Get Mystery Box with random crypto!

-CyberSecurityTechnologies-

Logo of telegram channel cybersecuritytechnologies — -CyberSecurityTechnologies- C
Logo of telegram channel cybersecuritytechnologies — -CyberSecurityTechnologies-
Channel address: @cybersecuritytechnologies
Categories: Technologies
Language: English
Subscribers: 7.24K
Description from channel

Welcome to -CyberSecurityTechnologies- Channel:
- BlueTeam (APT/OpSec/DFIR)
- Offensive Security (RedTeaming/TH/PenTesting)
- Reverse Engineering/Malware Analisys (TTPs)
- Web Security/DevSecOps
- Tools/PoC/Research
Tags: t.me/CyberSecurityTechnologies/2

Ratings & Reviews

2.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

0

1 stars

1


The latest Messages 10

2021-02-28 08:07:01 #Cloud_Security
1. How to protect sensitive data for its entire lifecycle in AWS
https://aws.amazon.com/ru/blogs/security/how-to-protect-sensitive-data-for-its-entire-lifecycle-in-aws
2. Downloading and Exploring AWS EBS Snapshots
https://rhinosecuritylabs.com/aws/exploring-aws-ebs-snapshots
75 views05:07
Open / Comment
2021-02-28 08:07:01 #Malware_analysis
Technical Analysis of Babuk Ransomware
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/babuk-ransomware
73 views05:07
Open / Comment
2021-02-27 14:16:05 #Blue_Team_Techniques
"A Forensic Analysis of the Encrypting File System", 2021.
129 views11:16
Open / Comment
2021-02-27 14:16:05 A Special Attack Surface in Android
1. Dialog Box
https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1351377961017942016
2. The dangerous deeplinks
https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1359026676922851328
124 views11:16
Open / Comment
2021-02-27 07:50:16 #Red_Team_Tactics
1. Grafana Admin Panel bypass in Google Acquisition
https://jayateerthag.medium.com/grafana-admin-panel-bypass-in-google-acquisition-virustotal-c5ecc9d7b8ae
2. Elevate Arbitrary WRMSR To Kernel Execution
https://githacks.org/_xeroxz/msrexec
124 views04:50
Open / Comment
2021-02-27 07:50:16 #Whitepaper
"Memory Forensics Using Volatility".
// This whitepaper is a guide to performing memory forensics using volatility. It goes into depth on using the Volatility framework to analyze memory dumped from a live system
126 views04:50
Open / Comment
2021-02-27 07:50:15 #Threat_Research
Middleware, middleware everywhere - and lots of misconfigurations to fix
https://labs.detectify.com/2021/02/18/middleware-middleware-everywhere-and-lots-of-misconfigurations-to-fix
126 views04:50
Open / Comment
2021-02-27 07:50:15 CVE-2021-1727:
Windows Installer Elevation of Privilege Vulnerability (PoC)
https://github.com/klinix5/CVE-2021-1727
126 views04:50
Open / Comment
2021-02-27 07:50:15 #Malware_analysis
1. Malspam pushes GuLoader for Remcos RAT
https://isc.sans.edu/forums/diary/Malspam+pushes+GuLoader+for+Remcos+RAT/27132
2. Hypervisor Jackpotting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact
https://www.crowdstrike.com/blog/carbon-spider-sprite-spider-target-esxi-servers-with-ransomware
123 views04:50
Open / Comment
2021-02-27 07:50:15 #Tech_book
"Mastering Python for Networking and Security. Second Edition", 2020.
119 views04:50
Open / Comment