TECHNICAL Rhysida Ransomware Malware Analysis - Part 2: How to Decrypt In the second part of our malware analysis walkthrough of Rhysida ransomware, we will pick up where we left off from part 1 (analysis and debugging) and explore how to decrypt the ransomware.
OSINT Pastebin and Its Incidental OSINT Despite being a great OSINT tool, Pastebin remains misunderstood and underutilized.
human trafficking Featured Navigating the Cryptic Nature of Currency in Human Trafficking "Follow the money." We have all heard it at some point, especially if you are in the anti-human trafficking space. Yet, if only it was THAT simple. Let's pull this apart.
Top 3 Threats of 2024 and How To Protect Against Them Cyber security threats never stop. A technology gets created, a vulnerability is discovered within it, the vuln gets patched, only for a new vuln to be found – rinse, repeat. Based on numerous reports of the top threats in recent years and expected in 2024 (see “Resources” at the end of
Use OSINT to Investigate a Phishing Scam One of the greatest tools for infosec professionals to investigate and prevent phishing scams is actually just a collection of websites that produce information that is free and open to the public, also known as Open Source Intelligence (OSINT). This article will identify and explain several OSINT methods that are
Rhysida ransomware Malware Analysis - Part 1: Dynamic analysis This article is very different from one of my classic HTB walkthroughs. Driven by one of my greatest passions and by the recent articles of another Secjuice author, fairycn, whom I thank for his detailed series of articles on malware analysis and secprentice that gave the idea about the malware's
TECHNICAL HTB Photobomb Walkthrough Explore this step-by-step Hack The Box walkthrough on exploiting vulnerabilities to gain unauthorized access to a system.
OSINT Download Websites to Find OSINT Websites are full of useful information that is hidden in source code or small print in obscure subdomain. The following is an excerpt from the book, The OSINT Guide, by Thomas Caliendo. Here we will walk through how to discover Open Source Intelligence (OSINT) by downloading a website to search
INFOSEC Understanding the Implications of the Europcar Data Breach In recent years, data breaches have become a concerning trend, affecting companies across various industries. One such incident involved Europcar, a prominent car rental company, which was embroiled in controversy following claims of a massive data breach affecting millions of its customers. However, as investigations unfolded, it became apparent that
INFOSEC The CMMC Countdown: Why Your Company Needs to Prepare for 2025 Now, Part 1 Prepare your company for CMMC 2.0 compliance by 2025 with our guide on Azure tenant selection and System Security Plan creation to stay ahead in cybersecurity readiness.
INFOSEC Data Breaches and the Role of Stolen Credentials in 2023 Tom Caliendo unravels the intricate web of U.S. data breaches, spotlighting the rise of stolen credentials and the shadowy underworld of the dark web driving these cyber threats.
INFOSEC Featured Cyber Threat Intelligence Get a peak into Ross Moore's guide on Cyber Threat Intelligence (CTI), exploring its vital role in reshaping modern cybersecurity strategies.
TECHNICAL Featured An Introduction to Buffer Overflow #4: Overwriting the Stack Gurkirat Singh reveals how to overwrite the stack with buffer overflows and uncovers low-level vulnerabilities, providing detailed debugging insights.
INFOSEC Featured The Ethics of China's AI-Powered Surveillance State Discover the intricate dynamics of China's AI-driven surveillance state, exploring the convergence of facial recognition technology with governmental oversight and its profound implications on global human rights and individual privacy.
TECHNICAL HTB UpDown Walkthrough Explore how Andy From Italy tackles the Hack The Box UpDown challenge, a Linux-based machine featuring exposed SSH and Apache servers.
TECHNICAL Reverse Analysis on Windows - A First Look Dig deep into advanced debugging with Visual Studio and x64dbg: breaking and modifying game rules on Windows, and mastering single-step analysis and instruction edits for optimized code execution.
TECHNICAL Reverse Analysis on Windows - Hands-on 1 fairycn explores the intricate process of bypassing battery detection during BIOS upgrades on the Thankpad T430I using Windows 10, diving deep into reverse analysis with tools like x64dbg and gleaning insights from real-world troubleshooting challenges.
TECHNICAL x64dbg usage log: start debugging and modify a program Explore the comprehensive guide by fairycn on how to master x64dbg on Windows 11, from installation to advanced debugging techniques, ensuring effective program modifications and insightful CPU disassembly analysis.
TECHNICAL Reverse Analysis under Linux - A First Look Dive into the intricacies of reverse analysis on Linux with fairycn, mastering tools like gcc, edb-debugger, and ghidra in UOS Home Edition 21.3, while delving into command parsing, debugging, and decompilation techniques.
TECHNICAL Featured HTB Shared Walkthrough Andy From Italy gives a complete step-by-step guide on the Hack The Box Shared Walkthrough.
TECHNICAL Featured A Guide to Malware Analysis: Day 4 Security researcher fairycn reveals how to conduct malware analysis and mitigate malware threats from Word Macro viruses to Linux viruses, as well as exploit overflow vulnerabilities.
TECHNICAL A Guide to Malware Analysis: Day 3 Get deeper into malware analysis with security researcher fairycn and learn about dll injection, how to use the Huorong System Diagnostics Toolkit for monitoring, and how malware leverages networks for remote attacks.
TECHNICAL A Guide to Malware Analysis: Day 2 On day two of Malware Analysis, fairycn unveils program static analysis, string checking, PE structure, and linking methods, including tools and techniques for shelling, obfuscation, and anti-obfuscation.
TECHNICAL Featured A Guide to Malware Analysis: Day 1 Security researcher fairycn delivers a comprehensive guide to malware analysis, explaining how to understand and prevent computer viruses.
TECHNICAL An Introduction to Buffer Overflow #3 : (Un)Winding of Stack In the third part of the Buffer Overflow series, Gurkirat Singh delivers a detailed explanation on how to (un)wind a stack and prevent a type of buffer overflow attack called stack canaries. Pentesters and security enthusiasts will love this!