Dark Shadow

45 posts

Dark Shadow banner
Dark Shadow

Dark Shadow

@NiaziSec

Certified in Cybersecurity (ISC)2 || Pentester || Linux Admin || IT Support Technician || Blogger

Afghan Katılım Ekim 2019
103 Takip Edilen9 Takipçiler
Dark Shadow retweetledi
Warfare Analysis
Warfare Analysis@warfareanalysis·
⚡ Chief of Staff of the Armed Forces of the Islamic Emirate of Afghanistan, Qari Fasih al-Din Fitrat in response to Trump statement: "Come and get it back if you can."
Warfare Analysis tweet media
English
300
1.6K
12.7K
504.7K
Luke de Pulford
Luke de Pulford@lukedepulford·
Just fyi, @deepseek_ai collects your IP, keystroke patterns, device info, etc etc, and stores it in China, where all that data is vulnerable to arbitrary requisition from the 🇨🇳 State. From their own privacy policy:
Luke de Pulford tweet mediaLuke de Pulford tweet media
English
2.9K
4.3K
15.6K
3.9M
Dark Shadow
Dark Shadow@NiaziSec·
📊 IBM Cost of a Data Breach Report 2023 Insights: Average breach cost hits record high - $4.45M. Industries with costliest breaches: Healthcare, Financial, Pharmaceuticals. US, Middle East, Canada top breach costs geographically.
English
0
0
0
35
Dark Shadow
Dark Shadow@NiaziSec·
🔍 Incident Analysis! The Diamond Model: A security analysis framework, revealing adversary operations' mysteries. Dive into its core facets - Adversary, Victim, Infrastructure, and Capability. Unravel secrets and fortify your defense! #CyberSecurity #IncidentAnalysis
English
0
0
1
40
Dark Shadow
Dark Shadow@NiaziSec·
🔒 Firewall Essentials 🔥: A vital element in cybersecurity defense! Hardware, software, or a combo, firewalls are the guardians of network security. Explore types like Stateless, Stateful, Proxy, Web App, and Next-Gen – each with unique strengths! 🚀 #Cybersecurity #Firewalls
English
0
0
0
29
Dark Shadow
Dark Shadow@NiaziSec·
WordPress has swiftly responded to a critical security flaw in version 6.4 by releasing version 6.4.2. This flaw, though not directly exploitable in the core, poses a potential high-severity risk, especially when combined with certain plugins, notably in multisite installations.
English
0
0
0
22
Dark Shadow
Dark Shadow@NiaziSec·
Ransomware, a pervasive cybersecurity threat, has witnessed a transformative shift with the rise of Ransomware-as-a-Service (RaaS). This alarming trend is reshaping the cybercrime landscape, empowering even those with limited technical skills to execute devastating attacks.
English
0
0
0
17
Dark Shadow
Dark Shadow@NiaziSec·
🌐 Kimsuky, active since 2012, initially targeted South Korean entities before expanding globally to Europe, Russia, and the U.S. The U.S. Treasury Department recently sanctioned Kimsuky for intelligence gathering supporting North Korea's strategic objectives.
English
0
0
0
19
Dark Shadow
Dark Shadow@NiaziSec·
Major 5G modem chipset vendors like MediaTek and Qualcomm face critical flaws affecting USB/IoT modems and numerous Android/iOS smartphones. Dubbed "5Ghoul," these 14 vulnerabilities may disrupt connections, freeze devices, or downgrade 5G to 4G.
English
0
0
0
32
Dark Shadow
Dark Shadow@NiaziSec·
🌐Honeypots invite threats, mimicking systems to study attackers and offer insights. Honeypots mimic environments; honeytokens are lightweight tripwires. Balance deployment, management, and effectiveness wisely. Benefits Data Capture for defense, Reliable Alerting, Detailed Logs.
English
0
0
0
10
Dark Shadow
Dark Shadow@NiaziSec·
SaaS Security Checklist: Offboarded Users: Deactivate former employees. Right-Size Permissions: Review and align user access. Disable unused accounts. Account Sharing Prevention: Use MFA/SSO. Automate User Monitoring: Explore SSPM tools. Start 2024 with a secure SaaS env. #SaaS
English
0
0
0
18
Dark Shadow
Dark Shadow@NiaziSec·
"🚨 New Bluetooth Vulnerabilities Alert! 🚨 Recent research exposes novel attacks, named BLUFFS, compromising Bluetooth Classic's security. CVE-2023-24023 impacts Bluetooth Core Spec 4.2-5.4, allowing device impersonation & man-in-the-middle attacks. #BluetoothSecurity
English
0
0
0
48
Dark Shadow
Dark Shadow@NiaziSec·
Dive into the world of Threat Intelligence! 🌐🛡️ Stay ahead of cyber threats by leveraging valuable insights into attack trends, vulnerabilities, and emerging risks. Enhance your cybersecurity strategy with timely and relevant threat intelligence to fortify your defenses.
English
0
0
0
8
Dark Shadow
Dark Shadow@NiaziSec·
Unlock the power of Security Information and Event Management (SIEM)! SIEM tools provide a holistic view of your organization's cybersecurity landscape, collecting and analyzing data to detect and respond to security incidents. Strengthen your defenses and stay ahead of threats.
English
0
0
0
9
Dark Shadow
Dark Shadow@NiaziSec·
Elevate your Linux admin skills with advanced command-line mastery! 🚀 Unleash 'find' for precise file searches, harness 'grep' for powerful text patterns, and wield 'rsync' for seamless data synchronization. #LinuxAdmin #CommandLineMagic #TechSkills
English
0
0
0
11
Dark Shadow
Dark Shadow@NiaziSec·
Exciting WhatsApp Update! Meta-owned WhatsApp introduces the Secret Code feature, enhancing user privacy for sensitive chats. With a custom password for locked chats, users gain an extra layer of security. Hide the folder and make your conversations private. #WhatsAppUpdate
English
0
0
0
29
Dark Shadow
Dark Shadow@NiaziSec·
🛡️ Secure your organization with Specops Password Policy and Breached Password Protection. Block over 4 billion known compromised passwords from Active Directory, preventing users from using them and guiding them toward creating secure alternatives.
English
0
0
1
12
Dark Shadow
Dark Shadow@NiaziSec·
🔐 Account credentials are a hot commodity in cybercrime, with a single set of stolen credentials posing a serious risk. According to the 2023 Verizon Data Breach Investigation Report, external parties caused 83% of breaches, and 49% involved stolen credentials.
English
1
0
0
17