Turning Specialized Platform Data Breaches into Defensive Insights

- Posted in Leak by
Background: Since the beginning of the internet, a variety of communities have existed, ranging from hacking and malware development groups to those involved in insider information sales and illegal [...] Read more

Mitigating the Risk: CVE-2024-39929 and Securing Exim Servers

- Posted in Hardenings by
Background: Exim is a mail transfer agent designed for Unix-like systems, providing flexible capabilities for managing your own email server. It serves as the entry point for email communication [...] Read more

The danger of leaked hash password from the perspective of defense in depth

- Posted in Leak by
Background: Before delving into the scope of leaked hashed passwords, it's important to understand the purpose of hashing. At a high level, hashing is a one-way function that transforms any input [...] Read more

RegreSSHion CVE-2024-6387 as a chunk of attack

- Posted in Incident Response by
Background: Qualys researchers have announced that a side effect, stemming from the default inclusion of OpenSSH in Ubuntu systems and widespread use in other distros, allowed them to achieve Remote [...] Read more

Understanding Supply Chain Attacks: The Case of Polyfill CDN

- Posted in Incident Response by
Background: A supply chain attack involving a popular JavaScript library being served over a dedicated content delivery network (CDN) could result in the injection of harmful code into web pages that [...] Read more

AI Trends: Exploitation by Infostealers and the Influence of Social Media

- Posted in Threat Analyze by
Background: It's a about a year, that threat actors started to abuse AI trends in a mix with social media , based on which they are spreading infostealers malware family via abusing social media [...] Read more
Page 3 of 3