May 2025: Major Data Breaches and Cyber Attacks

South African Airways hit by cyber attack South African Airways (SAA) has become the latest organisation to fall victim to a cyber attack. In a statement released today, the flagship carrier of South Africa says it has been impacted by a significant cyber incident that began on Saturday, 3 May. According to SAA, the breachContinue reading “May 2025: Major Data Breaches and Cyber Attacks”

AWS Security – Part 1- Securing Root Account with MFA

Task: Create AWS account and set up for below tasks What is the need to perform this: Securing an AWS root account is crucial because it has unrestricted access to all resources and services within your AWS environment. If compromised, an attacker could delete resources, steal data, or even lock you out of your ownContinue reading “AWS Security – Part 1- Securing Root Account with MFA”

Monthly Round Up for the month of July 2024

AT & T cyber attack A massive AT&T Cyberattack caused Hackers to Steal Millions of Customer Records. Consequently, AT&T revealed that nearly all of its wireless customers’ call and text records were exposed. Furthermore, the hackers accessed customer data stored on a third-party cloud platform.  Patient reports used as paper plates at Mumbai hospital A videoContinue reading “Monthly Round Up for the month of July 2024”

WiFi Security

WiFi is an acronym for ‘Wireless Fidelity’ which is one of methods by which computer/device may connect to the internet with out the use of wires. This is a technique of communication between the devices like routers, Computers, tablets, smartphones and other related hardware it makes use of radio frequencies. Security Risks and WiFi ThreatsContinue reading “WiFi Security”

Near Field Communication (NFC)

Near Field Communication, or NFC, is a short-range wireless communication technology that enables devices to interact with each other within a close proximity, typically within a few centimeters. It operates at a frequency of 13.56 MHz and can be used for various applications, such as contactless payment systems, secure access control, and data sharing between devicesContinue reading “Near Field Communication (NFC)”

Weekly roundup for August 20 to 26

SEIKO Data Breach The watch manufacturing company Seiko, targeted by the threat group BlackCat/ALPHV who operates as ransomware as a service. On August 10, the company notified its customers about a data breach after they detected unauthorized access to its server. Cloud Host Lost All Data  There has been a cyber attack on two cloudContinue reading “Weekly roundup for August 20 to 26”

HackTheBox – Keeper

User Flag Ater adding the target machine in /etc/hosts we conducted a NMAP scan. While accessing the IP over browser we got the following URL. After adding this URL in the /etc/hosts file we tried to access the URL. We tried to brute force the credentials manually and the following credential set worked. root:password UponContinue reading “HackTheBox – Keeper”

HackTheBox – Precious

NMAP Scanning Add website to hosts file: Open the web service This website takes a web page URL and converts it into PDF. On examining the pdf, it shows that it is using pdfkit v0.8.6 version On searching we found vulnerability for mentioned version On studying the POC it looks like the URL parameter isContinue reading “HackTheBox – Precious”

Common Linux Privilege Escalation

Used room: https://tryhackme.com/room/commonlinuxprivesc Privilege Escalation is a practice. It mainly depends upon configuration done in the system that acts as a weakness to escalate the privileges. These configurations can be of many types. For e.g.: So, today or tonight we will see various methods to do privilege escalation in Linux. Step 1: Enumerate the machineContinue reading “Common Linux Privilege Escalation”

AWS Analytics Services

Data Warehouse A data warehouse is a data storage solution that aggregates massive amounts of historic data from disparate sources. Benefits: Data warehouses support querying, reporting, analytics. And business intelligence. They are not used for transaction processing. Amazon Redshift Redshift is a scalable data warehouse solution. Features: Data warehousing solution. Handles exabyte-scale data. Improves speedContinue reading “AWS Analytics Services”