8Bit Security
banner
8bitsecurity.mastodon.social.ap.brid.gy
8Bit Security
@8bitsecurity.mastodon.social.ap.brid.gy
News, insights, and knowledge sharing for all-around Cyber Security! We’re your go-to source to stay one byte ahead of digital threats. Follow us and stay up to […]

🌉 bridged from ⁂ https://mastodon.social/@8bitsecurity, follow @ap.brid.gy to interact
💣 Starting today, the Daily Term is live!

A daily challenge designed for cybersecurity enthusiasts, professionals, and students:

> One term per day.
> Six attempts.
> No registration required.

A simple way to keep your technical vocabulary sharp and learn […]

[Original post on mastodon.social]
January 13, 2026 at 7:55 AM
[🇮🇹 ] Come Scoprire se la tua Organizzazione è nel Dark Web

Comprendere quali sono gli indicatori tecnici e comportamentali che suggeriscono che un data leak sia stato pubblicato o messo in vendita è oggi una competenza cruciale per i team di sicurezza […]

[Original post on mastodon.social]
October 19, 2025 at 8:04 AM
😈 How to Compromise an Air-Gapped System?
Air-gapped systems, being physically isolated from the internet, often run outdated software. To install or update applications on these machines, operators may resort to using removable devices such as USB drives
It […]

[Original post on mastodon.social]
October 16, 2025 at 7:27 AM
[🇮🇹 ] 😈 Top 5 Tecniche per Monitorare il Dark Web e Raccogliere e Automatizzare Intelligence (OSINT)

5 tecniche pratiche per monitorare il Dark Web, con esempi concreti di strumenti, piccoli script e pipeline di automazione. L’obiettivo non è “navigare per […]

[Original post on mastodon.social]
October 4, 2025 at 7:18 AM
🕵 What is Cross-Site Scripting (XSS)?
Cross-Site Scripting (XSS) is a client-side code injection attack. The attacker seeks to execute malicious scripts within the victim’s browser by embedding harmful code into a legitimate web page or web application
The […]

[Original post on mastodon.social]
September 30, 2025 at 8:12 AM
😈 Vibe Hacking: how hackers leverage Claude for cyberattacks

Claude AI has become one of the most widely known and used models worldwide. Despite AI companies are constantly working on improving the safety and security of models to prevent misuse […]

[Original post on mastodon.social]
September 27, 2025 at 7:46 AM
🔎 How to Scrape Telegram for CTI and SOC activities
An encrypted and decentralized communication platform like Telegram is ideal for coordination, exchanging attack tools, sharing information on zero-day vulnerabilities, and even selling stolen data
For a SOC […]

[Original post on mastodon.social]
September 21, 2025 at 7:06 AM
Buffer Overflow Attack
A buffer overflow is a vulnerability that occurs when a program writes more data into a buffer than it can hold, thereby exceeding its allocated memory boundaries. This behavior may result in the overwriting of adjacent memory areas […]

[Original post on mastodon.social]
September 18, 2025 at 6:36 AM
🔎 Google Vulnerability that allows to delete pages from Google Search

In the cybersecurity scenarios we usually encounter, we would hardly take into consideration SEO and Google’s search results. But if a malicious actor had the ability to remove from the […]

[Original post on mastodon.social]
September 15, 2025 at 6:47 AM
🔝 Top 5 Malware Sold on the Dark Web in 2025: What They Are and How Much They Cost

The malware market is growing, with offerings that are increasingly accessible even to those with minimal skills. Some even operate as subscription-based services. Here are […]

[Original post on mastodon.social]
September 7, 2025 at 8:23 AM
👾 🔥 DDoS-as-a-Service: Buying a DDoS Attack on Telegram for Just a Few Dollars

DDoS attacks are on the rise thanks to DDoS-for-hire services available on the dark web and Telegram. These attacks use botnets to overwhelm services and can target any device […]

[Original post on mastodon.social]
September 4, 2025 at 7:22 AM
😈 🔎 How to Extract Passwords from Windows with Volatility Forensics

Volatility in Digital Forensics: how to use the framework to analyze memory dumps from Windows systems, perform forensic RAM analysis, and examine active connections, running processes […]

[Original post on mastodon.social]
August 30, 2025 at 8:12 AM
Top 10 Must Know OSINT Tools for Cybersecurity in 2025

A list of the top 10 Open Source Intelligence (OSINT) tools for cybersecurity. Let’s explore the essential tools for collecting and analyzing OSINT data in intelligence activities, aimed at understanding […]

[Original post on mastodon.social]
August 28, 2025 at 10:16 AM
🔝 5 Essential Tools for Malware Analysis
In the world of cybersecurity, malware analysis is a critical challenge to ensure the security of networks and computer systems. This article presents five often-overlooked but essential tools for analysts and […]

[Original post on mastodon.social]
August 26, 2025 at 6:25 AM
🔎 😈 Creating a Secure Environment for Malware Analysis: from Sandboxes to Internet Simulation

In this article, we’ll cover how to create a virtual machine using VirtualBox, install Flare-VM, use Remnux as a Linux distribution for malware analysis, and […]

[Original post on mastodon.social]
August 22, 2025 at 7:58 AM
📱 ✉️ 𝗤𝘂𝗶𝘀𝗵𝗶𝗻𝗴: 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝗗𝗲𝗹𝗶𝘃𝗲𝗿𝗲𝗱 𝘃𝗶𝗮 𝗤𝗥 𝗖𝗼𝗱𝗲𝘀
An increasingly common cyber threat, executed in three simple steps:

The attacker sends a spam message containing a disguised QR code.

The user scans the code using their smartphone, a device typically less […]

[Original post on mastodon.social]
August 16, 2025 at 6:54 AM
𝗨𝘀𝗲𝗳𝘂𝗹 𝗙𝗲𝗮𝘁𝘂𝗿𝗲𝘀 𝘁𝗼 𝗞𝗻𝗼𝘄 𝗔𝗯𝗼𝘂𝘁 𝗕𝘂𝗿𝗽 𝗦𝘂𝗶𝘁𝗲 🔥

🎯Burp Suite is an integrated platform for testing the security of web applications. It primarily functions as a proxy between the browser and the server, allowing users to intercept, modify, and analyze HTTP/S […]

[Original post on mastodon.social]
August 14, 2025 at 9:17 AM
🎣 MitM phishing is an advanced cyberattack in which a threat actor intercepts communication between a user and a legitimate website, capturing credentials and multi-factor authentication (MFA) codes in real time. This technique effectively bypasses MFA by […]

[Original post on mastodon.social]
August 12, 2025 at 6:57 AM
🔍 🛡️ What is ARP Poisoning and how does it work?
ARP poisoning is a cyber attack that exploits the ARP (Address Resolution Protocol) to manipulate communications within a local network.

🎯 Save the post to have it handy at all times!

🔗 […]

[Original post on mastodon.social]
August 11, 2025 at 9:09 AM
🚨 🎣 PHISHING ALERT!

We have identified a phishing campaign targeting Mastodon users.
The attackers' goal is to convince users to click on a link, take them to a fake payment page, and steal their credit card details.

Watch the video and avoid falling into […]

[Original post on mastodon.social]
August 8, 2025 at 12:54 PM
🚨 𝗧𝗵𝗲 𝗡𝗧𝗟𝗠 𝗥𝗲𝗹𝗮𝘆 𝗔𝘁𝘁𝗮𝗰𝗸 is a technique that exploits the NTLM protocol to capture sensitive information. An attacker sends a phishing email with an HTML attachment (or a ZIP archive containing it); once opened, the system initiates an SMB connection to a […]

[Original post on mastodon.social]
August 7, 2025 at 7:54 AM
🔥 Cybersecurity Nutshells: concetti complessi spiegati in pochi secondi!

Niente articoli lunghi o video infiniti: le nostre Nutshells ti offrono spiegazioni rapide e chiare su temi chiave della sicurezza informatica, con GIF illustrate per capirli al volo […]

[Original post on mastodon.social]
July 31, 2025 at 8:51 AM
🔥 Cybersecurity Nutshells: complex concepts made simple—in seconds!
No time for long articles or videos? Our Nutshells break down key cybersecurity topics, threats, and attack techniques into quick, high-quality explainers, each paired with a clear […]

[Original post on mastodon.social]
July 31, 2025 at 8:50 AM
🔥 Vulnerability Intel Center: tutte le vulnerabilità note, in un unico punto.

Un hub sempre aggiornato con CVE, exploit, advisory e patch critiche. Trovi punteggi CVSS, vettori d’attacco, vendor, prodotti coinvolti e mitigazioni, il tutto filtrabile e […]

[Original post on mastodon.social]
July 28, 2025 at 4:42 PM
🔥 Vulnerability Intel Center: all you need to track known vulnerabilities in one place.

Stay on top of CVEs, exploits, advisories, and critical updates with a constantly updated hub. Get CVSS scores, attack vectors, vendors, affected products, public […]

[Original post on mastodon.social]
July 28, 2025 at 4:39 PM