A Beginner’s Guide to MITRE ATT&CK Framework
MITRE ATT&CK reveals the intentions of the attackers to the defenders, which results in a significant reduction in the number of criminals hiding behind rocks and structures. MITRE offers aRead More →
MITRE ATT&CK reveals the intentions of the attackers to the defenders, which results in a significant reduction in the number of criminals hiding behind rocks and structures. MITRE offers aRead More →
Given that 2021 set a record for the number of vulnerabilities disclosed and that threat actors improved their capacity to weaponize vulnerabilities, prompt and intelligent prioritization and repair of vulnerabilitiesRead More →
Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques, and procedures (TTPs), including a new remote access Trojan called ROMCOM RAT on compromised systems.Read More →
As technology is developing at an unprecedented rate, cybersecurity becomes critical. Organizations relying on remote workforce and virtual support often suffer from asset loss and data breaches. To deal withRead More →
Cisco Talos researchers reported detecting a new hacking campaign by the group identified as Transparent Tribe and targeting government organizations in India. Active at least since mid-2021, this campaign isRead More →
In its latest security report, Cisco announced the fix of a security flaw in Redundancy Configuration Manager (RCM) for Cisco StarOS. Tracked as CVE-2022-20649, successful exploitation allows unauthenticated hackers toRead More →
Researchers at an Abu Dhabi university revealed details about a set of vulnerabilities in the information transfer mechanism that underlies modern telephone networks. According to the report, threat actors canRead More →
During the first quarter of 2021, denial of service (DoS) attacks became one of the world’s leading cybercriminal trends, in part thanks to the combination of this technique with extortionRead More →
While doing penetration testing there are many ways to gather information. There are many tools which are used in scanning, reconnaissance for knowing the loophole. Tools of Kali Linux whichRead More →
Python is the most important language for pentesters/ security researchers. Python has many pre-build libraries which helps in scanning the network and gives many options to send request/ receive differentRead More →