Monday, April 29, 2024

Yearly Archives: 2022

Riot Pot: — A Honeypot for Resilient IoT and Operational Technology

RioTPot is an interoperable medium interaction honeypot that is primarily focused on mimicking IoT and OT protocols, but can also emulate other services. This functionality is placed into the honeypot via plugins, making RIoTPot a modular and portable honeypot. The services are loaded at runtime, which means that the honeypot's weight will vary depending on the premises, and the services loaded, such as HTTP, will only be used when necessary. As a result, it is recommended  to create your own binary that is tailored to your specific requirements. Disclaimer: The intended use for the tool...

Skrull

  Malware DRM which prevents AV/EDRs from automatically submitting samples and signatures from kernel-level scanning. Using Process Ghosting, it generates launchers that can run malware on...

RedLine Malware Pilfer Passwords Saved in Multiple Browsers

Microsoft Edge, Opera, Naver Whale, and Google Chrome have all been targeted by RedLine, a data stealing spyware. The passwords saved in these web...

HCL Technologies patches serious vulnerabilities in HCL DX

Researchers say that HCL Digital Experience (DX), a platform for creating and administering online portals, contains several vulnerabilities that might lead to remote code...

FoxyRecon

For #OSINT investigations, there's a Firefox add-on. FoxyRecon is a Firefox add-on that assists you in conducting searches and investigations using open-source intelligence (OSINT) web...

Watcher: — Open Source Threat Hunting Platform for Cybersecurity. Django and React JS were used to create this site

Open Source Threat Hunting Platform for Cybersecurity. Django and React JS were used to create this site Capabilities:- Detecting new cybersecurity trends, such as new vulnerabilities and malware... Through social media and other RSS feeds (www.cert.ssi.gouv.fr, www.cert.europa.eu, www.us-cert.gov, www.cyber.gov.au...) Keep an eye out for data leaks, such as on Pastebin and other IT content sharing sites (StackOverflow, Github, GitLab, bitbucket, apkmirror, npm...) Use TLSH to track changes to malicious domain names (IPs, mail/MX data, and web pages). Using dnstwist, detect suspicious domain names aimed at your company. Disclaimer: The intended...

K-12 Cyber security Act Signed Into Law

Joe Biden has previously signed the K12 Cybersecurity Act into law on 8th October 2021. This was enforced to combat the data security incidents...

Firmware attack can drop persistent malware in hidden SSD area

Korean researchers have developed a set of assaults against some solid-state discs (SSDs) that could allow malware to be planted at a position beyond...

Most Read

Write For Us