Linkedin

Fake Linked on Job Posts

Fake Job Posts on LinkedIn. #

Always be alert, suspicious and verify before even clicking. #

There’s been several posts in the media, articles and blogs by people describing how LinkedIn is being used to recruit, deceive, or scam job seekers.

I am receiving emails with job offers with “High experience match”, “High skills match”, or “Be first to apply” LinkedIn [pretend] labels.

I checked “Fudan University” in Hafnarfjörður (On-site) under the Icelandic Yellow Pages, nothing found: “Engar niðurstöður fundust fyrir „fudan university“ Ástæðan gæti verið að leitarorðið er rangt skrifað eða ekki á skrá.” Google Translate: “No results found for “fudan university” The reason could be that the keyword is misspelled or not in the file.” https://ja.is/?q=fudan%20university

...

ACM Policy AI Survey

Organizations and institutions are shifting gears to address the use of AI in their respective fields. I’m happy to see that ACM is looking for feedback to update the authorship policy.

====

ACM is updating its authorship policy to address the use of Artificial Intelligence tools for authoring research papers and to provide clear guidelines to the community for the appropriate use of these tools in ACM Publications.

The ACM Publications Board which oversees ACM Publications Policy is seeking your feedback on this draft policy. Your valued feedback will be shared with and considered carefully by the ACM Publications Board prior to finalizing the updated policy.

...

Kali Purple

Kali Purple.
#

This is a defensive security distro. It includes a new tools:

  • Arkime full packet capture
  • Cyberchef
  • Elasticsearch SIEM
  • GVM vulnerability scanner
  • TheHive incident response platform
  • Malcolm
  • Suricata IDS
  • Zeek ID
    From the DevOps perspective, this one caught my attention is Kubernetes-Helm - An open-source Kubernetes package management platform.
    https://gitlab.com/kalilinux/kali-purple/documentation/-/wikis/home #security #cybersecurity #kalilinux #devops #kubernetes

Vuln Disclosure Belgium - Feb17

Very interesting and positive move toward more vulnerability disclosures. “A new Belgian law will allow ethical hackers to hack into the data of Belgian companies without any prior permission. Until now such practices could land you in jail.” #vulnerability #disclosure #security #cybersecurity https://www.vrt.be/vrtnws/en/2023/02/15/ethical-hackers-can-now-legally-hack-belgian-companies/

Source: LinkedIn Dr. Rey Leclerc Sveinsson

Fraud Tragedies

Fraud and Tragedies: a reminder #

Fraudsters often take advantage of tragedies, like the recent earthquakes in #turkey and #syria. This is a friendly reminder to be specially mindful of phishing emails and fraudulent communications. Always verify URL links!

If you want to donate do it via official and known establishments.

#phishing #fraud #donate #donations #turquie #turquia #cybersecurityawareness #security #securityawareness

Cybersecurity Resources

Blogs, cybersecurity news sites, and resources I come across #

Pentesting #

Writing a report #

Containers #

News sites #

OSINT Search Engines #

Github projects #

Certifications #

Cybersecurity Search Engines #

Daniel Kelly, 22 Aug 2023, LinkedIn

  1. DeHashed—View leaked credentials.
  2. SecurityTrails—Extensive DNS data.
  3. DorkSearch—Really fast Google dorking.
  4. ExploitDB—Archive of various exploits.
  5. ZoomEye—Gather information about targets.
  6. Pulsedive—Search for threat intelligence.
  7. GrayHatWarfare—Search public S3 buckets.
  8. PolySwarm—Scan files and URLs for threats.
  9. Fofa—Search for various threat intelligence.
  10. LeakIX—Search publicly indexed information.
  11. DNSDumpster—Search for DNS records quickly.
  12. FullHunt—Search and discovery attack surfaces.
  13. AlienVault—Extensive threat intelligence feed.
  14. ONYPHE—Collects cyber-threat intelligence data.
  15. Grep App—Search across a half million git repos.
  16. URL Scan—Free service to scan and analyse websites.
  17. Vulners—Search vulnerabilities in a large database.
  18. WayBackMachine—View content from deleted websites.
  19. Shodan—Search for devices connected to the internet.
  20. Netlas—Search and monitor internet connected assets.
  21. CRT sh—Search for certs that have been logged by CT.
  22. Wigle—Database of wireless networks, with statistics.
  23. PublicWWW—Marketing and affiliate marketing research.
  24. Binary Edge—Scans the internet for threat intelligence.
  25. GreyNoise—Search for devices connected to the internet.
  26. Hunter—Search for email addresses belonging to a website.
  27. Censys—Assessing attack surface for internet connected devices.
  28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
  29. Packet Storm Security—Browse latest vulnerabilities and exploits.
  30. SearchCode—Search 75 billion lines of code from 40 million projects

Bug Bounty #

How I’d Get Into Bug Bounty Hunting: A Practical Guide #

Daniel Kelly, Apr 22, 2023 Daniel Kelly

...