4 December 2023
Fake Job Posts on LinkedIn.
#
Always be alert, suspicious and verify before even clicking.
#
There’s been several posts in the media, articles and blogs by people describing how LinkedIn is being used to recruit, deceive, or scam job seekers.
I am receiving emails with job offers with “High experience match”, “High skills match”, or “Be first to apply” LinkedIn [pretend] labels.
I checked “Fudan University” in Hafnarfjörður (On-site) under the Icelandic Yellow Pages, nothing found:
“Engar niðurstöður fundust fyrir „fudan university“
Ástæðan gæti verið að leitarorðið er rangt skrifað eða ekki á skrá.”
Google Translate:
“No results found for “fudan university”
The reason could be that the keyword is misspelled or not in the file.”
https://ja.is/?q=fudan%20university
...
24 March 2023
Organizations and institutions are shifting gears to address the use of AI in their respective fields. I’m happy to see that ACM is looking for feedback to update the authorship policy.
====
ACM is updating its authorship policy to address the use of Artificial Intelligence tools for authoring research papers and to provide clear guidelines to the community for the appropriate use of these tools in ACM Publications.
The ACM Publications Board which oversees ACM Publications Policy is seeking your feedback on this draft policy. Your valued feedback will be shared with and considered carefully by the ACM Publications Board prior to finalizing the updated policy.
...
14 March 2023
Kali Purple.
#
This is a defensive security distro.
It includes a new tools:
- Arkime full packet capture
- Cyberchef
- Elasticsearch SIEM
- GVM vulnerability scanner
- TheHive incident response platform
- Malcolm
- Suricata IDS
- Zeek ID
From the DevOps perspective, this one caught my attention is Kubernetes-Helm - An open-source Kubernetes package management platform.
https://gitlab.com/kalilinux/kali-purple/documentation/-/wikis/home
#security #cybersecurity #kalilinux #devops #kubernetes
3 March 2023
Github has now free secret scanning and alerts (on public repos). It’s always beneficial to have visibility. Intentionally, by mistake, temporarily, secrets often find their way into repos. #github #secrets #devops #devsecops #security #cybersecurity
https://github.blog/2023-02-28-secret-scanning-alerts-are-now-available-and-free-for-all-public-repositories/
17 February 2023
Very interesting and positive move toward more vulnerability disclosures.
“A new Belgian law will allow ethical hackers to hack into the data of Belgian companies without any prior permission. Until now such practices could land you in jail.”
#vulnerability #disclosure #security #cybersecurity
https://www.vrt.be/vrtnws/en/2023/02/15/ethical-hackers-can-now-legally-hack-belgian-companies/
Source: LinkedIn Dr. Rey Leclerc Sveinsson
14 February 2023
Wow! 50 to 70 million request per second DDoS attack hindered by Cloudflare. “Targeted websites included a popular gaming provider, cryptocurrency companies, hosting providers, and cloud computing platforms.” #security #cybersecurity #ddos #cloudflare #cyberattack
https://thehackernews.com/2023/02/massive-http-ddos-attack-hits-record.html
6 February 2023
Fraud and Tragedies: a reminder
#
Fraudsters often take advantage of tragedies, like the recent earthquakes in #turkey and #syria. This is a friendly reminder to be specially mindful of phishing emails and fraudulent communications. Always verify URL links!
If you want to donate do it via official and known establishments.
#phishing #fraud #donate #donations #turquie #turquia #cybersecurityawareness #security #securityawareness
16 January 2023
Blogs, cybersecurity news sites, and resources I come across
#
Pentesting
#
Writing a report
#
Containers
#
News sites
#
OSINT Search Engines
#
Github projects
#
Certifications
#
Cybersecurity Search Engines
#
Daniel Kelly, 22 Aug 2023,
LinkedIn
- DeHashed—View leaked credentials.
- SecurityTrails—Extensive DNS data.
- DorkSearch—Really fast Google dorking.
- ExploitDB—Archive of various exploits.
- ZoomEye—Gather information about targets.
- Pulsedive—Search for threat intelligence.
- GrayHatWarfare—Search public S3 buckets.
- PolySwarm—Scan files and URLs for threats.
- Fofa—Search for various threat intelligence.
- LeakIX—Search publicly indexed information.
- DNSDumpster—Search for DNS records quickly.
- FullHunt—Search and discovery attack surfaces.
- AlienVault—Extensive threat intelligence feed.
- ONYPHE—Collects cyber-threat intelligence data.
- Grep App—Search across a half million git repos.
- URL Scan—Free service to scan and analyse websites.
- Vulners—Search vulnerabilities in a large database.
- WayBackMachine—View content from deleted websites.
- Shodan—Search for devices connected to the internet.
- Netlas—Search and monitor internet connected assets.
- CRT sh—Search for certs that have been logged by CT.
- Wigle—Database of wireless networks, with statistics.
- PublicWWW—Marketing and affiliate marketing research.
- Binary Edge—Scans the internet for threat intelligence.
- GreyNoise—Search for devices connected to the internet.
- Hunter—Search for email addresses belonging to a website.
- Censys—Assessing attack surface for internet connected devices.
- IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
- Packet Storm Security—Browse latest vulnerabilities and exploits.
- SearchCode—Search 75 billion lines of code from 40 million projects
Bug Bounty
#
How I’d Get Into Bug Bounty Hunting: A Practical Guide
#
Daniel Kelly, Apr 22, 2023
Daniel Kelly
...
12 January 2023
Podcasts I come across
#
Security, Cybersecurity
#
DevOps, DevSecOps
#
10 January 2023
Cybersecurity Tabletop Exercise
#
Here’s a useful resource on #cybersecurity #tabletop exercises.
Something that should be done regularly in companies. Thank you @LisaForteUK et al.
https://red-goat.com/cybersecurity-tabletop-exercise/