Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence

Welcome back, aspiring cyberwarriors!   In the complex realm of cybersecurity, professionals face a continuously evolving landscape of digital threats. To address this challenge, MalwareBazaar was introduced as a collaborative defense platform, revolutionizing the way cybersecurity experts analyze and combat malicious software.   Conceived by abuse.ch, a distinguished Swiss cybersecurity research organization, MalwareBazaar collects known […]

Continue Reading

Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics

Welcome back, my aspiring cyberwarriors!     As our digital world progresses toward a circumstance where data analytics and artificial intelligence become key components of any cybersecurity strategy, it is becoming increasingly critical that you understand these techniques to remain relevant and employed in the most exciting and well-paying field in IT. Towards that end, […]

Continue Reading

Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities

Welcome back, my aspiring cyberwarriors!   Finding vulnerabilities in applications and services is the first step toward developing your own zero-day exploit. Vulnerability scanners are great for finding KNOWN vulnerabilities, but to find unknown or zero-day vulnerabilities a fuzzer is an excellent tool that you should be familiar with. As you know, fuzzing is the […]

Continue Reading

Exploit Development: Building Your Own Fuzzer with BASH

Welcome back, my aspiring cyberwarriors!   In the digital battleground of cybersecurity, web application fuzzing stands as a critical technique for uncovering vulnerabilities and developing exploits. This practical guide equips aspiring cyber warriors with the knowledge to wield BASH scripting as a powerful weapon in creating custom fuzzing tools.   Fuzzing is a dynamic analysis […]

Continue Reading

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia

Welcome back, aspiring cyberwarriors.   As the war rages on, Russia’s gas exports have taken on heightened significance. This resource is literally and figuratively fueling Putin’s war efforts, which only underscores the need for attacks on this sector’s infrastructure.   In this article, in collaboration with a student from Cyber Cossacks School – Citadel–we’ll show […]

Continue Reading

Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning

Welcome back, my aspiring cyberwarriors!   Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity among cybersecurity professionals, penetration testers and developers. Known for its exceptional speed, high degree of customizability, and accuracy in identifying security vulnerabilities, misconfigurations, and potential exploits across a wide range of digital assets and networks. This article […]

Continue Reading

Bluetooth Hacking, January 28-30

Bluetooth Hacking is one of the least understood and under-appreciated threats to your cellphone, desktop, SCADA, Smart Home and IoT devices!   For years, cybersecurity researchers considered Bluetooth safe and secure, but in recent weeks and months, numerous frightening and severe vulnerabilities have been found within this protocol. These exploits include sending arbitrary commands into […]

Continue Reading

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?

Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital world would slow down considerably and even reading this article would be difficult and cumbersome. Nearly everything that is transmitted over the web is compressed to reduce latency and free up bandwidth. Compression is one of […]

Continue Reading