reza Sabahi (Sabahi) was a Mabna Institute contractor. Sabahi assisted in the carrying out of Mabna’sspearphishing campaign targeting universities. Among his activities, Mohammed Reza Sabahi created targeting lists of university professors and catalogued academic databases at targeted universities.
In addition to the designations above related to the activities of the Mabna Institute, OFAC today designated an additional Iranian national pursuant to E.O. 13694, as amended, for engaging in significant malicious cyber-enabled misappropriation of economic resources, personal identifiers, and financial information for private financial gain for activities targeting a U.S. media company.
Behzad Mesri (Mesri) compromised multiple user accounts belonging to a U.S. media and entertainment company in order to repeatedly gain unauthorized access to the company’s computer servers and steal valuable stolen data including confidential and proprietary information, financial documents, and employee contact information. Mesri then engaged in anattempt to extort the victim company for $6 million.
Ehsan Mohammadi (Mohammadi) was also a founding member of the Mabna Institute. Along with Rafatnejad,Mohammadi also helped organize Mabna’s university hacking campaign and received from others compromised account credentials belonging to university professors.
Seyed Ali Mirkarimi (Mirkarimi) was a hacker and Mabna Institute contractor. Mirkarimi engaged in a variety of phases of Mabna’s university hacking campaign, including the crafting and testing of malicious, spearphishing emails and organizing of stolen credentials.
Mostafa Sadeghi (Sadeghi) was a hacker and affiliate of the Mabna Institute. Sadeghi compromised more than 1,000 university professor accounts. Sadeghi exchanged credentials for compromised professor accounts with other Mabna-affiliated actors. Sadeghi was also involved in the operation of, and maintained a financial interest in, one of the websites selling access to the stolen university data.
Sajjad Tahmasebi (Tahmasebi) was a Mabna Institute contractor. He helped facilitate the spearphishing campaign targeting universities by, among other things, conducting online network surveillance of victim university computer systems and maintaining lists of credentials stolen from victim professors.
Abdollah Karima (Karima) was a businessman who owned and operated a company that sold, through a website, access to stolen academic materials obtained through computer intrusions.Karima contracted with the Mabna Institute to direct hackingactivities. Mabna affiliates regularly provided compromised university professor login credentials to Karima.
Abuzar Gohari Moqadam (Gohari Moqadam) was a professor and affiliate of the Mabna Institute. Gohari Moqadamexchanged stolen credentials for compromised accounts with Mabna Institute founders Rafatnejad and Mohammadi.
Roozbeh Sabahi (Sabahi) was a contractor for the Mabna Institute. Roozbeh Sabahi assisted in the execution of the various Mabna hacking activities, including its university campaign by, among other things, organizing stolen credentials obtained by Mabna Institute hackers.
Mohammed Reza Sabahi (Sabahi) was a Mabna Institute contractor. Sabahi assisted in the carrying out of Mabna’sspearphishing campaign targeting universities. Among his activities, Mohammed Reza Sabahi created targeting lists of university professors and catalogued academic databases at targeted universities.
In addition to the designations above related to the activities of the Mabna Institute, OFAC today designated an additional Iranian national pursuant to E.O. 13694, as amended, for engaging in significant malicious cyber-enabled misappropriation of economic resources, personal identifiers, and financial information for private financial gain for activities targeting a U.S. media company.
Behzad Mesri (Mesri) compromised multiple user accounts belonging to a U.S. media and entertainment company in order to repeatedly gain unauthorized access to the company’s computer servers and steal valuable stolen data including confidential and proprietary information, financial documents, and employee contact information. Mesri then engaged in anattempt to extort the victim company for $6 million.
🔶مردم میگویند:
"آدمهای خوب را پیدا کنیدو بدها را رها"
🔷اما باید اینگونه باشد،
"خوبی را در آدمها پیدا کنید و بدی آنها را نایده بگیرید"
هیچکس کامل نیست
@roozbeh_learning 👈🏼
"آدمهای خوب را پیدا کنیدو بدها را رها"
🔷اما باید اینگونه باشد،
"خوبی را در آدمها پیدا کنید و بدی آنها را نایده بگیرید"
هیچکس کامل نیست
@roozbeh_learning 👈🏼
آخرین آسیب پذیری هایی که مورد سوء استفاده قرار گرفته اند .
@roozbeh_learning 👈🏼
@roozbeh_learning 👈🏼
Forwarded from آکادمی آموزش روزبه 📚
🦋 با آرزوی بهترین ها ؛
نوروز و سال جدید بر همه مبارک . 🌸
گروه آموزشی پژوهشی روزبه
@roozbeh_learning 👈🏼
نوروز و سال جدید بر همه مبارک . 🌸
گروه آموزشی پژوهشی روزبه
@roozbeh_learning 👈🏼
🔲 تعداد ۱۰ کانفیگ اشتباه در اکتیو دایرکتوری که منجر به مشکلات مهم امنیتی میگردد
@roozbeh_learning 👈🏼
@roozbeh_learning 👈🏼
caab30f2.pdf
1 MB
🔲تعداد ۱۰ کانفیگ اشتباه در اکتیو دایرکتوری که منجر به مشکلات مهم امنیتی میگردد
🚨ادمین های شبکه و ممیزان امنیت ، بهوش باشید .
@roozbeh_learning 👈🏼
گروه آموزشی پژوهشی روزبه
🚨ادمین های شبکه و ممیزان امنیت ، بهوش باشید .
@roozbeh_learning 👈🏼
گروه آموزشی پژوهشی روزبه
معرفی کتاب :
راهنمای عملی تطابق با قانون HIPAA؛ در راستای امنیت و حفظ حریم شخصی در صنعت پزشکی امریکا
@roozbeh_learning 👈🏼
راهنمای عملی تطابق با قانون HIPAA؛ در راستای امنیت و حفظ حریم شخصی در صنعت پزشکی امریکا
@roozbeh_learning 👈🏼