SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
Cyber-attacks are evolving as you are reading this article; according to a study by the University of Maryland, hackers are now attacking computers and networks at a rate of one attack every 39 seconds. The 2020 Cyberthreat Defense Report by CyberEdge Group says that 81% of surveyed organizations were affected by a successful cyber-attack in 2019.…
Threat Emulation is the process of mimicking the TTFs of a specific threat. Threats of any variety can be emulated Zero-day or custom attacks Script kiddie to advanced adversary Emulation of specific threat (Botnets, DDOS, Ransomware, Specific Malware, APT, etc.) Scenario driven assessments are typically driven by emulation of some level of threat. This may…
The Internet we know is just a fraction of what’s out there in the cyberspace. People often confuse the surface web, deep web and dark web, especially in connection with cybercrime and where that comes from. The deep web and the dark web are two distinctly different things. The dark web is merely dark because of its…
Living in the cyber-based world of ours these days, no one can deny the effect of the internet and cyber world on our lives. Nearly 4.5 billion people out of 7.77 are considered active internet users nowadays and around 1.75 billion websites exist on the internet, providing a wide range of content and services. Besides…
Adversaries may use Obfuscated Files or Information to hide artifacts of an intrusion from the analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality of malware, Scripting, PowerShell, or by using utilities present on the system. One…
Attacks are continuously developing and expanding; thus, protecting your organization from threats, cyber-attacks, and data breaches must be a top priority. Other than technology, organizations will also need qualified security experts who can proficiently manage security-based alerts and scenarios. The main goals and responsibilities of a SOC team are continuously monitoring security, detecting, analyzing, and…
Command and Control Tiers Designing a robust command and control infrastructure involves creating multiple layers of command and control. This can be described as tiers. Each tier offers a level of capability and covertness. The idea of using multiple tiers is the same as not putting all your eggs in one basket. If c2 is…
With the growing technological world, cyberattacks are evolving to be more sophisticated than ever; furthermore, a lack of attention given to cyber threats—due to budget, technology, processes, and above all, the team of experts—has led to an increase in the number of successful malware attacks. Therefore, companies strive to implement rapid response to mitigate potential…
Windows Control Panel items are utilities that allow users to view and adjust computer settings. Control Panel items are registered executable (.exe) or Control Panel (.cpl) files, the latter are actually renamed dynamic-link library (.dll) files that export a CPlApplet function. Control Panel items can be executed directly from the command line, programmatically via an…
Cybercriminal activity is among the most significant challenges that humanity will face in the next two decades. In 2019, over 15.1 billion records were exposed. According to Cybercrime Ventures, the global cost of cybercrime will rise from US$3 trillion in 2015 to US$6 trillion by 2021. Cybercriminals steadily make efforts to attack and compromise sensitive corporate data;…