September 28, 2022

Analyze AWS IAM permissions on demand with the k9 CLI

Now you can verify the effects of AWS IAM policy changes quickly by analyzing an AWS account’s IAM permissions on-demand with the k9 CLI‘s analyze account command. This command helps Cloud teams and consultants tighten the security policy engineering loop. Suppose you’ve changed a security policy and want to verify the risk is remediated. Trigger …

Analyze AWS IAM permissions on demand with the k9 CLI Read More »

Brute Ratel cracked and shared across the Cybercriminal Underground

  A short blog to document the proliferation of an advanced commercial penetration testing tool among cybercriminal threat actors across various Russian- and English-speaking underground forums. What? Available since December 2020, Brute Ratel C4 (aka BRC4) is one of the hottest new Red Team frameworks to hit the scene. It is similar to other frameworks …

Brute Ratel cracked and shared across the Cybercriminal Underground Read More »

Network hackers find the right vulnerability in less than 10 hours

A recent survey showed that a modern attacker finds a vulnerability that helps bypass network perimeter protection in less than ten hours. After an exploit, getting out of the compromised system takes less than five hours in half of the cases. The survey, which allows to estimate the time for which organizations can detect and …

Network hackers find the right vulnerability in less than 10 hours Read More »

Assessors: Prepare for the Closure of PA-DSS

On 28 October 2022, the Payment Application Data Security Standard (PA-DSS) and Program will close and will be replaced by the PCI Secure Software Standard. To prepare for this transition, assessors should be aware of the following information: PA-DSS Application Validation and Listing: Change submissions to listed PA-DSS applications must be complete (i.e., all required …

Assessors: Prepare for the Closure of PA-DSS Read More »

How to Engage Developers to Build a Successful Application Security Program

If you’re helping shape application security in an organization, whether as an external security consultant or vendor, or as part of an internal security team, it is critical to work effectively with developers. While a lot of individuals have an interest and stake in security, and many have a significant role to play, developers who …

How to Engage Developers to Build a Successful Application Security Program Read More »

Hackers use fake CloudFlare captcha to hide Trojan download

Sucuri is seeing the development of a campaign launched in August aimed at seeding the RAT in conjunction with a drive-by infostealer. Attackers inject JavaScript into WordPress sites, which displays a fake page of the Cloudflare security service and prompts the visitor to download some software to complete the check. Malicious JavaScript injections are carried …

Hackers use fake CloudFlare captcha to hide Trojan download Read More »

Meet A Human: Maxence Duclos

At HUMAN, we believe everyone is a hacker. But even though we share a similar mindset and a common mission, we know that our true strength lies in the diverse people and backgrounds that make our team a community. Learn what it’s like to work with us through the experiences of our Humans. Read more

The Importance of Log Monitoring in Cybersecurity 

Logs can be generated from any software component designed to handle requests and responses. Everything from application and web servers to operating systems, hardware and network devices generate logs of activities and events. Log files are simple text files containing detailed information regarding usage patterns, activities, and operations, while specifying if the nature of a …

The Importance of Log Monitoring in Cybersecurity  Read More »

BSW #278 – Fleming Shi

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:53:02 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no BSW #278 – Fleming Shi Wed, 28 Sep 2022 09:00:00 +0000 01:00:42 false Podcast full Read more

BSW #278 – Fleming Shi

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:53:02 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no BSW #278 – Fleming Shi Wed, 28 Sep 2022 09:00:00 +0000 01:00:42 false Podcast full Read more

BSW #278 – Fleming Shi

Paul’s Security Weekly Fri, 13 Jan 2023 19:59:00 +0000 Fri, 13 Jan 2023 22:53:02 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ sw_production@cyberriskalliance.com (sw_production@cyberriskalliance.com) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly Security Weekly hacking,security false sw_production@cyberriskalliance.com episodic no BSW #278 – Fleming Shi Wed, 28 Sep 2022 09:00:00 +0000 01:00:42 false Podcast full Read more

Attacking Encrypted HTTP Communications

TL;DR The Reolink RLC-520A PoE camera obfuscates its HTTP communication by encrypting the POST body data. This level of security does defend against opportunistic attackers but falls short when defending against persistent attackers. Introduction Different embedded devices have their own take on implementing secure communications, other than the standard HTTPS tunnel. One such method is …

Attacking Encrypted HTTP Communications Read More »

Data Center Modernization Using a Hybrid…

Today’s data centers face challenges for efficiency and performance that can be met using cloud technologies. However, determining the best cloud model and which workloads can securely be located where, or even which cloud service provider (CSP) would deliver the best return on investment (ROI), can be difficult for many organizations. Research by IDC projects …

Data Center Modernization Using a Hybrid… Read More »

New SANS Python Course | SEC673: Advanced Information Security Automation with Python

Python can be a powerful tool to help cyber security professionals automate routine tasks quickly and efficiently, but knowing how to code is only part of the battle. When it comes to solving real-world cybersecurity problems, a bit more is required. Authored by SANS Senior Instructor Mark Baggett, the new SEC673 Advanced Information Security Automation with Python is designed …

New SANS Python Course | SEC673: Advanced Information Security Automation with Python Read More »

High-profile hacks emphasize the threat of social engineering

Attackers have leveraged social engineering in several high-profile hacks in recent months, with organizations like Uber, Rockstar Games, Cloudflare, Cisco, and LastPass among the most well-known targets. Social engineering is the manipulation of a user, often through fear or doubt, to coax them into actions like revealing credentials or other sensitive information. The threat landscape …

High-profile hacks emphasize the threat of social engineering Read More »

1 Key for 1 Lock: The Chinese Communist Party’s Strategy for Targeted Propaganda

Editors Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF. This report assesses concepts related to the Chinese Communist Partys international propaganda and information influence strategy. Topics covered include the partys intent to segment audiences for targeted propaganda, theories …

1 Key for 1 Lock: The Chinese Communist Party’s Strategy for Targeted Propaganda Read More »