SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.

services.exe Windows process threat hunting tips

services.exe: One Of The Most Important Windows Processes For Threat Hunting

“services.exe” launches the Services Control Manager which is primarily responsible for handling system services including starting and ending services, and interacting with services. Services are defined in HKLM\SYSTEM\CurrentControlSet\Services. In this new series, we analyze Windows processes and provide threat hunting tips. “services.exe” is the parent process of svchost.exe, dllhost.exe, taskhost.exe,spoolsv.exe, etc.   This process interacts with…

Intel Logo

Intel Patches Security Vulnerabilities in Latest Update

Intel addressed medium and high-severity vulnerabilities in its April 2020 security update; the vulnerabilities in Intel software and firmware programs could potentially allow attackers to launch denial-of-service (DoS) attacks and enables escalation of privilege. Out of the 6 vulnerabilities Intel addressed in the security update published on April 14, 3 of them were patched, and…

Google Chrome Malicious Extensions

Google Removes 49 Malicious Chrome Extensions Used for Stealing Cryptocurrency

Google has removed 49 malicious Chrome browser extensions from its Web Store that contained codes used for hijacking cryptocurrency and stealing sensitive information. Cybersecurity researchers at MyCrypto and PhishFort discovered a range of malicious Chrome extensions targeting brands and cryptocurrency users. Google removed the malicious extensions within 24 hours. Some of the extensions have had…

Zoom Logo, wallpaper

Zoom Full Story: All the Controversies Surrounding the Popular Video Chat app

The controversial app Zoom has been making headlines in the cyber world recently. The app has become quite popular since the COVID-19 outbreak started; however, the security of the app is questioned as it has been recently making headlines in cybersecurity news numerous times. Videoconferencing software company Zoom provides an online communication platform for audio…

how to set up and run a Kerberos server threat hunting

How to Set Up a Kerberos Server

What is Kerberos Kerberos is an authentication protocol for allowing secure authentication over untrusted networks by using secret-key cryptography and trusted third parties.     Kerberos set up To set up and run a Kerberos server, you need three Linux systems; they should be able to communicate with each other, and they should also have…

vMware logo

VMware patched critical flaw on vCenter Server

VMware has fixed a critical vulnerability in its latest security update. The critical information-disclosure bug exists in the vCenter Server virtual infrastructure management platform.  “With vCenter Server, virtual environments are easier to manage: a single administrator can manage hundreds of workloads, more than doubling typical productivity when managing physical infrastructure,” says VMware. The vulnerability in…