Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
HADESS
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
CVE-2021-44228: Insecure deserialization in Apache Log4j2 allows attackers to execute arbitrary code by sending specially crafted...
HADESS
Hacker Culture
In "A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World" by....
HADESS
Important Active Directory Attribute
Active Directory (AD) attributes are essential for managing user accounts and group memberships within Windows environments....
HADESS
Assembly for Hackers
"ASSEMBLY UNLEASHED: A HACKER'S HANDBOOK" IS A DEFINITIVE RESOURCE TAILORED SPECIFICALLY FOR HACKERS AND SECURITY RESEARCHERS...
HADESS
Adaptive DLL Hijacking
Dynamic-Link Library (DLL) hijacking has been a focal technique for adversarial operations over the years, evolving...
HADESS
DevSecOps Security Architecture
It is a crucial guide designed to help organizations fortify their DevSecOps practices by implementing robust...
HADESS
Source Code Analysis Scenarios
The "Source Code Analysis Scenarios" document provides an in-depth examination of various vulnerabilities within software applications,...
HADESS
EVENT CODES for fun & profit
The document provides an extensive list of Windows event codes related to cybersecurity, focusing on attack...
HADESS
25 Methods for pipeline attacks
The document outlines various security practices and tools to enhance the security posture of Continuous Integration/Continuous...
HADESS
RedTeam Tips Orchestrating Chaos Evading Defense Culture
Red Teaming involves simulating cyberattacks to test an organization's defenses. Red Teams adopt the mindset of...
HADESS
Pwning the Domain Persistence
In the ever-evolving landscape of cybersecurity, the battle for domain supremacy rages on. The "Pwning the...
HADESS
OSINT Method for Map Investigations
1. Introduction to OSINT and Map Investigations: OSINT involves collecting and analyzing publicly available information. Map...
HADESS
MALWARE DEVELOPMENT PROCESS DIARIES
IN THIS COMPREHENSIVE GUIDE, WE DELVE INTO THE WORLD OF ANDROID SECURITY FROM AN OFFENSIVE PERSPECTIVE,...
HADESS
MALWARE DEVELOPMENT EVADING DIARIES
IN THE INTRICATE LANDSCAPE OF CYBERSECURITY, MALWARE STANDS AS A PERVASIVE AND EVER-EVOLVING THREAT, CONTINUALLY ADAPTING...
HADESS
Loaders Unleashed
The technical summary delves into loaders in various programming languages, emphasizing their functionalities and mechanisms. C/C++...
HADESS
40 Days in DeepDark Web About Crypto Scam
Last year ransomware scammed more than 100 billion dollar from various organizations and users. We decide...
HADESS
Pwning the Domain Lateral Movement
In the realm of cybersecurity, the concept of lateral movement has become a critical focal point...
HADESS
Web LLM Attacks
Large Language Models (LLMs) have revolutionized natural language processing, enabling machines to generate human-like text and...
HADESS
Trended Protocols for Security Stuff
Evil Foca is a robust tool tailored for security pentesters and auditors to assess IPv4 and...
HADESS
IMPORTANT ACTIVE DIRECTORY ATTRIBUTE
The document provides insights into various attributes, privileges, and attack vectors related to Active Directory security....
HADESS
Moxa ioLogik E1212
When the PLC I/O router succumbs to evil. The evaluation of the Moxa ioLogik E1212 series...
HADESS
NTLM Abuse Methods
NTLM (NT LAN Manager) is a suite of security protocols used by Microsoft Windows operating systems...
HADESS
Top 10 Web Hacking Techniques 2023
The collection of articles presents a wide-ranging exploration of cybersecurity vulnerabilities, highlighting the ever- evolving strategies...
HADESS
Memory analysis for fun and profit
Memory analysis is a crucial aspect of cybersecurity investigations, providing valuable insights into security incidents and...
HADESS
Threat Intel Roundup: Gitlab, Juniper, MageCart, SystemBC
Weekly Overview (5 Dec-12 Dec) - 2024 Vulnerabilities and Threats: Juniper Networks: Released patches for critical...
HADESS
Bitbucket Attack Vector
Data Pipeline Vulnerabilities: Bitbucket, as a linchpin in data pipelines, introduces potential vulnerabilities that adversaries may...
HADESS
Purple Team Scenarios
Purple team scenarios are exercises conducted in the field of cybersecurity to assess and improve an...
HADESS
Credentialess / Username
Hadess aims to lead the cybersecurity field by safeguarding digital assets from malicious actors and creating...
HADESS
Compression Methods
The document provides an extensive list of compression methods, along with their descriptions and best use...
HADESS
User Account Control / Uncontrol
User Account Control (UAC) is a security component in Windows operating systems that aims to limit...
Posts navigation
1
2
3
Latest News
securityweek.com
How to Implement Impactful Security Benchmarks for Software Development Teams – Source: www.securityweek.com
20/12/2024
securityweek.com
CISA Releases Mobile Security Guidance After Chinese Telecom Hacking – Source: www.securityweek.com
20/12/2024
securityweek.com
Ukrainian Raccoon Infostealer Operator Sentenced to Prison in US – Source: www.securityweek.com
20/12/2024
The Hacker News
Thousands Download Malicious npm Libraries Impersonating Legitimate Tools – Source:thehackernews.com
20/12/2024
Krebs On Security
Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm – Source: krebsonsecurity.com
19/12/2024
CSO - Online
From reactive to proactive: Redefining incident response with unified, cloud-native XDR – Source: www.csoonline.com
19/12/2024