Hardenings

All the information related to assets technical hardening

T1590.001: Exposed Domain Registration Records – A Tool for Both Threat Actors and Cyber Defenders

- Posted in Hardenings by
Background: Before coming across this shared article, I noticed an interesting correlation: sometimes, domain registrar customers forget to enable email privacy. Once this oversight is discovered, [...] Read more

Windows Subsystem for Linux: Addressing Security Misconceptions and Risks

- Posted in Hardenings by
One of the great features of Windows is its ability to run Linux distributions through the Windows Subsystem for Linux (WSL). However, have you ever considered what actions you can perform in this [...] Read more

Attacks over typosquated domains and the way of detection

- Posted in Hardenings by
Background: At the core of many successful attacks lies a simple idea: exploiting human perceptual weaknesses combined with psychological manipulation. One common method to achieve this is by using [...] Read more

Mitigating the Risk: CVE-2024-39929 and Securing Exim Servers

- Posted in Hardenings by
Background: Exim is a mail transfer agent designed for Unix-like systems, providing flexible capabilities for managing your own email server. It serves as the entry point for email communication [...] Read more
Page 2 of 2