SEARCH KEYWORD -- built in



  SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure

Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...

       2024-10-05 20:47:09

  IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network

Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...

       2024-08-03 08:21:49

  Chinese Developers Release CEC-IDE, Claimed as First Independently Developed IDE

China witnessed the recent launch of a new IDE called CEC-IDE, which boldly claims to be the first IDE independently developed by Chinese developers. Initially, this release was anticipated to be a moment of pride for the country, as it marked the availability of a homegrown IDE. However, the situation quickly took an embarrassing turn, and the entire narrative soon became a subject of ridicule. It has come to light that the so-called independently developed IDE, CEC-IDE, is actually built upon ...

   CHINA,CECIDE,CEC-IDE     2023-08-27 00:43:31