Thanks for your support!
#cybersecurity
| Website | https://www.bretschneider.cc/ |
| [email protected] | |
| https://x.com/jeromeium | |
| https://www.linkedin.com/in/daniel-bretschneider-193162220/ |
Outlook.com is suffering a series of outages today after being down multiple times yesterday, with hacktivists known as Anonymous Sudan claiming to perform DDoS attacks on the service.
Cybersecurity firm Kaspersky has released a tool to detect if Apple iPhones and other iOS devices are infected with a new 'Triangulation' malware.
Concerning Operation #Triangulation: Although the #security #review of the newly found #triangle #spyware is still running, #kaspersky created a python script that checks if your #apple device is compromised. triangle_check can be installed via #pip.
#iMessage is again target of a massive wave of zero-click #exploits. Once (or still) used by #pegasus iMessage is now under attack by russian threat actors. I recommend to update to #iOS 16.5 and deactivate iMessage in your settings.
Russian cybersecurity firm Kaspersky says some iPhones on its network were hacked using an iOS vulnerability that installed malware via iMessage zero-click exploits. Russia blames these attacks on US intelligence agencies.
If you're into #osint then I would strongly advise to take a look at the most atypical guide to OSINT. A repository intended for bored professionals...
#infosec
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome! - GitHub - OffcierCia/non-typical-OSINT-guide: The most unusual OSINT g...
Another #opensource #vulnerability scanner for #webservers and #cgi is #nikto. It scans for dangerous files, outdated server software and performs other checks against security #threats.
Nikto Usage Example - Nikto v2.1.6 --------------------------------------------------------------------------- + Target IP: 192.168.0.102 + Target Hostname: 192.168.0.102 + Target Port: 80 + Start Time: 2018-03-23 10:49:04 (GMT0) --------------------------------------------------------------------------- + Server: Apache/2.2.22 (Ubuntu) + Server leaks inodes via ETags, header found with file /, inode: 287, size: 11832, mtime: Fri Feb 2 15:27:56 2018 + The anti-clickjacking X-Frame-Options header is not present.
If you're responsible for one or many websites, it's sometimes recommended to do some security testing. A perfect tool especially for #wordpress sites is #wpscan. It's a free, for non-commercial use, #security/#vulnerability scanner written in #ruby.
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected] - wpscanteam/wpscan