๐ Getting started with SOC: Setting an Elastic Home SIEM lab
๐ https://hacklido.com/blog/891-getting-started-with-soc-setting-an-elastic-home-siem-lab
๐ https://hacklido.com/blog/891-getting-started-with-soc-setting-an-elastic-home-siem-lab
HACKLIDO
Getting started with SOC: Setting an Elastic Home SIEM lab
If you want to pursue your career as an SOC analyst, you can get hand- off experience for free by setting up your own SIEM labs. Hereโs how I did it. What is...
๐ The Unpatchable Exploit: How Checkra1n bypasses iCloud Activation Locks
๐ https://hacklido.com/blog/899-the-unpatchable-exploit-how-checkra1n-bypasses-icloud-activation-locks
๐ https://hacklido.com/blog/899-the-unpatchable-exploit-how-checkra1n-bypasses-icloud-activation-locks
HACKLIDO
The Unpatchable Exploit: How Checkra1n bypasses iCloud Activation Locks
The Checkra1n jailbreak has revolutionised the landscape of iOS jailbreaking and security research. Leveraging the powerful checkm8 bootrom exploit, Checkr...
๐ How To Talk About Cybersecurity To People Who Don't [YET] Care
๐ https://hacklido.com/blog/898-how-to-talk-about-cybersecurity-to-people-who-dont-yet-care
๐ https://hacklido.com/blog/898-how-to-talk-about-cybersecurity-to-people-who-dont-yet-care
HACKLIDO
How To Talk About Cybersecurity To People Who Don't [YET] Care
Weโre focused onโฆ How to talk to people who donโt care about cybersecurity. Why? Because weโre rolling out a new series of blog posts on the BHMEA cont...
๐ Machine Learning In Cybersecurity
๐ https://hacklido.com/blog/888-machine-learning-in-cybersecurity
๐ https://hacklido.com/blog/888-machine-learning-in-cybersecurity
HACKLIDO
Machine Learning In Cybersecurity
The emerging field of machine learning (ML) is driving transformations across industries. But while weโre still in these relatively early stages of the int...
๐ Strengths and weaknesses of the new UN cybercrime convention
๐ https://hacklido.com/blog/902-strengths-and-weaknesses-of-the-new-un-cybercrime-convention
๐ https://hacklido.com/blog/902-strengths-and-weaknesses-of-the-new-un-cybercrime-convention
HACKLIDO
Strengths and weaknesses of the new UN cybercrime convention
On 8 August 2024, the draft text of the UN Convention Against Cybercrime was finalised. This has real implications for cybersecurity standards and resilien...
๐ A basic overview of Hypervisor Implants
๐ https://hacklido.com/blog/907-a-basic-overview-of-hypervisor-implants
๐ https://hacklido.com/blog/907-a-basic-overview-of-hypervisor-implants
HACKLIDO
A basic overview of Hypervisor Implants
Hypervisors are pieces of software used to manage VMs (Virtual Machines) or Guest machines on a Host machine. The main difference between a hypervisor an...
๐ The UN convention on cybercrime: What does it mean for you?
๐ https://hacklido.com/blog/904-the-un-convention-on-cybercrime-what-does-it-mean-for-you
๐ https://hacklido.com/blog/904-the-un-convention-on-cybercrime-what-does-it-mean-for-you
HACKLIDO
The UN convention on cybercrime: What does it mean for you?
Weโre focused onโฆ The new UN convention on cybercrime. Why? Because the draft text of the UN Convention Against Cybercrime was finalised on 8 August 20...
๐ How do we measure the success of the UN cybercrime convention?
๐ https://hacklido.com/blog/903-how-do-we-measure-the-success-of-the-un-cybercrime-convention
๐ https://hacklido.com/blog/903-how-do-we-measure-the-success-of-the-un-cybercrime-convention
HACKLIDO
How do we measure the success of the UN cybercrime convention?
When we asked Betania Allo (Founder and Principal Consultant, BA Cyber Law & Policy) to share her perspective on the new UN Convention Against Cybercr...
๐ Why Cybersecurity Proffessionals Should Study Psychology
๐ https://hacklido.com/blog/897-why-cybersecurity-proffessionals-should-study-psychology
๐ https://hacklido.com/blog/897-why-cybersecurity-proffessionals-should-study-psychology
HACKLIDO
Why Cybersecurity Proffessionals Should Study Psychology
Weโre focused onโฆ Being OK with making mistakes and not having all the answers. Why? Because we interviewed BHMEA Advisory Board member Jason Lau (CIS...
๐ The Way I Used to Find RCE (Remote Code Execution) via File Upload
๐ https://hacklido.com/blog/914-the-way-i-used-to-find-rce-remote-code-execution-via-file-upload
๐ https://hacklido.com/blog/914-the-way-i-used-to-find-rce-remote-code-execution-via-file-upload
HACKLIDO
The Way I Used to Find RCE (Remote Code Execution) via File Upload
Hello, Hacklido community! This is my first article, and Iโm excited to share one of my most significant vulnerability discoveries: Remote Code Execution (RC...
๐ Why cyber poverty is a serious problem in 2024
๐ https://hacklido.com/blog/916-why-cyber-poverty-is-a-serious-problem-in-2024
๐ https://hacklido.com/blog/916-why-cyber-poverty-is-a-serious-problem-in-2024
HACKLIDO
Why cyber poverty is a serious problem in 2024
In 2023, upcoming Black Hat MEA speaker Ramy Houssaini (Chief Cyber & Technology Risk Officer, & Group Privacy Officer, at BNP Paribas) was one of...
๐ What can we learn from the Crowdstrike IT outage?
๐ https://hacklido.com/blog/909-what-can-we-learn-from-the-crowdstrike-it-outage
๐ https://hacklido.com/blog/909-what-can-we-learn-from-the-crowdstrike-it-outage
HACKLIDO
What can we learn from the Crowdstrike IT outage?
The Crowdstrike global IT outage caused widespread disruption, with critical industries put at risk as some of their services stalled. Now, weโre seeing la...
๐ A Zero Day that went undiscovered for 18 years
๐ https://hacklido.com/blog/917-a-zero-day-that-went-undiscovered-for-18-years
๐ https://hacklido.com/blog/917-a-zero-day-that-went-undiscovered-for-18-years
HACKLIDO
A Zero Day that went undiscovered for 18 years
Eighteen years is a long time by anyoneโs standards โ and itโs certainly a long time for a vulnerability to go undetected and unpatched. But in early Apr...
๐ A tech coalition to combat scams
๐ https://hacklido.com/blog/912-a-tech-coalition-to-combat-scams
๐ https://hacklido.com/blog/912-a-tech-coalition-to-combat-scams
HACKLIDO
A tech coalition to combat scams
Weโre focused onโฆ Protecting tech users against scams. Why? Because in 2023, the US Federal Trade Commission reported that consumers in the US alone lo...
โ๏ธ CyberWeekly 28' Sept | Issue #7
โ๏ธ CUPS, vulnerabilities, remote code execution, patches, NIST, authentication guidelines, cyberattacks, transportation, logistics, malware, water treatment, cybersecurity, EPA, ATG systems.
๐ https://hacklido.substack.com/p/cyberweekly-28-sept-issue-7
โ๏ธ CUPS, vulnerabilities, remote code execution, patches, NIST, authentication guidelines, cyberattacks, transportation, logistics, malware, water treatment, cybersecurity, EPA, ATG systems.
๐ https://hacklido.substack.com/p/cyberweekly-28-sept-issue-7
๐ Insights from a CISO: What I look for when hiring new talent
๐ https://hacklido.com/blog/908-insights-from-a-ciso-what-i-look-for-when-hiring-new-talent
๐ https://hacklido.com/blog/908-insights-from-a-ciso-what-i-look-for-when-hiring-new-talent
HACKLIDO
Insights from a CISO: What I look for when hiring new talent
Hiring cybersecurity talent is one of the major challenges faced by CISOs across the industry. Reaching the right people, developing an attractive job prop...
๐ Crypto security: Embracing transparency in leadership
๐ https://hacklido.com/blog/918-crypto-security-embracing-transparency-in-leadership
๐ https://hacklido.com/blog/918-crypto-security-embracing-transparency-in-leadership
HACKLIDO
Crypto security: Embracing transparency in leadership
With a background in counterintelligence for the US Army and experience of building and leading incident response and security engineering teams, Philip Ma...
๐ AI in Cybersecurity: Enhancing Threat Detection
๐ https://hacklido.com/blog/925-ai-in-cybersecurity-enhancing-threat-detection
๐ https://hacklido.com/blog/925-ai-in-cybersecurity-enhancing-threat-detection
HACKLIDO
AI in Cybersecurity: Enhancing Threat Detection
Cyber criminals have evolved from a peripheral threat to a significant danger in our online lives today. In todayโs world, technology has spread out and is...
โ๏ธ CyberWeekly 05' Oct | Issue #8
โ๏ธ Texas Hospital ransomware attack, Ivanti Endpoint Manager vulnerability, Zimbra flaw, CUPS DDoS, US Healthcare Cybersecurity Bill, CVE-2024-29824, CVE-2024-45519, CISA.
๐ https://hacklido.substack.com/p/cyberweekly-05-oct-issue-8
โ๏ธ Texas Hospital ransomware attack, Ivanti Endpoint Manager vulnerability, Zimbra flaw, CUPS DDoS, US Healthcare Cybersecurity Bill, CVE-2024-29824, CVE-2024-45519, CISA.
๐ https://hacklido.substack.com/p/cyberweekly-05-oct-issue-8