Thursday 14 July 2022

Rootkits Attacks

What Is a Rootkit?

A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network.read more

Wednesday 13 July 2022

Web Server Types of Attacks

1) Scanning – Tools, such as Nmap and SuperScan, can be used.

2) Banner grabbing – Identifies the server and version. Netcat and Telnet are useful here.

3) Attacking the web server – The script kiddies’ dream would be to find unpatched servers or discover a recently discussed vulnerability that hasn’t been patched yet. read more

Tuesday 12 July 2022

Eavesdropping Attack

Eavesdropping attacks occur through the interception of network traffic. An attacker can obtain passwords, credit card numbers, and other confidential information that a user might be sending over the network by eavesdropping. Eavesdropping can be passive or active. Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.

Active eavesdropping — A hacker actively grabs the information by disguising himself as a friendly unit and sending queries to transmitters. This is called probing, scanning, or tampering. read more



Monday 11 July 2022

Silver Sparrow malware

 What is Silver Sparrow malware?

Silver Sparrow is a malicious program targeting Mac OS operating systems. There are two versions of this malware, the key difference being the targeted OS architecture. Silver Sparrow's activity has been observed in the United States, United Kingdom, Canada, France, and Germany.

One variant of Silver Sparrow is designed for Intel x86_64 system architecture, the other for this and M1 ARM64. The latter is relatively new and, as such, is targeted somewhat less. As mentioned, this piece of malicious software is intended to infect systems with other malware, however, at the time of research, it has not been observed injecting compromised devices with any payloads. Therefore, the specific goals of cyber criminals behind Silver Sparrow are unknown. Likewise, it is unclear what potential damage the malware can cause. Additionally, some aspects of Silver Sparrow make its code easily modifiable, which makes it a versatile threat.read more

Sunday 10 July 2022

Cybersecurity Tools

Open-source cybersecurity tools are popular with IT people who want to either test the waters or have an innovative idea to experiment with. Cybersecurity Tools have a special place in the open-source market, for they meet most of the primary enterprise-grade security requirements. Though many tools do not provide the capabilities of the respective paid version, many newcomers use the free versions to learn and test before they purchase the full version. They also allow a great degree of freedom to customize if the user has the required skill set to modify the publicly available source code. Quite often they are used in combination with paid open-source tools to meet some unique business needs. Analytics Insights has curated the Top 10 open-source cybersecurity tools for businesses to deal with the snooping jacks.read more

Saturday 9 July 2022

SQL injection detection tools

 Netsparker

Netsparker is a web vulnerability management solution that includes SQLi detection as one of its many features. It also focuses on scalability, automation, and integration. The suite is built around a web vulnerability scanner and can be integrated with third-party tools. Operators don’t need to be knowledgeable in source code. The company also offers an SQL injection cheat sheet to help in mitigation efforts.

The Netsparker platform uses Proof-based Scanning technology to identify and confirm vulnerabilities, indicating results that are definitely not false positives. In addition to SQL injection, it can identify cross-site scripting (XSS) and other vulnerabilities in web applications, web services, and web APIs.read more

Friday 8 July 2022

Man-in-the-Middle (MitM) Attacks

 You may have heard the term ‘Man-in-the-middle (MiTM) Attack.’ You may even have a blurred idea of it. But you’re still wondering ‘What exactly is a Man-in-the-middle attack?’ Right? Let us hash it out for you. As implied in the name itself, this kind of attack occurs when an unauthorized entity places him/herself in between two communicating systems and tries to intercept the ongoing transfer of information. To put it simply, a MiTM attack is a modern-day version of bugging.

read more




Google Launches GUAC Open Source Project to Secure Software Supply Chain

Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...