#DiyakoSecureBow
————————————
Mobile Security
SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks 2019.
SS7/Diameter firewall:
https://github.com/P1sec/SigFW
Problem Statement
The international SS7 network has been standardized and built in the past as a trusted network with only trusted partners. The network itself and by design does not authenticate and authorize the peers in the network and also does not encrypt the signaling communication. The exposure of these networks comes from the design and the architecture requirement of roaming architecture in past architecture releases.
Additionally we should not expect that the SS7 network will be phased out soon. The voice could be replaced by VoLTE (4G) with IMS home routed architecture, but such deployment requires VoLTE capable devices and VoLTE networks with the similar radio coverage compared to 2G, 3G. So before some operator decides to shut-down both 2G and 3G network, all the home subscribers should be VoLTE enabled. And the operator should also consider inbound-roamers.
In the LTE the Diameter protocol has replaced the SS7 signaling. However, similar issues are still present. Lack of authentication and no encryption of the signaling communication.
Special Thanks❤️😇👍🏽🙏
BlackHat
BlackHat Lab
Conference Presentation 2017
Martin Káčer, Philippe Langlois
-Secure Business Continuity-
2024.05.05
——————————————————
#CyberSecurity #API #Firewall #Honeypot #Mobile
#Vulnerability #Threat
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ss7-sec-activity-7192648834928283648-N5Wv?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Threat Research
Muddling Meerkat: The Great Firewall Manipulator 2024
This paper introduces a perplexing actor, Muddling Meerkat, who appears to be a People’s Republic of China (PRC) nation state actor. Muddling Meerkat conducts active operations through DNS by creating large volumes of widely distributed queries that are subsequently
propagated through the internet using open DNS resolvers. Their operations intertwine with two topics tightly connected with China and Chinese actors: the Chinese Great Firewall (GFW) and Slow Drip, or random prefix, distributed denial-of-service (DDoS) attacks. While Muddling Meerkat’s operations look at first glance like DNS DDoS attacks, it seems unlikely that denial of service is their goal, at least in the near term.
Muddling Meerkat operations are long-running — apparently starting in October 2019 – and demonstrate a high degree of expertise in DNS.
Muddling Meerkat’s operations are complex. Indeed, they are so convoluted, one might assume that Muddling Meerkat presents no threat. But in cybersecurity, especially in the complex world of DNS, we should think strategically. In February 2024, the U.S. Cybersecurity
and Infrastructure Security Agency (CISA) and several international partners issued an advisory saying, “In recent years, the U.S. has seen a strategic shift in PRC cyber threat activity from a focus on espionage to pre-positioning for possible disruptive cyber attacks
against U.S. critical infrastructure.”
While that specific advisory focused on “living off the
land” techniques used by the actor Volt Typhoon, the message that “PRC cyber actors blend in with normal system and network activities, avoid identification by network defenses, and limit the amount of activity that is captured in common logging configurations” is eerily
similar to how well-hidden Muddling Meerkat remains.
Special Thanks❤️😇👍🏽🙏
Infoblox
-Secure Business Continuity-
2024.05.02
——————————————————
#Threat #CyberSecurity
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_the-great-firewall-manipulator-2024-activity-7191748506187902977-l-7C?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
MLSecOps
AI and Strategic Decision-Making:
Communicating trust and uncertainty in AI-enriched intelligence April 2024.
Special Thanks❤️😇👍🏽🙏
Megan Hughes, Richard J. Carter, Amy Harland and Alexander Babuta
Centre for Emerging Technology and Security (CETaS)
-Secure Business Continuity-
2024.04.30
——————————————————
#AI #ML #CyberSecurity #Intelligence
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ai-strategic-decision-making-2024-activity-7190934144103698432-a5GB?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
2023 Outlook: What Trends are on the Near Horizon in Cybersecurity?
Special Thanks❤️😇👍🏽🙏
Omdia Service Provider Transformation
-Secure Business Continuity-
2024.04.28
——————————————————
#CyberSecurity #RBVM #IDR
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_cyber-security-outlook-2022-2024-activity-7190194436981592064-1S1o?utm_source=share&utm_medium=member_ios
Lost revenue, angry customers, regulatory fines… cyberattacks have far-reaching consequences.
👉 Projected costs to hit $10.5 trillion by 2025
👉 88% of breaches due to human error 🤓
https://thehackernews.com/2024/04/unmasking-true-cost-of-cyberattacks.html
Anyway
The Word Pilots' Day 26 April was selected by the International Federation of Air Line Pilots' Associations 2013 as a day that saw a prominent figure in aviation history, Fesa Evrensev taking to the sky 4 the first time
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.7
https://www.linkedin.com/posts/alirezaghahrood_lost-revenue-angry-customers-regulatory-activity-7189411954933829632-EsC8?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Whitepaper
Blue Team Techniques
Active Directory: Tactical Containment to Curb Domain Dominance 2024.
Special Thanks❤️😇👍🏽🙏
Chris Tierney
Russell Eubanks
-Secure Business Continuity-
2024.04.24
——————————————————
#CyberSecurity #ActiveDirectory #Microsoft #ACL
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ad-domain-sec-2024-activity-7188784637677092864-Lumt?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
exploit
Unveiling the Cracks in Virtualization, Mastering the Host System - VMware Workstation Escape 2024.
Special Thanks❤️😇👍🏽🙏
BlackHat
-Secure Business Continuity-
2024.04.22
——————————————————
#CyberSecurity #Vmware #Exploit
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_vmware-escape-exploit-2024-activity-7188066648619175936-DALU?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
———————————
ABSTRACT:
Internet of Things (IoT) devices are gaining more and more importance in our daily lives. Through their deep integration they pose a potential risk for the user’s privacy. In this thesis, I use reverse engineering methods to analyze the security of the Xioami IoT ecosystem and its devices. I implement a tool to emulate the Xiaomi cloud and analyze the cloud protocol. I use different, some unconventional, methods to extract the device firmware and get privileged access on the devices. The evaluation shows that, even though Xiaomi is a large IoT company, their cloud protocol and Software Development Kit (SDK) have serious flaws. Also, the actual vendors of the devices do not put much effort into device security. A slightly positive aspect of this is the fact that users can use the flaws to get full control over their own devices.
Special Thanks
Technische Universität Darmstadt Department of Computer Science Secure Mobile Networking Lab
Technische Universität Darmstadt
🙏😇❤️👍🏽
-Secure Business Continuity-
2024.0420
——————————————————
#cybersecurity #Iot #Privacy #vulnerability
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_security-analysis-iot-ecosystem-2024-activity-7187306502112636929-FlF3?utm_source=share&utm_medium=member_ios
"With heartfelt appreciation, we extend our gratitude for the unwavering support and trust you have shown us, both overtly and covertly. Your generosity holds immense value for us. 😊🙏❤️😇".
4000✌🏼
Diyako Secure Bow
-Secure Business Continuity-
2024.04.16
——————————————————
#marketanalysis #branding
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_diyakosecurebow-marketanalysis-branding-activity-7185860284752826368-B7vk?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
A HOLISTIC APPROACH TO MITIGATING HARM FROM INSIDER THREATS:
All enterprises face potential losses due to insider threats, whether the threat actors arebmalicious or otherwise. This white paper delves into where insider threats come from, how to anticipate them and the psychology behind them. In this ISACA white paper, learn about new insights that your enterprise can use to anticipate and assess insider threats and mitigation tactics to reduce the associated risk.
MICE (money, ideology, coercion and ego).
Human Security Engineering.
Special Thanks❤️😇👍🏽🙏
ISACA
-Secure Business Continuity-
2024.04.14
——————————————————
#CSCU #Threats #CyberSecurity #ISACA
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_a-holistic-approach-2-mitigating-harm-from-activity-7185234443555524608-y-Cb?utm_source=share&utm_medium=member_ios
🛑 URGENT - Critical zero-day security vulnerability (CVE-2024-3400) discovered in Palo Alto Networks firewalls.
Hackers are already exploiting it in the wild, enabling them "to execute arbitrary code with root privileges."
Details👇
https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html
😱 Yikes! Did you know that over 11,000 secrets (passwords, API keys...) were leaked on the Python repository PyPI, and over 12.8 million on GitHub in 2023?
GitGuardian's findings are alarming - read the details:
https://thehackernews.com/2024/04/gitguardian-report-pypi-secrets.html
The question you need to ask: Are you affected by the XZ Util Backdoor?
Prevent future risks and make sure you have a defense-in-depth strategy using Wiz CDR and runtime sensor.
See Wiz in Action:
https://thn.news/wiz-cloud-security
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.12
Malware analysis
Exploring Infostealer Malware Techniques on Automotive Head Units 2024.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.09
#DiyakoSecureBow
————————————
Mobile Security
Mobile Threat Intelligence Framework (MoTIF) Principles
Ver. 1.0, March 2024.
Special Thanks❤️😇👍🏽🙏
GSMA
GSMA - Mobile for Development
-Secure Business Continuity-
2024.04.09
——————————————————
#CyberSecurity #Ti #Mobile
#BusinessSecureContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ciso-as-a-service-activity-7183312971366883328-bmOe?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Analytics
"The Sophos Active Adversary Report for 1H 2024".
Special Thanks❤️😇👍🏽🙏
Sophos
Sophos Solutions
Sophos Partners
-Business Secure Continuity-
2024.04.06
——————————————————
#CyberSecurity #Threat #mitre
#BusinessSecureContinuity
https://www.linkedin.com/posts/diyako-secure-bow_sophos-report-h1-2024-activity-7182236835677421568-q50V?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Research
Hardware Security
High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor 2024.
https://pathfinder.cpusec.org
Special Thanks❤️😇👍🏽🙏
Hosein Yavarzadeh UC San Diego, USA
Christina Garman Purdue University, USA
Daniel Moghimi Google, USA
Archit Agarwal UC San Diego, USA
Daniel Genkin Georgia Tech, USA
Deian Stefan UC San Diego, USA
Dean Tullsen UC San Diego, USA
Max Christman UNC Chapel Hill, USA
Andrew Kwong UNC Chapel Hill, USA
Kazem Taram Purdue University, USA
-Secure Business Continuity-
2024.05.05
——————————————————
#CyberSecurity #Exploiting #ThreatModel #AttackPrimitives
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_pathfinder-2024-activity-7192658854566912001-Mgdo?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Whitepaper
OWASP Firmware Security Testing Methodology 2024.
Special Thanks❤️😇👍🏽🙏
OWASP® Foundation
Cisco Meraki
Cisco Security
Cisco
-Secure Business Continuity-
2024.05.03
——————————————————
#CyberSecurity #Cisco #Meraki #ApplicationSecurity
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_owasp-firmware-security-2024-activity-7192059960682242052-PAbG?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
ULTIMATE GUIDE TO:
Cybersecurity Risk Managemen Next Generation 2024
WHAT IS CYBERSECURITY RISK MANAGEMENT?
Cybersecurity risk management is the process of determining the risks that your organization is likely to face and then prioritizing and selecting the security control technologies, best practices, and policies to reduce or mitigate these risks.
Special Thanks❤️😇👍🏽🙏
Bugcrowd
-Secure Business Continuity-
2024.05.01
——————————————————
#RiskManagement #ISO27001 #CIS #NIST #ASM
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_cyber-security-mgmt-2024-activity-7191263706901602304-S0ym?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Turning EDRs to malicious
wipers using 0-day exploits:
Lessons Learned
A wiper is more dangerous if it uses
a trusted entity on the system for
deletion, especially a security control.
Having security controls does not
mean you are secure.
Security controls might be a preferred
target for attackers due to their very
high privileges and are most trust l
Special Thanks❤️😇👍🏽🙏
SafeBreach
Or Yair
-Secure Business Continuity-
2024.04.29
——————————————————
#CyberSecurity #EDR #Exploit #Wipers
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_bypass-avedr-wiper-2024-activity-7190575563584008192-X3C9?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
DevSecOps Playbook:
A step-by-step guide to implementing a DevSecOps program
Special Thanks❤️😇👍🏽🙏
Paul McCarty
-Secure Business Continuity-
2024.04.27
——————————————————
#CyberSecurity #OWASP #applicationSecurity
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_owasp-devsecops-2024-activity-7189829766269583360-Y9zy?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Threat intelligence:
Eyes on the ene
Special Thanks❤️😇👍🏽🙏
AuditBoard
CyberRisk Alliance Alliance
-Secure Business Continuity-
2024.04.25
——————————————————
#CyberSecurity #Threat #Alliance #Risk
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_threat-intelligence-2024-activity-7189186838543089664-G8l_?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
Malware analysis
Voice Phishing Syndicates Unmasked: An In-Depth Investigation and Exposure 2024.
Special Thanks❤️😇👍🏽🙏
BlackHat
-Secure Business Continuity-
2024.04.23
——————————————————
#CyberSecurity #VoIP #Exploit #Phishing
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_voice-phishing-2024-activity-7188394361255034880-NQ-x?utm_source=share&utm_medium=member_ios
Tech book
Cloud Security
Kubernetes Security and Observability 2022
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.21
💀 Concerned about malware in PDFs or Office docs?
Sandbox analysis reveals threats (macros, suspicious images, & more) before you click.
🔥 Discover the power of static analysis:
https://thehackernews.com/2024/04/how-to-conduct-advanced-static-analysis.html
SCADA Security
Unpacking the Blackjack Group's Fuxnet Malware
https://claroty.com/team82/research/unpacking-the-blackjack-groups-fuxnet-malware
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.19
#DiyakoSecureBow
————————————
Analytics
Unit42 Incident Response Report 2024:
How This Report Helps You
New headlines covering nation-state threat actors come out every day–not to mention news of the latest vulnerabilities and security risks. Your time is more valuable than ever, and sorting out which threats really matter is a difficult task.
This report helps because it gathers real-world information from organizations like yours, so you can learn which threats really affect your peers–and how you can face them. Read on to find out how threat actors gain access to organizations, what they do once they get in, and how our incident responders’ top recommendations help you stop them.
Cybersecurity can often feel like an endless battle between attackers and defenders. At Unit 42, we believe intelligence, insight, and preparation still gives defenders the edge. We think the story of cybersecurity can be hopeful, with a strategic understanding of the threats we face today.
Special Thanks❤️😇👍🏽🙏
Palo Alto Networks
Palo Alto Networks Education Services
Palo Alto Networks Unit 42
Palo Alto Networks Israel R&D Center
-Secure Business Continuity-
2024.04.15
——————————————————
#Cert #Csirt #Paloalto #Respond #Response
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_incident-response-report-2024-activity-7185605007877029889-m5Wf?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
SureLog SIEM Extraordinary SOC Use Cases
Special Thanks❤️😇👍🏽🙏
SureLog SIEM
SureLog SIEM International
-Secure Business Continuity-
2024.04.09
——————————————————
#CyberSecurity #Ti #Siem #SOC
#BusinessSecureContinuity
https://www.linkedin.com/posts/diyako-secure-bow_use-caae-log-mgmtsiem-2024-activity-7184784882017918976-lqv_?utm_source=share&utm_medium=member_ios
Malware analysis
Exploring Infostealer Malware Techniques on Automotive Head Units 2024
👇🏻
/channel/CISOasaService/15026
DevOps
Whitepaper
DevOps Automated Governance Reference Architecture 2019
👇🏻
/channel/CISOasaService/15027
😍
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.09
DevOps
Whitepaper
DevOps Automated Governance Reference Architecture 2019.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.09
#DiyakoSecureBow
————————————
State of AI in the Cloud 2024:
Our research shows that AI is taking over the cloud: 70% of organizations are using managed AI services, making them already nearly as popular as managed Kubernetes (!).
Special Thanks❤️😇👍🏽🙏
Wiz
-Secure Business Continuity-
2024.04.08
——————————————————
#CyberSecurity #AI #Cloud #Kubernetes
#BusinessSecureContinuity
https://www.linkedin.com/posts/diyako-secure-bow_state-ai-cloud-2024-activity-7182965433606553600-dWHf?utm_source=share&utm_medium=member_ios
info
Cyber Education
Windows Commands Reference
https://lnkd.in/dhPhh-zN
For CISSP students, I have summarized here CISSP changes in 2024:
Rearranging the sequence and renaming topics within the curriculum is unlikely to substantially affect the exam outcome. This is because the exam emphasizes the application of theoretical concepts in real-world Cyber/Information Security scenarios rather than relying solely on definitions and theoretical knowledge. Consequently, the exam incorporates numerous practical scenarios and questions derived from hands-on experience, which are challenging to master through theoretical study alone
Special Thanks❤️👍🏽🙏😇
ISC2
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.04.05
https://www.linkedin.com/posts/alirezaghahrood_info-cyber-education-windows-commands-reference-activity-7181999600138940416-fkWv?utm_source=share&utm_medium=member_ios