Posts

Showing posts from September, 2023

TOP 8 CYBERSECURITY TOOLS IN 2023

Image
The Constant Demand for Technology to Perform all Operations has Led to the Spread of Cybercrime Cybersecurity has become a key issue because of the volume of private data and financial records that enter businesses ’ networks on a regular basis . The constant demand for technology to do practically every single operation has led to the spread of cybercrime. Here are the top 8 cyber security tools in 2023 1. Kali Linux Kali Linux is one of the most widely used technologies in cybersecurity. This operating system includes a number of tools for security audits, network and system testing for vulnerabilities , and so on. One of the key advantages of this system is that it can be used by CyberSecurity specialists at various levels of knowledge , making it a perfect choice even for entry-level experts . Furthermore, many of the tools provided by Kali Linux are simple to use, allowing users to track the company’s information security systems with a single click . 2. Cain and A...

Malware exploited critical Realtek SDK bug in millions of attacks

Image
Hackers have leveraged a critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks trying to infect smart devices in the second half of 2022. Exploited by multiple threat actors, the vulnerability is tracked as CVE-2021-35394 and comes with a severity score of 9.8 out of 10 . Between August and October last year, sensors from Palo Alto Networks observed significant exploitation activity for this security issue , accounting for more than 40% of the total number of incidents. High exploitation levels Starting September 2022, a new sizable botnet malware named ‘ RedGoBot ’ appeared in the wild targeting IoT devices vulnerable to CVE-2021-35394 . Researchers at Unit 42, Palo Alto Network's threat intelligence team, noticed that exploitation of the flaw continued throughout December. Three different payloads were delivered as a result of these attacks: a script that executes a shell command on the target server to download malware an injected comma...

Mastering SQL Injection with SQLmap: A Comprehensive Evasion Techniques Cheatsheet

Image
SQL injection attacks remain a significant threat to web applications, and SQLmap is a powerful tool for detecting and exploiting SQL injection vulnerabilities. However, as web application security measures improve, it’s becoming more challenging to successfully exploit SQL injection vulnerabilities using SQLmap. In response, SQLmap offers a range of evasion techniques that can help bypass web application firewalls (WAFs) and other security measures. This article explores some of the most effective SQLmap evasion techniques and provides practical examples of each technique. Additionally, we’ll provide some tips and best practices for using SQLmap evasion techniques safely and ethically. By using these techniques, security professionals can stay one step ahead of attackers and better protect their web applications from SQL injection attacks. Basic arguments for SQLmap Generic Arguments: -u <target_URL>: Specify the target URL to test. --batch: Run SQLmap in batch mode (no user in...