India to press ahead with strict cybersecurity rules despite industry concerns In April, the Indian Computer Emergency Response Team issued a rule requiring IT firms to disclose data breaches within six hours of “noticing such incidences” and to keep IT and communications records for six months. Despite rising business worries, India’s government said on Wednesday… Continue reading India to press ahead with strict cybersecurity rules despite industry concerns
Author: IEMA IEMLabs
IEMLabs is an ISO 27001:2013 and ISO 9001:2015 certified company, we are also a proud member of EC Council, NASSCOM, Data Security Council of India (DSCI), Indian Chamber of Commerce (ICC), U.S. Chamber of Commerce, and Confederation of Indian Industry (CII). The company was established in 2016 with a vision in mind to provide Cyber Security to the digital world and make them Hack Proof. The question is why are we suddenly talking about Cyber Security and all this stuff? With the development of technology, more and more companies are shifting their business to Digital World which is resulting in the increase in Cyber Crimes.
Zero-Day Bugs Bug the Biggies
One of the most serious risks to IT firms has been zero-day vulnerabilities. Several attackers have been seen exploiting new zero-day vulnerabilities in widely used commercial goods in recent days. Apple has a handful of problems Apple has issued emergency updates for two zero-day vulnerabilities in its iPhone, iPad, and Mac products. The… Continue reading Zero-Day Bugs Bug the Biggies
New Spyware Actively Targets Android Users
A previously undiscovered Android malware has been discovered, which is designed to collect data from users. Its infrastructure is identical to that of the Russian Turla organisation, although it is not responsible for the campaign. Malware for Android Process Manager is a malicious APK that serves as Android spyware, according to Lab52 researchers.… Continue reading New Spyware Actively Targets Android Users
PWF
PWF stands for Practical Windows Forensics. Steps:- Create a Windows virtual machine as a target. Run an attack script on the target VM (based on the AtomicRedTeam framework). Get your hands on some memory and disc images. Create a Windows forensic virtual machine. Begin your Windows forensic investigation. Disclaimer: The intended use for the… Continue reading PWF
UrlRecon
Information gathering or recon tool for Urls -> Retrieves * Whois information for the domain * DNS details for the domain * Server Fingerprint * Server IP geolocation Features:- Gathers whois data 2. offers DNS information for the target server Gives the server’s fingerprint Retrieves the domain’s geolocation – with a kml file to… Continue reading UrlRecon
CobaltBus
External C2 Integration With Azure Servicebus, C2 Traffic Via Azure Servicebus. Setup:- To begin, create an Azure Service Bus account. Create a shared access policy (connection string) with just Send and Listen capabilities. In Beacon C# projects, change the static connectionString property to match the “Primary Connection String” value for the Shared access policy you… Continue reading CobaltBus
JFScans
It is based on Masscan and NMap, this port scanner is extremely quick and customizable. Scanning large networks and using NMap’s scripting capabilities to find out about services. Create a straightforward report. Features:- Perform a quick scan using nmap! Allows you to use Masscan to scan targets and execute Nmap on detected ports with… Continue reading JFScans
Ukraine Warns of Cyber-attack Aiming to Hack Users’ Telegram Messenger Accounts
A fresh round of cyber assaults aiming at getting access to users’ Telegram accounts has been reported by Ukraine’s technical security and intelligence service. In an alert, the State Service of Special Communication and Information Protection (SSSCIP) of Ukraine stated that “criminals sent messages with malicious links to the Telegram website in order… Continue reading Ukraine Warns of Cyber-attack Aiming to Hack Users’ Telegram Messenger Accounts
Microsoft detects Spring4Shell attacks across its cloud services
Microsoft stated it is presently detecting a “limited amount of attack attempts” across its cloud services that are aimed at the serious Spring4Shell (aka SpringShell) remote code execution (RCE) vulnerability. The Spring Framework is affected by the Spring4Shell vulnerability (CVE-2022-22965), which is defined as the “most extensively used lightweight open-source framework for Java.” “Microsoft… Continue reading Microsoft detects Spring4Shell attacks across its cloud services