Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Interesting Stuff

Interesting Stuff

Online Scam Taxonomy: The many ways to trick us

March 18, 2024September 29, 2025 iStuff

Methodology-based scams Target-Based Scams Platform-Based Scams Online The fraudulent activities take place across online platforms. Travel Fake vacation packages which offer hidden fees or non-existent accommodations. Utility Impersonating utility companies to demand immediate payment or threaten w…

Read More
Interesting Stuff

Best Practices for MITRE ATT&CK® Mapping

March 18, 2024September 29, 2025 iStuff

For CISA, understanding adversary behavior is often the first step in protecting networks and data. The success network defenders have in detecting and mitigating cyberattacks depends on this understanding. The MITRE ATT&CK® framework is a globally accessible knowledge base of adversary tac…

Read More
Interesting Stuff

Guide to Securing Remote Access Software

March 18, 2024September 29, 2025 iStuff

OVERVIEW: REMOTE ACCESS SOFTWARE Remote access software and tools comprise a broad array of capabilities used to maintain and improve IT, operational technology (OT), and industrial control systems (ICS) services; they allow a proactive and flexible approach for organizations to remotely oversee net…

Read More
Interesting Stuff

Matanbuchus Loader Detailed Analysis

March 15, 2024September 25, 2025 iStuff

In this report, we will analyze the MATANBUCHUS loader, a C++ malware, to determine its function and capabilities: API Hashing Stack Strings Checks number of running process PEB Traversal Anti-Sandbox techniques We’ll start with resolving APIs and decoding the strings, then proceed through the loade…

Read More
Interesting Stuff

Bug Bounty Program

March 14, 2024September 29, 2025 iStuff

A bug bounty program is essentially a legalized hacking arrangement where organizations offer rewards to ethical hackers (also called bug bounty hunters) for discovering and reporting vulnerabilities in their software, systems, or websites. Here’s a deeper dive into how bug bounties work: Benefits f…

Read More
Interesting Stuff

Blue Team’s Guide to Initial Access Vectors

March 14, 2024September 29, 2025 iStuff

Microsoft 365 (formerly Office 365) is Microsoft’s cloud-based suite of productivity tools, which includes email, collaboration platforms, and office applications. All are integrated with Entra ID (referred to as Azure AD in this post) for identity and access management. M365’s centra…

Read More
Interesting Stuff

Online Scam: Fraud Through My Phone – ASEC BLOG

March 14, 2024March 19, 2024 Ahnlab

The digital device that we use the most in our daily lives is mobile phone. It is used in a wide range of daily activities such as communication, searching, shopping, making payment, verifying identity, and investing. Some people do not own personal computers, but almost everyone these days have mobile phones….

Read More
Interesting Stuff

COM Objects Hijacking

March 12, 2024September 30, 2025 iStuff

The COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escalation in target systems. It relies on manipulating Component Object Model (COM), exploiting the core architecture of Windows that enables com…

Read More
Interesting Stuff

NTFS Artifacts Analysis

March 12, 2024September 25, 2025 iStuff

The New Technology File System (NTFS) is a file system developed and introduced by Microsoft in 1995, It was produced to overcome some limitations and offer new features. Hard-links Improved performance, reliability, and disk space utilization Security access control lists File system journaling Her…

Read More
Interesting Stuff

Web Analyzer – IP information, SSL chain, DNS records, cookies, crawl rules, headers, quality metrics, server location

February 28, 2024September 30, 2025 iStuff

https://web-check.xyz/ Supported Checks IP Info SSL Chain DNS Records Cookies Crawl Rules Headers Quality Metrics Server Location Associated Hosts Redirect Chain TXT Records Server Status Open Ports Traceroute Carbon Footprint Server Info Whois Lookup Domain Info DNS Security Extensions Site Feature…

Read More
Interesting Stuff

YARA Idea to Detect Malware

February 28, 2024September 30, 2025 iStuff

https://www.shadowstackre.com/ – Committed to delivering high quality malware intelligence and services to the cybersecurity community. Open this link : https://github.com/ShadowStackRe/intel/tree/master/rules/yara Example :YARA to detect Cactus Ransomwarestrings:$strReadMe = “cAcTuS.readme.txt” wid…

Read More
Interesting Stuff

Keylogging in the Windows kernel with undocumented data structures

February 27, 2024September 30, 2025 iStuff

The basic idea revolves around gafAsyncKeyState (gaf = global af?), which is an undocumented kernel structure in win32kbase.sys used by NtUserGetAsyncKeyState (this structure exists up to Windows 10 – more on that at the end or in the talk linked above). By first locati…

Read More
Interesting Stuff

Top 10 web hacking techniques of 2023

February 24, 2024September 30, 2025 iStuff

10. can I speak to your manager? hacking root EPP servers to take control of zones In tenth place, we have a beautiful insight into some overlooked and incredibly valuable attack-surface. In can I speak to your manager? hacking root EPP servers to take control of zones, Sam Curry, Brett Buerhau…

Read More
Interesting Stuff

Attacking APIs – Finding and Exploiting vulnerabilities in APIs

February 24, 2024September 30, 2025 iStuff

APIs (Application Programming Interfaces) have become integral components of modern software systems, facilitating communication and interaction between various applications and services. However, they also represent a significant attack surface, susceptible to a variety of malicious activities. Thi…

Read More
Interesting Stuff

Detection Rules Development Framework

February 24, 2024September 30, 2025 iStuff

iPurpleTeam, has developed the following framework considering various components that are required to safeguard that rules will be developed in an threat aligned and reliable manner. https://github.com/netbiosX/iPurpleTeam/blob/main/Detection-Engineering/Detection-Rules-Development-Framework.md Rul…

Read More

Posts pagination

Previous 1 … 61 62 63 64 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.