SCADA/ICS Hacking and Security: Chinese APT, Volt Typhoon, Has Compromised Numerous Industrial Systems in the US!

Welcome back, aspiring cyberwarriors! In a cyberwar, SCADA and ICS industrial systems can be both a target and a weapon! Although the ongoing tensions between the U.S. and China are often framed as a trade war, Chinese state-sponsored actors have been known to compromise and maintain persistent access to critical U.S. infrastructure—sometimes for years. In […]

Continue Reading

SDR (Signals Intelligence) for Hackers: Soon, all Cellphones will be Connected by Satellites

Welcome back, my aspiring cyberwarriors!   In earlier posts here, we have described hacking satellite communication systems. While many might see that type of hacking as very advanced and maybe a bit esoteric, new technologies are about to make satellite communication ubiquitous for everyone with a cellphone. We are on the cusp on an era […]

Continue Reading

NymVPN. Is This the World’s Most Secure VPN?

Welcome back, my aspiring cyberwarriors!   The landscape of digital privacy continues to evolve as surveillance capabilities expand globally. Our digital footprints are continuously tracked, analyzed, and leveraged by various entities. While traditional privacy tools focus on encrypting the content of communications, they often overlook a significant vulnerability: metadata. This “data about your data” reveals […]

Continue Reading

Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec

Welcome back, aspiring cyberwarriors!   In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging to combat the growing sophistication of cyber threats. One such innovative solution is CrowdSec, a free and open-source security automation tool that leverages the power of crowdsourcing to detect and mitigate cyber attacks. This article delves into […]

Continue Reading

Open-Source Intelligence(OSINT): Sherlock – The Ultimate Username Enumeration Tool

Welcome back, aspiring OSINT investigators!   Social media platforms hold a wealth of personal and professional information, making them valuable for reconnaissance in penetration testing and cyberwarfare operations. Sherlock is a lightweight yet powerful tool designed to search for social media profiles using a username. In this article, we’ll guide you through installing and using […]

Continue Reading

Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2

Welcome back, aspiring cyberwarriors!   During reconnaissance, our goal is to identify vulnerable services within our target’s network. To streamline this process, CVEScannerV2 was developed – a powerful Nmap script that bridges the gap between network scanning and vulnerability assessment. This tool enhances the capabilities of the widely-used Nmap scanner, offering security professionals a comprehensive […]

Continue Reading