Projects

...
BOOK

Ransomware (2)

...
NESSUS

Your Page Title Download the full report here: https://hickszilla.com/wp-content/uploads/2023/06/Utilizing-NESSUS-for-Vulnerability-Scanning-in-Cybersecurity-1.pdf Cyber Security Foundational Knowledge: NESSUS Vulnerability Scanning Date: 24 June 2023 1. Introduction 2. Vulnerability Scanning Overview 3. NESSUS: An Overview 4. Importance of NESSUS in Cybersecurity 5. Benefits and Challenges of Using NESSUS 6. Best Practices for Effective Vulnerability Management...

...
Threat Hunting Methodology

Cyber Security Foundational Knowledge: Cyber Threat Hunting Methodology Date: 23 June 2023   I. Introduction    A. Definition of cyber threat hunting Cyber threat hunting is an active practice employed by security analysts to proactively search and investigate systems and networks for potential malicious activities and ongoing attacks that may...

...
APT Attribution

Cyber Security Foundational Knowledge: Advanced Persistent Threat Attribution Date: 23 June 2023 Executive Summary: Advanced Persistent Threats (APTs) are sophisticated cyber attacks launched by well-funded and highly skilled threat actors with specific objectives. APTs represent a significant and persistent threat to organizations across various sectors, including government entities, corporations, and...

...
Sunburst Attack

Cyber Threat Analysis Report: Solarwinds Compromise Date: 22 June 2023 Solargate Sunburst FireEye Orion tool Flaws Foothold Escalation Timeline Sep 2019: Assessment, code injection tests Nov 2020: Injection testing ceases Feb 2020: Backdoor compiled and deployed Mar 2020: Estimated distribution of backdoor May 2020: Estimated start of hands key attacks...

...
MITRE ATT&CK Framework

Cyber Security Foundational Knowledge: MITRE ATT$CK Date: 20 June 2023 MITRE ATT&CK Framework Summary The MITRE ATT&CK Framework The MITRE ATT&CK Framework is a widely recognized and extensively used knowledge base that categorizes and describes various types of cyber threats and attack techniques. It aims to provide organizations with valuable...

...
Pegasus

The Pegasus malware is a sophisticated spyware developed by the Israeli cybersecurity company NSO Group. It is designed to infect mobile devices, specifically iOS and Android smartphones, and gain complete access to the device, allowing the attacker to monitor and collect information from the infected device. Pegasus is typically delivered...

...
Tencent

      Cyber Threat Intelligence Analysis: Assessing Tencent's Potential Threat to US Companies and Military Introduction In this comprehensive cyber threat intelligence analysis, we delve into the potential threat posed by Tencent, a Chinese multinational conglomerate, to US companies and military interests. Through an examination of various factors, we...

...
OSINT - Methodology

Cyber Security Foundational Knowledge: OSINT Methodology Date: 20 June 2023 OSINT (Open Source Intelligence) Table of Contents 1. | Introduction to OSINT Understanding the concept and importance of OSINT Differentiating between open source and classified information 2. | Research and Investigation Techniques Developing effective search strategies Utilizing search engines and...

...
SCADA Attacks

Cyber Threat Analysis Report: Threats to SCADA/ICS Date: 17 June 2023     Executive Summary: This report provides an overview of cyber attacks targeting Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS). It highlights real-world examples such as Stuxnet, the Colonial Pipeline attack, US energy infrastructure and...

...
Java Scraper- Google News

import javax.swing.*; import java.awt.*; import java.awt.event.ActionEvent; import java.awt.event.ActionListener; import java.io.BufferedReader; import java.io.IOException; import java.io.InputStreamReader; import java.net.HttpURLConnection; import java.net.URL; import org.json.JSONArray; import org.json.JSONObject; public class GoogleNewsSearch { private static final String API_KEY = "YOUR_GOOGLE_NEWS_API_KEY"; public static void main(String[] args) { SwingUtilities.invokeLater(() -> createAndShowGUI()); } private static void createAndShowGUI() { JFrame frame...

...
Python Scraper - Google's Cyber Security Daily Top Ten

Top News Top News import requests def get_top_news(): api_key = "YOUR_API_KEY" # Replace with your News API key # Specify the API endpoint and parameters url = "https://newsapi.org/v2/top-headlines" params = { "q": "cyber security", "category": "technology", "apiKey": api_key, "pageSize": 10 } try: # Send a GET request to the News...

...
Ransomware

Cyber Threat Analysis Report: Ransomware Date: 15 June 2023 Executive Summary: This report presents a detailed analysis of ransomware, a malicious software that encrypts files and demands ransom payments to decrypt. The analysis covers the technical aspects of ransomware, including attack vectors, notable ransomware families, malware analysis, attribution challenges, and...

...
Java News

import javax.swing.*; import java.awt.*; import java.awt.event.ActionEvent; import java.awt.event.ActionListener; import java.io.BufferedReader; import java.io.IOException; import java.io.InputStreamReader; import java.net.HttpURLConnection; import java.net.URL; import org.json.JSONArray; import org.json.JSONObject; public class GoogleNewsSearch { private static final String API_KEY = "API_KEY"; public static void main(String[] args) { SwingUtilities.invokeLater(() -> createAndShowGUI()); } private static void createAndShowGUI() { JFrame frame...