vibeofcodes
vibeofcodes
Vibe Of Codes
76 posts
Hello! I'm Aasiya, 21 years, CS Student, Senior at University, enthusiastic in Cyber Security
Don't wanna be here? Send us removal request.
vibeofcodes · 3 years ago
Text
Tumblr media
Hello all!!
(Don't mind the image in background lol)
How have you been in past month hope you are doing fine !!!
.
Great!
Well its not much I'm attention grabber!
I know Tumblr is kinda chic cool and I literally appreciate the avid feature and few peeps
Gotta be like incognito mode hahaha
Well sounds psychopath!
Never mind
.
.
Those are who are need to much theories on Cyber Security can uses Cybrary.in its really good web site....
As for both hands-on training experience for beginners and information along the way I could recommend few as for now the hack box and tryhackme it's not only helps in CTF but its useful in cyber security experience ...
Right now currently don't know where my life could land up its like roller coster journey!
Any suggestions or comment please do comment below.... thanks for reading the crap lol....
Anyway see you next time
Peace amigos
4 notes · View notes
vibeofcodes · 3 years ago
Text
9 Reasons Why Techies Are in Love With Linux
Well I recently like few months ago I fell love with this wonderful OS at first I hate it for its commands by its literally cool and chic!!
.
.
Comment down who's fond of linux and why do you like it!!!
0 notes
vibeofcodes · 3 years ago
Text
RedLine malware shows why passwords shouldn't be saved in browsers
The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera is bad idea.
However, a new report by AhnLab ASEC warns that the convenience of using the auto-login feature on web browsers is becoming a substantial security problem affecting both organizations and individuals.
In an example presented by the analysts, a remote employee lost VPN account credentials to RedLine Stealer actors who used the information to hack the company's network three months later.
Even though the infected computer had an anti-malware solution installed, it failed to detect and remove RedLine Stealer.
The malware targets the 'Login Data' file found on all Chromium-based web browsers and is an SQLite database where usernames and passwords are saved.
Even when users refuse to store their credentials on the browser, the password management system will still add an entry to indicate that the particular website is "blacklisted."
While the threat actor may not have the passwords for this "blacklisted" account, it does tell them the account exists, allowing them to perform credential stuffing or social engineering/phishing attacks.
After collecting the stolen credentials, threat actors either use them in further attacks or attempt to monetize them by selling them on dark web marketplaces.
An example of how widely popular RedLine has become for hackers is the rise of the '2easy' dark web marketplace, where half of all the sold data sold was stolen using this malware.
Another recent case of RedLine distribution is a website contact form spamming campaign that uses Excel XLL files that download and install the password-stealing malware.
.
.
So what can be done....
It better to remember it or better store passwords in some files and store in vault and locked by master key (well I guess that isn't safe either )...
.
Nothing can 100% secured!!!
Comment it below what it's your opinion on this "How could we find other alternatives to secured this"
0 notes
vibeofcodes · 3 years ago
Text
CYBER ATTACK MAP (in real-time)
Fire Eye Cyber threat map
Kaspersky
Threat Cloud
Digital Attack map
AKAMAI
Cyber Threat map by Bitdefender
Threatbutt
0 notes
vibeofcodes · 3 years ago
Text
Logj4 vulnerabilities
https://thehackernews.com/2021/12/second-log4j-vulnerability-cve-2021.html?m=1
0 notes
vibeofcodes · 3 years ago
Text
Tools for website Footprinting
* BurpSuite
* FireBug
* Grabzit
* HTTrack
* Website Informer
0 notes
vibeofcodes · 3 years ago
Text
Tumblr media
0 notes
vibeofcodes · 3 years ago
Text
0 notes
vibeofcodes · 3 years ago
Text
https://thehackernews.com/2021/11/over-9-million-android-phones-running.html?m=1
.
Or refer the hacker news for more news
0 notes
vibeofcodes · 3 years ago
Text
0 notes
vibeofcodes · 3 years ago
Text
Phone spywares
Zimperium has identified spywares in Android
Many of the malware campaigns we have detected over the last year have been global at scale, targeting anyone with little regard to their location. Recently, we discovered and began monitoring the activity behind PhoneSpy, a spyware aimed at South Korean residents with Android devices. With more than a thousand South Korean victims, the malicious group behind this invasive campaign has had access to all the data, communications, and services on their devices.
Unlike other spyware campaigns we have covered that take advantage of vulnerabilities on the device, PhoneSpy hides in plain sight, disguising itself as a regular application with purposes ranging from learning Yoga to watching TV and videos, or browsing photos. But in reality, the application is stealing data, messages, images, and remote control of Android phones. The data stolen from victim devices ranged from personal photos to corporate communications. The victims were broadcasting their private information to the malicious actors with zero indication that something was amiss.
While the victims have been limited to South Korea, PhoneSpy is an example of how malicious applications can disguise their true intent. When installed on victims’ devices, they leave personal and corporate data at risk. With mobile devices playing critical roles in distributed and remote work, it is no surprise that spyware campaigns like PhoneSpy are on the rise.
.
Mostly around 20+ apps
So avoid installing random apps, delete app which has been left for long ... without usage..
.
What Can PhoneSpy Spyware Do?
The mobile application poses a threat to Android devices by functioning as an advanced Remote Access Trojan (RAT) that receives and executes commands to collect and exfiltrate a wide variety of data and perform a wide range of malicious actions, such as:
Complete list of the installed applications
Steal credentials using phishing
Steal images
Monitoring the GPS location
Steal SMS messages
Steal phone contacts
Steal call logs
Record audio in real-time
Record video in real-time using front & rear cameras
Access camera to take photos using front & rear cameras
Send SMS to attacker-controlled phone number with attacker-controlled text
Exfiltrate device information (IMEI, Brand, device name, Android version)
Conceal its presence by hiding the icon from the device’s drawer/menu
For more info refer the link below...
.
https://blog.zimperium.com/phonespy-the-app-based-cyberattack-snooping-south-korean-citizens/
0 notes
vibeofcodes · 3 years ago
Text
0 notes
vibeofcodes · 3 years ago
Text
https://thehackernews.com/2021/11/researchers-uncover-hacker-for-hire.html?m=1
0 notes
vibeofcodes · 3 years ago
Text
List of Useful cyber security blogs and news section
0 notes
vibeofcodes · 3 years ago
Text
0 notes
vibeofcodes · 3 years ago
Text
https://www.analyticsinsight.net/top-10-programming-languages-for-cybersecurity-path-in-2021/
0 notes
vibeofcodes · 3 years ago
Text
0 notes