The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites. This article summarizes how the attack works, and suggests ways to protect yourself from it – including a specific approach for Apple iOS devices.
Category Archives: AllPosts
What is DNS Tunneling?
Most organizations have a firewall that acts as a filter between their sensitive internal networks and the threatening global Internet. DNS tunneling has been around for a while. But it continues to cost companies and has seen hackers invest more time and effort developing tools. A recent study[1] found that DNS attacks in the UK alone have risen 105% in the past year. DNS tunneling is attractive–hackers can get any data in and out of your internal network while bypassing most firewalls. Whether it’s used to command and control (C&C) compromised systems, leak sensitive data outside, or to tunnel inside your closed network, DNS Tunneling poses a substantial risk to your organization. Here’s everything you need to know about the attack, the tools and how to stop it.
How Hackers Use DNS Tunneling to Own Your Network (cynet.com)
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
Key Points
- Download and install the latest version of Gpg4win
- Create a new key pair
- Look at the advanced settings
- Export the public key
- Open the key with notepad
- Export the secret key
- Import a public key into Kleaopatra into the imported certificates tab
- Encrypt with the public of a person
- Encrypt a file with a public key someone sent you by R-clicking on the file
- Paste the encrypted data in your clipboard to a notepad document
- Send the encrypted message to the owner of the public used to encrypt the data.
- With the encrypted message on the clipboard, R-click the Kleaopatra icon on the system tray and choose decrypt
- Copy the decrypted message on your clipboard to a new document in notepad.
https://www.youtube.com/watch?v=CEADq-B8KtI
How to Encrypt Email in Kleopatra
Top Routinely Exploited Vulnerabilities
Summary
This Joint Cybersecurity Advisory was coauthored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau of Investigation (FBI).
This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities and Exposures (CVEs)—routinely exploited by malicious cyber actors in 2020 and those being widely exploited thus far in 2021.
Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private sector organizations worldwide. However, entities worldwide can mitigate the vulnerabilities listed in this report by applying the available patches to their systems and implementing a centralized patch management system.
Click here for a PDF version of this report.
CEH Practice Exams – 4th Ed.
CEHv11 – ExamTopics Review Questions
CISSP-Esp Dominio 5 – Gestin de identidades y accesos
The Complete PGP Encryption Tutorial | Gpg4win & GnuPG
MS-101: M365 Mobility and Security Exam Simulation Questions
Bluto: a tool for DNS Recon
DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Enumeration | MetaData Harvesting