Cyber Security Asia 2023
Cyber Security Asia 2023 Now more than ever, businesses, governments, and individuals alike must be aware of the ever-growing threats posed by cyber criminals. I’m excited to once again be…
Kimsuky APT poses as journalists and broadcast writers in its attacks
North Korea-linked APT group Kimsuky is posing as journalists to gather intelligence, a joint advisory from NSA and FBI warns. A joint advisory from the FBI, the U.S. Department of State,…
Hacking Apple macOS devices exploiting the Migration Assistant
A vulnerability that was only recently found and given the name “Migraine” is connected to macOS migration functionality and represents a significant risk. It gives attackers with root access the…
Risk: Everything Everywhere All at Once
It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is being dominated by a singular theme, re-thinking risk. We came…
Graphcat – Generate Graphs And Charts Based On Password Cracking Result
Simple script to generate graphs and charts on hashcat (and john) potfile and ntds Install git clone https://github.com/Orange-Cyberdefense/graphcatcd graphcatpip install . Helper $ graphcat.py -husage: graphcat.py [-h] -potfile hashcat.potfile -hashfile…
Azure-AccessPermissions – Easy to use PowerShell script to enumerate access permissions in an Azure Active Directory environment
Easy to use PowerShell script to enumerate access permissions in an Azure Active Directory environment. Background details can be found in the accompanied blog posts: Untangling Azure Active Directory Principals…