A collective awesome list of public (JSON) APIs for use in security.The list is supported by https://alexanderjaeger.deLearn about REST: https://github.com/marmelab/awesome-rest Sample API used by hendryadrian.com >> https://www.hendryadrian.com/ransom/all.php APIDescriptionAuthHTTPSLinkFree / Comme…
Category: Interesting Stuff
In the previous article https://8ksec.io/dissecting-windows-malware-series-beginner-to-advanced-part-1/, we introduced the components of Malware Analysis: Basic Static, Advanced Static, Basic Dynamic, Advanced Dynamic – then, we delved into the analysis of a malware sam…
Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps businesses drive growth and innovation. However, as organizations migrate to the cloud, they face a complex and…
With the advancement of scam technology, it has become increasingly difficult to determine the authenticity based solely on the appearance of the screen. In the past, scammers would create fake websites or emails with differences in logo size, layout, wording, etc., which could be identified as fake…
AI Art, Prompt: “Google Cloud Incident Response” The cloud presents opportunities for agility and scalability, but its shared responsibility model exposes organizations to new security challenges. In the face of these threats, security operation teams must retain the knowledge of cloud incident resp…
Curated list of bookmarks that are usefulf or OSINT activities. They are broken down into appropriate categories such as: Search Engines Services Lists Leak Sites (to monitor if yours or your organisations information may be exposed) Chat & File Sharing The file is designed to be imported&n…
Curated bookmark list categorized by area and event monitoring, person of interest search, corporate profiling, mapping, AI, intelligence analysis, reporting tools, collective tools, cryptocurrency, country specific, verification and fact-checking. They are broken down into appropriate categories su…
https://whatsmyname.app How to use: Enter the username(s) in the search box, select any category filters & click the search icon or press CTRL+Enter Results will present as icons on the left & in a searchable table on the right Document & Google searches will automatically populate at th…
Privileged Access Management (PAM) is a critical aspect of information security that focuses on controlling, managing, and monitoring the access and activities of privileged users within an IT environment. Privileged users include administrators, superusers, and accounts with elevated rights that al…
Email Security Appliances (ESAs) are hardware or software solutions designed to protect an organization’s email system from a wide range of email-based threats. These appliances play a crucial role in securing inbound and outbound emails by filtering spam, blocking malware, preventing phishing attac…
“There are too many firewall features available today; I am using Cisco ASA as an example for this firewall topic.” Cisco ASA is a versatile network security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. Cisco ASA is designed to prote…
As the digital landscape continues to evolve, the United States finds itself at the forefront of emerging cybersecurity challenges. With its critical infrastructure, extensive government networks, and vibrant economy, the nation remains a prime target for a myriad of cyber threats. From state-sponso…
Hacklido.com is a cybersecurity community platform focused on various aspects of ethical hacking, security research, and cybersecurity knowledge sharing. The website hosts a range of content including blogs on topics like cybersecurity trends, techniques to bypass security measures such as one-time…
Content : Introduction to SOC What is a Use Case in SOC? Use Case Life Cycle Use Case Management Challenges in Use Case Management Best Practices Introduction to SOC (Security Operation Center) A Security Operation Center (SOC) is a centralized unit within an organization dedicated to continuously m…
Amibreached.com is a service developed by Cyble Inc., designed to help individuals and companies determine if their personal data has been exposed on the dark web. The platform allows users to search for various types of personal information, such as email addresses, phone numbers, and IP addresses,…