🌉 bridged from ⁂ https://mastodon.social/@8bitsecurity, follow @ap.brid.gy to interact
A daily challenge designed for cybersecurity enthusiasts, professionals, and students:
> One term per day.
> Six attempts.
> No registration required.
A simple way to keep your technical vocabulary sharp and learn […]
[Original post on mastodon.social]
A daily challenge designed for cybersecurity enthusiasts, professionals, and students:
> One term per day.
> Six attempts.
> No registration required.
A simple way to keep your technical vocabulary sharp and learn […]
[Original post on mastodon.social]
Comprendere quali sono gli indicatori tecnici e comportamentali che suggeriscono che un data leak sia stato pubblicato o messo in vendita è oggi una competenza cruciale per i team di sicurezza […]
[Original post on mastodon.social]
Comprendere quali sono gli indicatori tecnici e comportamentali che suggeriscono che un data leak sia stato pubblicato o messo in vendita è oggi una competenza cruciale per i team di sicurezza […]
[Original post on mastodon.social]
Air-gapped systems, being physically isolated from the internet, often run outdated software. To install or update applications on these machines, operators may resort to using removable devices such as USB drives
It […]
[Original post on mastodon.social]
Air-gapped systems, being physically isolated from the internet, often run outdated software. To install or update applications on these machines, operators may resort to using removable devices such as USB drives
It […]
[Original post on mastodon.social]
5 tecniche pratiche per monitorare il Dark Web, con esempi concreti di strumenti, piccoli script e pipeline di automazione. L’obiettivo non è “navigare per […]
[Original post on mastodon.social]
5 tecniche pratiche per monitorare il Dark Web, con esempi concreti di strumenti, piccoli script e pipeline di automazione. L’obiettivo non è “navigare per […]
[Original post on mastodon.social]
Cross-Site Scripting (XSS) is a client-side code injection attack. The attacker seeks to execute malicious scripts within the victim’s browser by embedding harmful code into a legitimate web page or web application
The […]
[Original post on mastodon.social]
Cross-Site Scripting (XSS) is a client-side code injection attack. The attacker seeks to execute malicious scripts within the victim’s browser by embedding harmful code into a legitimate web page or web application
The […]
[Original post on mastodon.social]
Claude AI has become one of the most widely known and used models worldwide. Despite AI companies are constantly working on improving the safety and security of models to prevent misuse […]
[Original post on mastodon.social]
Claude AI has become one of the most widely known and used models worldwide. Despite AI companies are constantly working on improving the safety and security of models to prevent misuse […]
[Original post on mastodon.social]
An encrypted and decentralized communication platform like Telegram is ideal for coordination, exchanging attack tools, sharing information on zero-day vulnerabilities, and even selling stolen data
For a SOC […]
[Original post on mastodon.social]
An encrypted and decentralized communication platform like Telegram is ideal for coordination, exchanging attack tools, sharing information on zero-day vulnerabilities, and even selling stolen data
For a SOC […]
[Original post on mastodon.social]
A buffer overflow is a vulnerability that occurs when a program writes more data into a buffer than it can hold, thereby exceeding its allocated memory boundaries. This behavior may result in the overwriting of adjacent memory areas […]
[Original post on mastodon.social]
A buffer overflow is a vulnerability that occurs when a program writes more data into a buffer than it can hold, thereby exceeding its allocated memory boundaries. This behavior may result in the overwriting of adjacent memory areas […]
[Original post on mastodon.social]
In the cybersecurity scenarios we usually encounter, we would hardly take into consideration SEO and Google’s search results. But if a malicious actor had the ability to remove from the […]
[Original post on mastodon.social]
In the cybersecurity scenarios we usually encounter, we would hardly take into consideration SEO and Google’s search results. But if a malicious actor had the ability to remove from the […]
[Original post on mastodon.social]
The malware market is growing, with offerings that are increasingly accessible even to those with minimal skills. Some even operate as subscription-based services. Here are […]
[Original post on mastodon.social]
The malware market is growing, with offerings that are increasingly accessible even to those with minimal skills. Some even operate as subscription-based services. Here are […]
[Original post on mastodon.social]
DDoS attacks are on the rise thanks to DDoS-for-hire services available on the dark web and Telegram. These attacks use botnets to overwhelm services and can target any device […]
[Original post on mastodon.social]
DDoS attacks are on the rise thanks to DDoS-for-hire services available on the dark web and Telegram. These attacks use botnets to overwhelm services and can target any device […]
[Original post on mastodon.social]
Volatility in Digital Forensics: how to use the framework to analyze memory dumps from Windows systems, perform forensic RAM analysis, and examine active connections, running processes […]
[Original post on mastodon.social]
Volatility in Digital Forensics: how to use the framework to analyze memory dumps from Windows systems, perform forensic RAM analysis, and examine active connections, running processes […]
[Original post on mastodon.social]
A list of the top 10 Open Source Intelligence (OSINT) tools for cybersecurity. Let’s explore the essential tools for collecting and analyzing OSINT data in intelligence activities, aimed at understanding […]
[Original post on mastodon.social]
A list of the top 10 Open Source Intelligence (OSINT) tools for cybersecurity. Let’s explore the essential tools for collecting and analyzing OSINT data in intelligence activities, aimed at understanding […]
[Original post on mastodon.social]
In the world of cybersecurity, malware analysis is a critical challenge to ensure the security of networks and computer systems. This article presents five often-overlooked but essential tools for analysts and […]
[Original post on mastodon.social]
In the world of cybersecurity, malware analysis is a critical challenge to ensure the security of networks and computer systems. This article presents five often-overlooked but essential tools for analysts and […]
[Original post on mastodon.social]
In this article, we’ll cover how to create a virtual machine using VirtualBox, install Flare-VM, use Remnux as a Linux distribution for malware analysis, and […]
[Original post on mastodon.social]
In this article, we’ll cover how to create a virtual machine using VirtualBox, install Flare-VM, use Remnux as a Linux distribution for malware analysis, and […]
[Original post on mastodon.social]
An increasingly common cyber threat, executed in three simple steps:
The attacker sends a spam message containing a disguised QR code.
The user scans the code using their smartphone, a device typically less […]
[Original post on mastodon.social]
An increasingly common cyber threat, executed in three simple steps:
The attacker sends a spam message containing a disguised QR code.
The user scans the code using their smartphone, a device typically less […]
[Original post on mastodon.social]
🎯Burp Suite is an integrated platform for testing the security of web applications. It primarily functions as a proxy between the browser and the server, allowing users to intercept, modify, and analyze HTTP/S […]
[Original post on mastodon.social]
🎯Burp Suite is an integrated platform for testing the security of web applications. It primarily functions as a proxy between the browser and the server, allowing users to intercept, modify, and analyze HTTP/S […]
[Original post on mastodon.social]
[Original post on mastodon.social]
[Original post on mastodon.social]
ARP poisoning is a cyber attack that exploits the ARP (Address Resolution Protocol) to manipulate communications within a local network.
🎯 Save the post to have it handy at all times!
🔗 […]
[Original post on mastodon.social]
ARP poisoning is a cyber attack that exploits the ARP (Address Resolution Protocol) to manipulate communications within a local network.
🎯 Save the post to have it handy at all times!
🔗 […]
[Original post on mastodon.social]
We have identified a phishing campaign targeting Mastodon users.
The attackers' goal is to convince users to click on a link, take them to a fake payment page, and steal their credit card details.
Watch the video and avoid falling into […]
[Original post on mastodon.social]
We have identified a phishing campaign targeting Mastodon users.
The attackers' goal is to convince users to click on a link, take them to a fake payment page, and steal their credit card details.
Watch the video and avoid falling into […]
[Original post on mastodon.social]
[Original post on mastodon.social]
[Original post on mastodon.social]
Niente articoli lunghi o video infiniti: le nostre Nutshells ti offrono spiegazioni rapide e chiare su temi chiave della sicurezza informatica, con GIF illustrate per capirli al volo […]
[Original post on mastodon.social]
Niente articoli lunghi o video infiniti: le nostre Nutshells ti offrono spiegazioni rapide e chiare su temi chiave della sicurezza informatica, con GIF illustrate per capirli al volo […]
[Original post on mastodon.social]
No time for long articles or videos? Our Nutshells break down key cybersecurity topics, threats, and attack techniques into quick, high-quality explainers, each paired with a clear […]
[Original post on mastodon.social]
No time for long articles or videos? Our Nutshells break down key cybersecurity topics, threats, and attack techniques into quick, high-quality explainers, each paired with a clear […]
[Original post on mastodon.social]
Un hub sempre aggiornato con CVE, exploit, advisory e patch critiche. Trovi punteggi CVSS, vettori d’attacco, vendor, prodotti coinvolti e mitigazioni, il tutto filtrabile e […]
[Original post on mastodon.social]
Un hub sempre aggiornato con CVE, exploit, advisory e patch critiche. Trovi punteggi CVSS, vettori d’attacco, vendor, prodotti coinvolti e mitigazioni, il tutto filtrabile e […]
[Original post on mastodon.social]
Stay on top of CVEs, exploits, advisories, and critical updates with a constantly updated hub. Get CVSS scores, attack vectors, vendors, affected products, public […]
[Original post on mastodon.social]
Stay on top of CVEs, exploits, advisories, and critical updates with a constantly updated hub. Get CVSS scores, attack vectors, vendors, affected products, public […]
[Original post on mastodon.social]