Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
HADESS
HADESS
Devsecops Security Model
The Evolving World of Software Development In the dynamic realm of software development, integrating security into...
HADESS
DA Bomb
In the sprawling metropolis of Neo-Tokyo, where neon lights cast long shadows and the digital realm...
HADESS
The art of Linux persistence
The concept of persistence in Linux systems is an intricate tapestry woven from the threads of...
HADESS
SMART CONTRACT SECURITY AUDIT
A smart contract is an automated transaction protocol that executes the terms of a contract. They...
HADESS
RedTeam scenarios
The document offers a comprehensive insight into the cybersecurity company "Hadess" and its unwavering dedication to...
HADESS
Android Shim Attack Surface
Android shims are small libraries that act as compatibility layers between different versions of the Android...
HADESS
Mastering Impact with Sharpening Techniques (RTC0026)
Several tools with "Sharp" in their names have gained prominence. These tools are often used for...
HADESS
Event Codes for Fun and Profit
Unauthorized Access Attempt:ID: 001MITRE Tactic & Techniques: Initial Access Phishing [T1566.001]Event ID & Code: 4625 FAILED_LOGONStatus...
HADESS
EDR EVASION TECHNIQUES USING SYSCALLS
What are Windows Syscalls syscalls are Windows internals components that provide a way for Windows programmers...
HADESS
DevSecOpsChecklist Part 1
Apache Hardening for DevSecOps Disable directory listing Enable server signature Disable server signature Change server header...
HADESS
The Art Of Infection In Mac OS
In the modern digital ecosystem, the intricacies of malware infiltration within the macOS environment have evolved...
HADESS
Shell code development
Understanding Shellcode At its core, shellcode is a payload used in the exploitation of a software...
HADESS
SHARPENING TECHNIQUES WITH IMPACKET
In the fascinating world of cybersecurity, sharpening techniques play a crucial role in enhancing and refining...
HADESS
Powershell Tips & Tricks for r/b/p teamers
In the dynamic realm of cybersecurity, where the battles between red, blue, and purple teams unfold,...
HADESS
Position-independent code
Position-independent code (PIC) is a technique used in programming to enable executable code to run at...
HADESS
Event Codes for fun & profit
Exploring event codes becomes an exciting journey where fun and profit converge in the vast universe...
HADESS
TOP C&C METHODS
In the world of cybersecurity, Command and Control (C&C) methods are crucial for executing malicious operations....
HADESS
DevSecOps Checklists
Apache Hardening for DevSecOps Disable directory listingOptions -Indexes Enable server signatureServerSignature On Disable server signatureServerSignature Off...
HADESS
A modern iOS application that exposes your account token and runs arbitrary commands.
Exposed API Key in GET URL (/api/v1/users.info?userId): The identified security concern relates to an exposed API...
HADESS
Registry Attack Vectors
The Windows Registry is a centralized configuration system that stores information necessary to configure the system...
HADESS
A network-wide ad-blocking tool with the capability to execute arbitrary commands.
Path Traversal to RCE via teleporter.php and zip_file Parameter: The teleporter.php script in Pi-hole and zip_file...
HADESS
100 Methods for Container Attacks (RTC0010)
This book focuses on providing a comprehensive analysis of 100 specific methods for carrying out container...
HADESS
Jenkins Attack Vector
Jenkins, a cornerstone in the CI/CD landscape, is not only pivotal in automating development pipelines but...
HADESS
Shrouded Snooper Analysis Report
The "Shrouded Snooper Analysis Report" provides a comprehensive examination of a potential threat or system, aiming...
HADESS
File Binding Methods
File binding methods encompass various techniques and approaches for connecting or associating files with other elements,...
HADESS
TACFAM DB-120WL
This executive summary provides an overview of a critical code execution vulnerability discovered in the TACFAM...
HADESS
60 Methods For Cloud Attacks
Insecure Interfaces and APIs 1 python3 cloudhunter.py --write-test --open-only http://example.com --write-test: This option tells the script...
HADESS
RED TEAM GETTING TO KNOW ABOUT ADVANTAGES DISADVANTAGES
Red Team is a crucial cybersecurity practice that involves simulating real-world cyberattacks to assess an organization's...
HADESS
Abuse SVCHost Methods
Abuse SVCHost Methods(RTC0017) svchost.exe , which stands for “Service Host”, is an integral part of the...
HADESS
Attacked From Behind Application using RCE for Exploit Public-Facing Application case study
Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using...
Posts navigation
1
2
3
Latest News
The Register Security
Coyote malware abuses Microsoft’s UI Automation to hunt banking creds – Source: go.theregister.com
25/07/2025
The Register Security
The EFF is 35, but the battle to defend internet freedom is far from over – Source: go.theregister.com
25/07/2025
The Register Security
Compromised Amazon Q extension told AI to delete everything – and it shipped – Source: go.theregister.com
25/07/2025
The Register Security
Eau no! Dior tells customers their data was swiped in cyber snafu – Source: go.theregister.com
25/07/2025
The Register Security
Not pretty, not Windows-only: npm phishing attack laces popular packages with malware – Source: go.theregister.com
25/07/2025
The Hacker News
Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems – Source:thehackernews.com
24/07/2025