SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
[vc_row][vc_column][vc_column_text]cmdkey.exe is an executable file that is a part of Sistema Operational Microsoft® Windows® developed by Supremo Tribunal Federal. The Windows version of the software: 6.1.7600.16385 (win7_rtm.090713-1255) is usually about 14848 bytes in size, but the version you have may differ. The .exe extension of a file name displays an executable file. In some cases,…
Apple and Google partner up to launch a “Contact Tracing” tool to trace the spread of COVID-19 through helping individuals determine if they have been exposed to someone infected with the Coronavirus. Apple and Google’s contact tracing tool uses Bluetooth technology to detect whether users have been in contact with someone who has tested positive…
“lsass.exe” stands for Local Security Authority Subsystem Service. In this new series, we analyze Windows processes and provide threat hunting tips. “lsass.exe” Windows process is responsible for a variety of security tasks including: Authenticating users and verifying user logins to a Windows computer or server. Creating the user’s access token. Managing the Active Directory. Writing to…
[vc_row][vc_column][vc_column_text]PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. Adversaries can use PowerShell to download malicious codes or upload sensitive information. With this free sigma rule, you can monitor network connections that originated from powershell.exe.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1586689705839{background-color: #000000 !important;}”][vc_column_text]title: Monitoring powershell.exe network connections description: with monitoring powershell network connections…
Cybersecurity researchers have discovered a new IoT botnet, tracked as Dark Nexus. The new botnet can be used to launch distributed denial-of-service (DDoS) attacks. Dark nexus has compromised hundreds of IoT devices, including routers from Dasan Zhone, Dlink, and ASUS, video recorders, and thermal cameras. Researchers from cybersecurity firm Bitdefender said in a post that the new…
Over 3.5 million iOS users have installed “fleeceware” from the Apple App Store. Cybersecurity firm, Sophos, discovered more than 30 fleeceware apps in Apple’s official App Store. The term “Fleeceware” refers to the kind of apps whose purpose is to overcharge users for the app features that provide very simple functions that are available on…
An ongoing phishing campaign is sending out fake security warning emails to Cisco Webex users urging them to update their Desktop app. The threat actors use an identical Cisco Webex login page to steal users’ credentials. With the COVID-19 pandemic going on, video conferencing applications such as Cisco Webex and Zoom have immensely become popular…
WhatsApp said on Tuesday that it would place new limits on the forwarding of messages to heighten security to spread misinformation related to the coronavirus pandemic. Messages that have been sent through a chain of five or more people, can only be sent to a single chat at a time. “We’ve seen a significant increase…
[vc_row][vc_column][vc_column_text]With this free sigma rule, you can detect BITS activity that is used in a malicious way. Microsoft BITS (Background Intelligent Transfer Service) is a tool present in all modern Microsoft Windows operating systems. As the name says, you can see it as a “curl” or “wget” tool for Windows. BITS helps to transfer files…
Cybersecurity experts found a solution for the unremovable xHelper malware that manages to re-install itself even after users delete it or factory-reset the infected devices, making it almost impossible to destroy. The malware was first spotted back in March 2019, and by August, it managed to infect more than 32,000 devices. It was reported in…