Best of CybersecurityDecember 2024

  1. 1
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·1y

    Build Your Own Secure VPN

    Learn how to create your own secure and private VPN using Azure Cloud and OpenVPN Access Server. The guide outlines the steps from signing up as a student for free Azure credits to setting up a virtual machine and configuring the VPN server. This enables enhanced data privacy and security, avoiding costs associated with third-party VPN services.

  2. 2
    Article
    Avatar of thnThe Hacker News·1y

    New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

    New Glutton malware has been discovered exploiting popular PHP frameworks like Laravel and ThinkPHP. Linked to the Winnti group, the malware harvests sensitive information, plants backdoors, and employs unconventional methods, including targeting cybercriminals. The attack chain involves modules to assess the environment and infect systems, while modifying system files for persistence. It includes a fully-featured backdoor with 22 commands that further the malware's reach and effectiveness.

  3. 3
    Video
    Avatar of lowlevellearningLow Level Learning·1y

    i tried to warn you.

    A VPN service called Big Mama VPN has been found to misuse its users' IP addresses and network connections for potentially malicious activities. The service, which caters to users trying to gain advantages in VR games, routes traffic through users' home networks, allowing commercial clients to hide their online activities. Despite its seemingly legitimate appearance, this VPN poses serious security and privacy risks. Researchers from Cisco Talos and Trend Micro have highlighted vulnerabilities and unauthorized access issues associated with the service. Users are warned against trusting free or cheap VPNs due to potential compromises in privacy and security.

  4. 4
    Article
    Avatar of baeldungBaeldung·1y

    Introduction to Apache Accumulo

    Apache Accumulo is a powerful, distributed key-value store designed for handling massive datasets with fine-grained security. Developed originally by the NSA and based on Google's Bigtable, it excels in scalability, performance, and security, enabling efficient data ingestion, retrieval, and processing. Accumulo supports cell-level security, server-side programming, and flexible data models, making it ideal for applications requiring strict access controls and large-scale data management.

  5. 5
    Video
    Avatar of davidbombalDavid Bombal·1y

    Satellite hacking (with real world example)

    The post discusses satellite hacking, including methods like orbital and terrestrial jamming, as demonstrated by a real-world example involving the Viasat attack during the Ukraine-Russia war. It highlights the growing importance of satellites in cyber warfare and cybersecurity, the vulnerabilities of VPN systems, and the necessity of cyber threat intelligence. The post also emphasizes the need for patch management and cautions against assuming VPN or Tor network provide complete security.

  6. 6
    Video
    Avatar of lowlevellearningLow Level Learning·1y

    the ban is coming

  7. 7
    Video
    Avatar of davidbombalDavid Bombal·1y

    Hacking websites (great demos) with XML External Entities (XXE)

    David Bumble hosts Tiberius, a well-known web app pentester and content creator, to discuss and demonstrate XML External Entities (XXE) vulnerabilities. Tiberius explains the basics of XXE, its potential risks such as server-side request forgery (SSRF) and file inclusion, and shares practical demonstrations including error-based and out-of-band XXE exploitation. The session also covers the use of Dynamic DTD for easier exploitation and the importance of proper XML parser configuration to mitigate these vulnerabilities. Links to Tiberius's YouTube channel and GitHub repository are provided for further learning and tool access.

  8. 8
    Article
    Avatar of lobstersLobsters·1y

    You can’t get more adversarial than PvP MMORPGs

    PvP MMORPGs face numerous security challenges, including network-level attacks, client-level cheating, and economic exploits. Mitigation strategies include using encryption, validating packets, setting rate limits, obfuscating traffic, and performing rigorous security assessments. It's crucial to avoid trusting client inputs and to implement strong authentication methods. Duplication of items and currency due to poor transaction handling can critically impact game economies. Balancing combat mechanics and curbing exploits like aimbots, teleportation hacks, and random number generator (RNG) manipulation are also essential to maintaining game integrity.

  9. 9
    Article
    Avatar of infosecwriteupsInfoSec Write-ups·1y

    How Black Hat Use Cookies to Steal Your Identity

    Cookies are small files that store information about you, such as session details. Attackers can steal your cookies through methods like accessing your device, phishing scams, or purchasing them from third parties. To protect yourself, avoid using public networks, consider more secure browsers like Brave instead of Chrome, delete browsing sessions and cookies often, and limit the permission websites have to save your information.

  10. 10
    Article
    Avatar of cpresearchCheck Point Research·1y

    Inside Akira Ransomware’s Rust Experiment

    Akira ransomware has evolved with a new variant called 'Akira v2' written in Rust, which targets ESXi servers. Rust's executables are challenging to reverse-engineer due to deep in-lining and optimization, complicating analysis. Akira's control flow involves multi-threading and sophisticated file encryption using SOSEMANUK and curve25519 ciphers. This publication details the analysis and disassembly of Akira's control flow and code structure.

  11. 11
    Article
    Avatar of collectionsCollections·1y

    Building Your Home Cybersecurity Lab for Pentesting: Setting Up with VirtualBox, VMware Workstation, and VulnHub

    Creating a home cybersecurity lab with virtual machines is essential for practicing penetration testing and ethical hacking. This guide covers setting up the lab using platforms like VulnHub and virtualization tools such as VMware Workstation and VirtualBox. Key steps include configuring a Host-Only Network Adapter, importing vulnerable machines, and performing network scans to identify vulnerabilities.

  12. 12
    Article
    Avatar of jacobianJacob Kaplan-Moss·1y

    An introduction to thinking about risk

    Risk involves the potential for both benefit and loss, impacting various aspects of life and work. Understanding risk requires breaking it down into likelihood and impact. Though quantitative methods exist, simpler qualitative approaches often suffice for practical analysis. Effective risk management can aid in better decision-making and understanding safety in different scenarios.