DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis

@tachyeonz : One week ago today, the Shadow Brokers (an unknown hacking entity) leaked the Equation Group’s (NSA) FuzzBunch software, an exploitation framework similar to Metasploit.

Read More

Connect On:
Twitter :@tachyeonz

Advertisements

IoT and IIOT Cybersecurity Market Map

@tachyeonz : CB Insights has identified 78 private companies at the intersection of cybersecurity and connected hardware, which includes: critical infrastructure, mobile phones, connected devices, enterprise endpoints, and connected cars.

Read More

Connect On:
Twitter :@tachyeonz

Forth: The Hacker’s Language

@tachyeonz : Let’s start right off with a controversial claim: Forth is the hacker’s programming language. Coding in Forth is a little bit like writing assembly language, interactively, for a strange CPU architecture that doesn’t exist.

Read More

Connect On:
Twitter :@tachyeonz

Some autonomous cars will avoid being hacked by simply staying off the Internet

@tachyeonz : Self-driving cars are essentially large computers on wheels. No surprise, then, that some of them will be kept offline in the name of security.

Read More

Connect On:
Twitter :@tachyeonz

SCADA Security: Securing DNP3 Communications with Defense in Depth

@tachyeonz : Two things that make ICS cybersecurity different from IT security are the use of industrial-specific protocols like DNP3 and the common usage of endpoints like PLCs, IEDs and RTUs that are 15+ years old.

More

Tags : control systems, cyber security, cybersecurity, cyberwarfare, cyberweapons, dnp3, exploit, hack, ics, ics tools, iec 61850, infosec, malawares, pentesting, plc, rtu, scada, smart grids, substations, virus, vulnerability, z

Published On:June 16, 2016 at 10:03PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Clustering the Threat Landscape

@tachyeonz : Much of threat intelligence is grouping together information to identify common traits in attackers. To that end, I wrote a quick python script to identify common indicators in reports in Alienvault’s OTX platform.

More

Tags : alienvault otx, classification, clustering, cyber security, cyberwarfare, cyberweapons, dataviz, hacking, landscape, machine learning, malawares, malicious ip, pentest, pentesting, python, signatures, threatcrowd, unsupervised learning, virus, z

Published On:March 29, 2016 at 03:03PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

ALGORITHM: The Hacker Movie

@tachyeonz : Get the Blu-ray for $19.99 in the U.S. with free shipping! http://bit.ly/2ikKPjW freelance computer hacker breaks into secret government contractor and downloads a program. He must choose between his own curiosity and the lives of his friends.

More

Tags : algorithms, apt, brute force cracking, cyber security, cyberwarfare, cyberweapons, darknet, hacked, hackers, hacking, infosec, leaked passwords, m, malawares, mitm, movie, password hash cracker, pentest, pentesting, phishing, tailored acces program, tao, videos, virus

Published On:December 30, 2016 at 06:45PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

The Darknet: A Quick Introduction for Business Leaders

@tachyeonz : When companies are hacked and their data is stolen, that data often appears for sale on the so-called darknet.

More

Tags : cyber security, darknet, dnm, forum, hacking, leaked passwords, m, malawares, marketplace, message boards

Published On:December 26, 2016 at 03:54PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

How to learn Hacking?

@tachyeonz : This is a question I receive almost daily either on Quora, Facebook, Twitter or in real life. I wasted two years trying to find good stuff related to hacking and I don’t want others to do the same. Today, I plan to answer this question, “How to learn Hacking?” to my best ability.

Click here to read more

Tags : #books, #courses, #forensics, #hacking, #intrusiondetection, #learning, #malawares, #pentesting, #tutorials, #videos, #vunerability, m

Published On:December 15, 2016 at 09:49PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

IoT and IIOT Cybersecurity Market Map

@tachyeonz : CB Insights has identified 78 private companies at the intersection of cybersecurity and connected hardware, which includes: critical infrastructure, mobile phones, connected devices, enterprise endpoints, and connected cars.

Click here to read more

Tags : #antivirus, #cybersecurity, #firewall, #hacking, #ics, #iiot, #industrialautomation, #industrialinternet, #iot, #landscape, #malawares, #scada, #vunerability, m

Published On:December 09, 2016 at 03:50AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

LuaBot: Malware targeting cable modems

@tachyeonz : In order to understand how the malware works, let’s mix some manual and dynamic analysis. Time to analyse the binary using IDA Pro and… First, we need to export the symbols from uClibC’s Puma5 toolchain.

Click here to read more

Tags : #botnets, #cybersecurity, #hacking, #lua, #malawares, #modems, #reverseengineering, #routers, m

Published On:December 08, 2016 at 11:05AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Exclusive: U.S. Air Force Inks $19 Million Cybersecurity Deal

@tachyeonz : The United States Air Force has awarded an $18.8 million contract for digital defense software to Endgame, the cybersecurity firm told Fortune.

Click here to read more

Tags : #criticalinfrastructure, #cybersecurity, #cyberwarfare, #deeplearning, #endgame, #malawares, #usaf, m

Published On:December 08, 2016 at 01:28AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz