Yearly Archives: 2022
Riot Pot: — A Honeypot for Resilient IoT and Operational Technology
IEMLabs -
RioTPot is an interoperable medium interaction honeypot that is primarily focused on mimicking IoT and OT protocols, but can also emulate other services.
This functionality is placed into the honeypot via plugins, making RIoTPot a modular and portable honeypot.
The services are loaded at runtime, which means that the honeypot's weight will vary depending on the premises, and the services loaded, such as HTTP, will only be used when necessary.
As a result, it is recommended to create your own binary that is tailored to your specific requirements.
Disclaimer: The intended use for the tool...
RedLine Malware Pilfer Passwords Saved in Multiple Browsers
IEMLabs -
Microsoft Edge, Opera, Naver Whale, and Google Chrome have all been targeted by RedLine, a data stealing spyware. The passwords saved in these web...
HCL Technologies patches serious vulnerabilities in HCL DX
IEMLabs -
Researchers say that HCL Digital Experience (DX), a platform for creating and administering online portals, contains several vulnerabilities that might lead to remote code...
Watcher: — Open Source Threat Hunting Platform for Cybersecurity. Django and React JS were used to create this site
IEMLabs -
Open Source Threat Hunting Platform for Cybersecurity. Django and React JS were used to create this site
Capabilities:-
Detecting new cybersecurity trends, such as new vulnerabilities and malware...
Through social media and other RSS feeds (www.cert.ssi.gouv.fr, www.cert.europa.eu, www.us-cert.gov, www.cyber.gov.au...)
Keep an eye out for data leaks, such as on Pastebin and other IT content sharing sites (StackOverflow, Github, GitLab, bitbucket, apkmirror, npm...)
Use TLSH to track changes to malicious domain names (IPs, mail/MX data, and web pages).
Using dnstwist, detect suspicious domain names aimed at your company.
Disclaimer: The intended...
K-12 Cyber security Act Signed Into Law
IEMLabs -
Joe Biden has previously signed the K12 Cybersecurity Act into law on 8th October 2021. This was enforced to combat the data security incidents...
Firmware attack can drop persistent malware in hidden SSD area
IEMLabs -
Korean researchers have developed a set of assaults against some solid-state discs (SSDs) that could allow malware to be planted at a position beyond...