APT5: Citrix ADC Threat Hunting Guidance
(published: December 13, 2022)
Background:
On December 13, 2022, the US National Security Agency published a report on the ongoing exploitation of Ci… Read More
WordPress vulnerabilities are not a new topic even for The Cyber Express, and even we have listed several articles on the vulnerabilities and even fake campaigns running on the world’s… Read More
Previously undetected malware called Lightning Framework that targets Linux systems can be used as a backdoor using SSH and deploy rootkits to cover the tracks of attackers.
Described as… Read More
The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solu… Read More
An anonymous reader quotes a report from Ars Technica: Dozens of legitimate WordPress add-ons downloaded from their original sources have been found backdoored through a supply chain attack… Read More
Normally when you see an article that talks about cryptocurrency come across your timeline, you can safely sort it squarely into two camps: For and Against. If you’re like me, you migh… Read More
Orome1 shares a report from Help Net Security: Security researchers have identified over 500 apps on Google Play containing an advertising software development kit (SDK) called Igexin, which… Read More
Honeypots
Database Honeypots
Delilah – Elasticsearch Honeypot written in Python (originally from Novetta).
ESPot – Elasticsearch honeypot written in NodeJS, to capture… Read More
WordPress is no doubt #1 content management system largely used by developers and webmasters around the world to build beautiful & SEO friendly websites.
WordPress’ market share is… Read More
The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management s… Read More