Advertisement · 728 × 90

Posts by Dawood Sajjadi

Preview
Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested

Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested

1 year ago 10 7 0 0
Preview
Awseye - See Inside AWS Accounts Awseye tracks publicly accessible AWS data to help identify and secure known and exposed AWS resources. Empowering defenders with open-source intelligence.

AWS EYE!
so-called Shodan for AWS, an #OSINT and reconnaissance service that tracks and analyzes publicly accessible #AWS data.
awseye.com

1 year ago 0 0 0 0

@5tuxnet@infosec.exchange

2 years ago 2 0 0 0
Post image

‏ناسا از ۱۹ میلیارد کیلومتری یک ماشین رو که ۴۶ سال قبل به فضا پرتاب کرده میتونه آپدیت کنه اونوقت اَفتا وسازمان پدافند غیرعامل و وزارت ارتباطات (همون اطلاعات!) نمیتونند زیرساختهای کلیدی یک مملکت رو بروز نگه دارند طوریکه زندان اوین وشهرداری تهران زمان هک از ویندوز ۷ استفاده میکردند!

2 years ago 1 0 0 0
Post image

A study has found that Twitter verified blue check users pushed 74% of the most viral dis/misinformation surrounding the Israel-Hamas conflict over the past week.

2 years ago 2 0 0 0
Post image

‏ادوارد اسنودن در توییتی کنایه آمیز به نتانیاهو تلاش وی برای توسعه تجارت پرسود فروش جاسوس افزارهای اسراییلی به حکومتهای تمامیت خواه جهت هک گوشیهای فعالان حقوق بشر رو یادآور شد و در پایان به این حقیقت اشاره کرد که گویا این ابزارهای جاسوسی کارایی چندانی جهت جاسوسی از حماس ندارند!

2 years ago 3 0 0 0

25 Hard-Hitting Lessons from 17 Years in Cybersecurity by Mike Privette.
www.returnonsecurity.com/p/25-cyberse...

2 years ago 0 0 0 0
Preview
Sony Data Breach via MOVEit Vulnerability Affects Thousands in US Follow us on Twitter @Hackread - Facebook @ /Hackread

Sony confirms a data breach affecting thousands in the US after hackers exploited the infamous MOVEit vulnerability.
#Sony #Cybersecurity #CyberAttack #MOVEit #Vulnerability
www.hackread.com/sony-data-br...

2 years ago 4 3 0 0
Preview
Outrage After 16-Year-Old Girl Hospitalized Following Reported Assault by “Hijab Guards” The Center for Human Rights in Iran (CHRI) is an independent, nonpartisan, nonprofit organization dedicated to the protection and promotion of human rights in Iran. CHRI investigates and documents rig...

📢Update regarding Armita Geravand, the 16-year-old who is currently hospitalized after reportedly being assaulted by hijab enforcement guards.
Report: iranhumanrights.org/2023/10/outr....
#ArmitaGeravand #Iran #آرمیتا_گراوند 🙏

2 years ago 3 3 0 0
Preview
The Mystery of Chernobyl’s Post-Invasion Radiation Spikes Soon after Russian troops invaded Ukraine in February 2022, sensors in the Chernobyl Exclusion Zone reported radiation spikes. A researcher now believes he’s found evidence the data was manipulated.

Exclusive: After Russia seized control of Chernobyl last year, radiation sensors started recording alarming spikes. There has been a growing mystery around what caused the spikes; none of the explanations plausible. Now @reversemode
has found patterns that suggest the spikes may have been fabricated

2 years ago 25 19 2 1
Advertisement
Post image

CISA says that half (54%) of the security incidents that impacted government agencies and critical infrastructure organizations in 2022 have been traced back to attackers using valid credentials to access the victim network. This includes credentials for admin accounts, VPN servers & other systems.

2 years ago 2 0 0 0
Post image

According to Shargh Daily, the price for uncensored mobile SIM card is about 1900 USD.

2 years ago 7 1 0 0
Post image

‏⁧‫#سپیده_رشنو‬⁩ ضمن انتشار عکس یک درِ شکسته، جزییاتی از هجوم شبانه مأموران به خانه، بازداشت و بازجویی شدن خود را شرح داد.

‏او نوشت:

‏چیزی شبیه تبر در را شکافت... گفتند جیغ نکش وگرنه گردنت را می‌‌شکنیم!»

‏روایت او از بازداشت، مربوط به تابستان ١۴٠١ است

2 years ago 6 2 0 0
Post image

‏اعتراض به گرانی و تورم در مقابل کانون بازنشستگان و مستمری‌بگیران تامین اجتماعی کرمانشاه

‏٢۵ تیر ١۴٠٢

2 years ago 0 1 0 0
Preview
Cyber attack on network at Attorney General’s office The Of­fice of the At­tor­ney Gen­er­al and Min­istry of Le­gal Af­fairs (AGLA) has de­tect­ed a cy­ber at­tack on its net­work.

Anywhere can be a target of a #CyberAttack regardless of the geographical location as far as being connected to the Internet.

A cyber-attack crippled operations of Trinidad and Tobago Justice Ministry. It took down email servers & online court system.

2 years ago 0 0 0 0
Post image

‏پیش بینی میشه تا سال ۲۰۳۱ هر ۲ ثانیه یک حمله باج افزاری صورت بگیره. خسارت ناشی از این حملات در سال ۲۰۲۱ بالغ بر ۲۰ میلیارد بوده و این رقم تا سال ۲۰۳۱ به ۲۶۵ میلیارد دلار خواهد رسید. میانگین هزینه ای که هر حمله باج افزاری به شرکتهای قربانی تحمیل میکنه چیزی حدود ۱۰ میلیون دلاره

2 years ago 1 0 0 0

Learning without Thinking is useless, and Thinking without Learning is dangerous.

2 years ago 2 0 0 0
Advertisement
Preview
Israel helped UAE fend off major cyberattack, Emirati cyber chief says Israel's cyber chief called on top international cyber officials to work together to stop Iranian and Hezbollah hackers “from their attacks on the world.”

Israel's cyber chief called on top international cyber officials to work together to stop Iranian and Hezbollah hackers “from their attacks on the world.”

2 years ago 1 0 0 0

‏که اکثرشون ازطریق تبلیغات نمایش داده شده توسط موتور جستجوی گوگل سیستم قربانیان رو آلوده کردند. پس اینو بخاطر پسپارید که هر تبلیغ یا نتیجه جستجو که سرچ گوگل بهتون نمایش میده الزاما اَمن نیست. بروز نگه داشتن سیستم و مرورگرتون و عدم دانلود ابزار ناشناس این ریسک رو بشدت کاهش میده.۲/۲

2 years ago 1 0 0 0
Preview
Malvertising: A stealthy precursor to infostealers and ransomware attacks Malvertising, the practice of using online ads to spread malware, can have dire consequences—and the problem only seems to be growing.

‏انتشار بدافزار و باج افزار از طریق تبلیغات آنلاین یکی از تکنیکهای بسیار شایع برای نفوذ و ⁧‫#هک‬⁩ شرکتهای خصوصی و دولتی است که اصطلاحا Malvertising نامیده میشه. جالبه بدونید تنها در شش ماهه اول امسال بیش از ۸۰۰ کمپین از نوع مَلوِرتایزینگ شناسایی شدند ۱/۲

2 years ago 2 0 1 0
Preview
GitHub - SpiderLabs/snappy Contribute to SpiderLabs/snappy development by creating an account on GitHub.

Security firm Trustwave has open-sourced a tool named SNAPPY that can detect rogue or fake WiFi wireless access points.

Simple and Efficient Code.

2 years ago 0 0 0 0
Preview
Wagner vehicles reach Lipetsk Oblast, 400 kilometers south of Moscow A column of Wagner military vehicles en route to Moscow have reached Lipetsk Oblast, putting them within around 400 kilometers of the capital. Reuters reported that Wagner vehicles were moving toward ...

Wagner vehicles reach Lipetsk Oblast, 400 kilometers south of Moscow

2 years ago 0 1 0 0

4 Linux Distributions including tools for Digital Forensics and Incident Response (DFIR) operations.

1. SIFT Linux
sans.org/tools/sift-wor…
2. CAINE Linux
caine-live.net/page5/page5.ht…
3. REMnux
docs.remnux.org/install-distro…
4. Paladin Linux
sumuri.com/product/paladi…

2 years ago 0 1 0 0

The #OWASP Foundation is working on an OWASP Top 10 list to showcase the most dangerous #security risks involved in working with Large Language Model (#LLM) applications. A draft v0.1 document is already live.

2 years ago 0 0 0 0
Post image

Got the second #scam request (with a poor quality) just in a day! Not sure where from my number got leaked.

2 years ago 0 0 0 0
Advertisement
Preview
Swiss company sells spy software to Arab intelligence services The company In The Cyber is involved in spying on cell phones and computers. It is supported by the Ticino University of Applied Sciences and Arts, as well as the federal government – even though this spy software is to be sold to states in the Middle East or Africa.

A #Swiss company is developing and selling #hacking tools to governments in the Middle East, Africa, and Asia. Named In The #Cyber, the company is known for acquiring Italian spyware maker HackingTeam in 2019, which it renamed to #MementoLabs.

2 years ago 0 0 0 0
Preview
AI-Threatened Jobs Are Mostly Held by Women, Study Shows While artificial intelligence is seeding upheaval across the workforce, from screenwriters to financial advisors, the technology will disproportionately replace jobs typically held by women, according to human resources analytics firm Revelio Labs.

Research by human resources analytics firm found that AI disproportionately threatens jobs usually held by women. Researchers analyzed data from the National Bureau of Economic Research and found women generally hold many jobs facing automation, like bill and account collectors and payroll clerks.

2 years ago 0 0 0 0
Post image

‏دفتر حسابرسی دولت ⁧‫آمریکا‬⁩ در گزارشی اعلام کرد که ۴ وزارتخانه این کشور شامل کشاورزی، خزانه داری، کار و امنیت داخلی از اعمال دستورالعملهای تدوین شده جهت بالابردن ضریب امنیت سرویسهای ابری خود بازماندند و ۳۵ توصیه در این زمینه به آنها ارائه کرد.

‏این است فرق بین شفافیت و لاپوشانی...

2 years ago 0 0 0 0
Post image

My weekend reading, “YOU Squared” by Price Pritchett

“Trying harder isn’t necessarily the solution to achieving more. Forget about incremental or gradual change & focus on a Quantum Leap.”

2 years ago 0 0 0 0
Preview
Zoom executives knew about key elements of plan to censor Chinese activists Pressured by the Chinese government to comply with censorship guidelines, Zoom drafted guidelines to suppress content critical of Beijing.

Zoom's top management knew that a part of the company's Chinese staff was working with the Chinese government to censor Zoom communications on sensitive topics, including Zoom's international userbase and not just China's internal market.

https://cyberscoop.com/zoom-china-doj-eric-yuan/

2 years ago 0 0 0 0