This media is not supported in your browser
VIEW IN TELEGRAM
Black Hat USA 2025 returns to the Mandalay Bay Convention Center in Las Vegas with a 6-day program. The event will open with four days of specialized cybersecurity Trainings (August 2-5), with courses for all skill levels
#event #fun
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5❤🔥3👍1
Active Directory Security Fundamentals, Huy Kha, 2025
Active Directory is critically important for hackers because it serves as the central authentication and authorization system in most Windows enterprise environments, making it a high-value target for privilege escalation, lateral movement, and full domain compromise.
Understanding the basics of active directory security is a prerequisite for those working in the Cybersecurity (offensive, defensive, and GRC).
This document helps you understand these basics, how to activate these security features, and how to monitor them to protect your infrastructure.
#book #windows #defensive
Active Directory is critically important for hackers because it serves as the central authentication and authorization system in most Windows enterprise environments, making it a high-value target for privilege escalation, lateral movement, and full domain compromise.
Understanding the basics of active directory security is a prerequisite for those working in the Cybersecurity (offensive, defensive, and GRC).
This document helps you understand these basics, how to activate these security features, and how to monitor them to protect your infrastructure.
#book #windows #defensive
👍9❤1
Active Directory Security Fundamentals.pdf
2.9 MB
Active Directory Security Fundamentals, Huy Kha, 2025
❤8👍2
How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO, Ravi Das (, 2023
The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words, that is what the average tenure of a CISO is at a business. At the end of their stay, many CISOs look for totally different avenues of work, or they try something else – namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone, it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve.
The book is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing, with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers.
#book #management
The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words, that is what the average tenure of a CISO is at a business. At the end of their stay, many CISOs look for totally different avenues of work, or they try something else – namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone, it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve.
The book is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing, with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers.
#book #management
👍2❤1👎1
how-to-start-your-own-cybersecurity-consulting-business.epub
282.8 KB
How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO, Ravi Das (, 2023
👍3👎2❤1
𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐂𝐄𝐎 𝐬𝐚𝐲𝐬 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐢𝐬 𝐢𝐭𝐬 𝐍𝐨.1 𝐩𝐫𝐢𝐨𝐫𝐢𝐭𝐲
🔻 [2025]
Nadella also outlines three key business priorities: security, quality, and AI transformation. 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐰𝐚𝐬 𝐦𝐚𝐝𝐞 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭'𝐬 𝐧𝐮𝐦𝐛𝐞𝐫 𝐨𝐧𝐞 𝐩𝐫𝐢𝐨𝐫𝐢𝐭𝐲 𝐥𝐚𝐬𝐭 𝐲𝐞𝐚𝐫, after a series of attacks and trust waning in Microsoft's security efforts. Now, Nadella says Microsoft is "doubling down on the fundamentals" while also focusing on AI. "Security and quality are non-negotiable. Our infrastructure and services are mission critical for the world, and without them we don't have permission to move forward," says Nadella.
🔻[2024]
𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐢𝐬 𝐦𝐚𝐤𝐢𝐧𝐠 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐢𝐭𝐬 𝐍𝐨. 1 𝐩𝐫𝐢𝐨𝐫𝐢𝐭𝐲, CEO Satya Nadella said during the company’s fiscal third quarter earnings call Thursday.
“We launched our Secure Future Initiative last fall for this reason, bringing together every part of the company to advance cybersecurity protection, and we are doubling down on this very important work, putting security above all else — before all other features and investments,” Nadella said during the call.
🔝 Despite recent incidents, 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐫𝐞𝐦𝐚𝐢𝐧𝐬 𝐭𝐡𝐞 𝐟𝐞𝐝𝐞𝐫𝐚𝐥 𝐠𝐨𝐯𝐞𝐫𝐧𝐦𝐞𝐧𝐭'𝐬 𝐭𝐨𝐩 𝐜𝐥𝐨𝐮𝐝 𝐯𝐞𝐧𝐝𝐨𝐫, and the reset of its security culture is part of an effort to regain trust.
❗️𝐒𝐨𝐮𝐫𝐜𝐞𝐬: One + Two + Three
#analytics #world
🔻 [2025]
Nadella also outlines three key business priorities: security, quality, and AI transformation. 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐰𝐚𝐬 𝐦𝐚𝐝𝐞 𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭'𝐬 𝐧𝐮𝐦𝐛𝐞𝐫 𝐨𝐧𝐞 𝐩𝐫𝐢𝐨𝐫𝐢𝐭𝐲 𝐥𝐚𝐬𝐭 𝐲𝐞𝐚𝐫, after a series of attacks and trust waning in Microsoft's security efforts. Now, Nadella says Microsoft is "doubling down on the fundamentals" while also focusing on AI. "Security and quality are non-negotiable. Our infrastructure and services are mission critical for the world, and without them we don't have permission to move forward," says Nadella.
🔻[2024]
𝐌𝐢𝐜𝐫𝐨𝐬𝐨𝐟𝐭 𝐢𝐬 𝐦𝐚𝐤𝐢𝐧𝐠 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐢𝐭𝐬 𝐍𝐨. 1 𝐩𝐫𝐢𝐨𝐫𝐢𝐭𝐲, CEO Satya Nadella said during the company’s fiscal third quarter earnings call Thursday.
“We launched our Secure Future Initiative last fall for this reason, bringing together every part of the company to advance cybersecurity protection, and we are doubling down on this very important work, putting security above all else — before all other features and investments,” Nadella said during the call.
❗️𝐒𝐨𝐮𝐫𝐜𝐞𝐬: One + Two + Three
#analytics #world
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4😁3👍2
Hacking Layer 2: Fun with Ethernet Switches by Sean Convery, Cisco Systems, 2025
- MAC Spoofing
- Double Tagging
- MAC Flooding
- 802.1q decapsulation VLAN Hopping
- ARP Spoofing
- SSH/SSL Intercept
- Spanning Tree Attack
- VQP Attack
How do you prevent these attacks?
📌 Always use a dedicated VLAN ID for all trunk ports
📌 Disable unused ports and put them in an unused VLAN
📌 Be paranoid he he. Do not use VLAN 1 for anything
📌 Set all user ports to non-trunking (DTP off)
#cisco
- MAC Spoofing
- Double Tagging
- MAC Flooding
- 802.1q decapsulation VLAN Hopping
- ARP Spoofing
- SSH/SSL Intercept
- Spanning Tree Attack
- VQP Attack
How do you prevent these attacks?
📌 Always use a dedicated VLAN ID for all trunk ports
📌 Disable unused ports and put them in an unused VLAN
📌 Be paranoid he he. Do not use VLAN 1 for anything
📌 Set all user ports to non-trunking (DTP off)
#cisco
🔥2👍1
Hacking Layer 2 Fun with Ethernet Switches by Sean Convery.pdf
751.1 KB
Hacking Layer 2: Fun with Ethernet Switches by Sean Convery, Cisco Systems, 2025
❤2👍1
Dear friends, I'm pleased to present to you the translation of my author's brochure (e-book), which I completed in December 2023. Initially, the brochure was available only in Russian language. This work is not a commercial project for me, so I don't have proofreaders, professional translators or editors on my staff. The brochure was translated using artificial intelligence with minimal manual correction. So, for this reason minor errors are possible.
However, I hope that the importance of the material will outweigh all the errors and shortcomings of the translation🤝
The brochure has incorporated modern scientific and empirical research on the topic of learning (acquiring knowledge, skills, assimilation of information, memorization, speed reading, etc.) and self-learning, theories and facts, including the latest discoveries in the field of psychology, neurophysiology, pedagogy, linguistics, the author's own research in understanding human cognitive abilities.
#info
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥7❤3👍3👎1
Checking of all messages with captcha up to 2025.08.05 15:26 GMT+3 in the group is enabled. The restriction does not apply to admins.
#info
#info
👍7🔥4
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤23👍11😁6🔥4
Случайно может задеть нормальных пользователей, чуть позже всех кого сможем - восстановим
#info
Please open Telegram to view this post
VIEW IN TELEGRAM
👍20❤4🤝1
На текущий момент на подписку на канал @w2hack введено ограничение. Кто попадает out of limit автоматически банится. Подозрительные аккаунты вместе с настойчивыми ботами заносятся в blacklist. Кто являются легитимным пользователем и был забанен ошибочно - в blacklist продержится еще пару дней, дальше можно будет подписаться на канал / без ограничений /
Финал розыгрыша Telegram Premium состоится сегодня 06/08 в 12ч мск, так что наплыв должен закончится. После этого будем восстанавливать легитимных пользователей случайно попавших под блокировку. Наберитесь, пожалуйста, терпения, ручной парсинг трудоемок и требуют времени
// UPD [13:25 msk]
Ситуация стабилизирована, наплыв ботов остановлен. Автобан переведен в "тихий режим". Прослеживается авто-откат ботов. Если у кого-то какие то проблемы с доступом -👋 пишите в w2hack бот обратной связи
// UPD [16:48 msk]
Откат 85% ботов, списки задетектированных аккаунтов переданы в администрацию TG
#info
Финал розыгрыша Telegram Premium состоится сегодня 06/08 в 12ч мск, так что наплыв должен закончится. После этого будем восстанавливать легитимных пользователей случайно попавших под блокировку. Наберитесь, пожалуйста, терпения, ручной парсинг трудоемок и требуют времени
// UPD [13:25 msk]
Ситуация стабилизирована, наплыв ботов остановлен. Автобан переведен в "тихий режим". Прослеживается авто-откат ботов. Если у кого-то какие то проблемы с доступом -
// UPD [16:48 msk]
Откат 85% ботов, списки задетектированных аккаунтов переданы в администрацию TG
#info
Please open Telegram to view this post
VIEW IN TELEGRAM
5🤣17❤15😁5👍2😱2