AWS Config (Continuous configuration auditor) provides a detailed view of the resources associated with your AWS account, including how they are configured, how they are related to one another, and how the configurations and their relationships have changed over time

How it Works

Benefits of AWS Config:

  • Continuous Monitoring
    With AWS Config, you are able to continuously monitor…

Cloud computing is a general term to describe the delivery of different services through the Internet. You can access technology services, such as computing power, storage, and databases, on an as-needed basis from cloud providers rather than owning, buying, or maintaining physical data centres and servers.

Photo

Cloud computing services

  • IaaS (Infrastructure-as-a-Service)
  • PaaS (Platform-as-a-Service)

What is RedLine Stealer

RedLine Stealer (a.k.a. RedLine) is malicious software that can be bought for $150/$200 depending on the version on hacker forums. It has the ability to steal data and infect operating systems with malware.

In general, cybercriminals try to infect computers with malicious software like RedLine Stealer to create cash by…

Photo by Franck on Unsplash

We are all familiar with the concept of internet search engines such as Google, Bing, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?

There are some web-based tools for someone to pick particular information from the ocean of…

What’s SockPuppet Account?

Basically, a sock puppet is an alternative profile usually, a social media profile, which you create intending to gather open-source information, with the restriction that this profile will not link back directly to your original account.

Purpose of Sock puppets.

Sock puppets can be used in various different ways-

  1. Investigators can use the sock…

Rogue mobile apps might be the fastest-growing phenomenon among cybercriminals.

They’re a constant problem in unauthorized and authorized mobile app stores, including Google Play and the App Store.

Rogue mobile apps are counterfeit apps designed to mimic trusted brands or apps with non-advertised malicious features. In both cases, the goal…

From a cybersecurity point of view, the dark web is like a huge marketplace, where sensitive data (personal data, banking data, credentials, etc.) rubs shoulders with cyberattack kits. We find indeed malware sold between $50 and $500, there would be 15 billion credentials in circulation.

After clarifying the terms deep…

Google is one of the most reliable and validated search engine ever in the history of the internet. …

The term reconnaissance comes from its military use to describe an information-gathering mission. Both types of reconnaissance are sometimes referred to as passive attacks because the purpose is simply to obtain information, rather than to actively exploit the target. …

Pegasus is a remote access tool (RAT) with spyware capabilities. Its Android variants are capable of extracting data from popular messengers such as WhatsApp, Facebook, and Viber as well as email clients and browsers. …

Oguzhan Ozturk

Expert in data gathering, investigating, and documenting findings in the analysis.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store