India to press ahead with strict cybersecurity rules despite industry concerns

India to press ahead with strict cybersecurity rules despite industry concerns In April, the Indian Computer Emergency Response Team issued a rule requiring IT firms to disclose data breaches within six hours of “noticing such incidences” and to keep IT and communications records for six months. Despite rising business worries, India’s government said on Wednesday… Continue reading India to press ahead with strict cybersecurity rules despite industry concerns

New Spyware Actively Targets Android Users

  A previously undiscovered Android malware has been discovered, which is designed to collect data from users. Its infrastructure is identical to that of the Russian Turla organisation, although it is not responsible for the campaign.   Malware for Android Process Manager is a malicious APK that serves as Android spyware, according to Lab52 researchers.… Continue reading New Spyware Actively Targets Android Users

PWF

  PWF stands for Practical Windows Forensics. Steps:- Create a Windows virtual machine as a target. Run an attack script on the target VM (based on the AtomicRedTeam framework). Get your hands on some memory and disc images. Create a Windows forensic virtual machine. Begin your Windows forensic investigation. Disclaimer: The intended use for the… Continue reading PWF

Published
Categorized as Tools

UrlRecon

  Information gathering or recon tool for Urls -> Retrieves * Whois information for the domain * DNS details for the domain * Server Fingerprint * Server IP geolocation Features:- Gathers whois data 2. offers DNS information for the target server Gives the server’s fingerprint Retrieves the domain’s geolocation – with a kml file to… Continue reading UrlRecon

Published
Categorized as Tools

CobaltBus

External C2 Integration With Azure Servicebus, C2 Traffic Via Azure Servicebus. Setup:- To begin, create an Azure Service Bus account. Create a shared access policy (connection string) with just Send and Listen capabilities. In Beacon C# projects, change the static connectionString property to match the “Primary Connection String” value for the Shared access policy you… Continue reading CobaltBus

Published
Categorized as Tools

JFScans

  It is based on Masscan and NMap, this port scanner is extremely quick and customizable. Scanning large networks and using NMap’s scripting capabilities to find out about services. Create a straightforward report. Features:- Perform a quick scan using nmap! Allows you to use Masscan to scan targets and execute Nmap on detected ports with… Continue reading JFScans

Published
Categorized as Tools

Ukraine Warns of Cyber-attack Aiming to Hack Users’ Telegram Messenger Accounts

  A fresh round of cyber assaults aiming at getting access to users’ Telegram accounts has been reported by Ukraine’s technical security and intelligence service.   In an alert, the State Service of Special Communication and Information Protection (SSSCIP) of Ukraine stated that “criminals sent messages with malicious links to the Telegram website in order… Continue reading Ukraine Warns of Cyber-attack Aiming to Hack Users’ Telegram Messenger Accounts

Microsoft detects Spring4Shell attacks across its cloud services

  Microsoft stated it is presently detecting a “limited amount of attack attempts” across its cloud services that are aimed at the serious Spring4Shell (aka SpringShell) remote code execution (RCE) vulnerability. The Spring Framework is affected by the Spring4Shell vulnerability (CVE-2022-22965), which is defined as the “most extensively used lightweight open-source framework for Java.” “Microsoft… Continue reading Microsoft detects Spring4Shell attacks across its cloud services

This site is under maintenance,
some features might not work!!!