al3x@wannaCYbeR(security)~$ echo "Issue \x02"
Alessandra ?? Perotti
Malware Reverse Engineer + Cyber Threat Intel Analyst @ CVS Health | Threat Researcher | GREM | GCIH | GIAC Advisory Board
Greetings, fellow cyber rookies, and welcome to the second issue of wannaCYbeR(security), a weekly newsletter dedicated to those who are just starting in cybersecurity. Read on and feel free to share any feedback you might have.
USEFUL NEWS
Russia, Ukraine, and the global cyberwar
It’s all over the news and very much discussed in cybersecurity circles. The main question is: how is the “digital war” that goes along with geopolitical moves going to play out? We are all familiar with the economic interests at stake and the main actors involved. What we don’t know yet is in what ways the U.S., Ukraine, and other countries will be impacted be by the "cyberwar."
CISA (Cybersecurity Infrastructure and Security Agency) published a new resource called “Shields Up” warning companies about cyber threats, especially targeting “critical infrastructure” – think power plants, food producers, water treatment plants, public transportation, etc.
“Notably, the Russian government has used cyber as a key component of their force projection over the last decade, including previously in Ukraine in the 2015 timeframe. The Russian government understands that disabling or destroying critical infrastructure—including power and communications—can augment pressure on a country’s government, military, and population and accelerate their acceding to Russian objectives.”
Unsurprisingly, Bleeping Computer is reporting about Ukrainian military agencies and state-owned banks being hit by Distributed Denial of Service (DDoS) attacks. At the same time, The Washington Post mentions that “Russian government hackers” would have “likely broadly penetrated Ukrainian military, energy, and other critical computer networks to collect intelligence and position themselves potentially to disrupt those systems should Russia launch a military assault on Ukraine, according to newly declassified U.S. intelligence.”
Speaking of critical infrastructure, episode #400 of The H4unt3d Hacker podcast is a particularly relevant piece of content to listen to at this moment. Mike “The H4unt3d Hacker” Jones speaks with Luther “Chips” Harris about the current threats to power grids, water treatment plants, and other critical infrastructures. They also discuss the connections between geopolitics and cybersecurity, and the challenges of operating with outdated industrial technologies.
Updates, Updates, Updates
Meme of the Week: Bug Hunter
领英推荐
Special - Mini-Guide: Cybersecurity is such a massive field! As a beginner, where do I start?
That's a great question and one that I see quite often asked on LinkedIn, Discord servers, and in other virtual conversation spaces. I'm also a rookie and I know how overwhelming it can be to have so many topics I know nothing about and I want to learn everything about. The answer is highly dependent on what you already know and what your goals are. Here are some ideas and questions that helped me get started on my cyber journey:
TryHackMe: Gallery writeup
Over the past weekend, I solved the challenges in the Gallery room on TryHackMe and decided to make my first writeup out of it, especially because I was able to learn a few new tricks for netcat shell stabilization. Try out the room and take a look at my write-up!
Fun Stuff: Physical Penetration Test with Zach Hill
What exactly is a physical penetration test and how does it work? Zach Hill from TCM Security recently went on an engagement and recounts his exciting experience, as well as the lessons learned.
Bonus Meme: The Power of SUDO
That's all for this week. If you enjoyed the newsletter, please feel free to share it with your connections. Do you know of a great piece of content I should include? Don’t be shy, reach out!
P.S. In case you were wondering, I don't receive any compensation or sponsorship for the content I share. I do it just because I love to nerd out with other people on topics of common interest.
Thank you very much for featuring us!
Malware Reverse Engineer + Cyber Threat Intel Analyst @ CVS Health | Threat Researcher | GREM | GCIH | GIAC Advisory Board
2 年Link to the TryHackMe writeup: https://www.dhirubhai.net/pulse/gallery-tryhackme-my-first-writeup-alessandra-perotti