HyperQube
@HyperQubeTech
Followers
212
Following
53
Media
68
Statuses
261
Copy and Paste for Infrastructure
Washington, DC
Joined August 2018
Cyber Security word of the day π¨π¨π¨ JBOH (JavaScript-Binding-Over-HTTP): A form of Android-focused mobile device attack that enables an attacker to be able to initiate the execution of arbitrary code on a compromised device.
0
1
3
Cyber Security word of the day π¨π¨π¨ JBOH (JavaScript-Binding-Over-HTTP): A form of Android-focused mobile device attack that enables an attacker to be able to initiate the execution of arbitrary code on a compromised device.
0
1
3
Cyber Security word of the day π¨π¨π¨ Bug: An error or mistake in software coding or hardware design or construction. A bug represents a flaw or vulnerability in a system discoverable by attackers and used as a point of compromise.
0
1
1
Cyber Security word of the day π¨π¨π¨ Bug: An error or mistake in software coding or hardware design or construction. A bug represents a flaw or vulnerability in a system discoverable by attackers and used as a point of compromise.
0
1
1
Cyber Security word of the day π¨π¨π¨ APT (Advanced Persistent Threat): A security breach that enables an attacker to gain access or control over a system for an extended period usually without the owner of the system being aware of the violation.
0
1
1
Cyber Security word of the day π¨π¨π¨ APT (Advanced Persistent Threat): A security breach that enables an attacker to gain access or control over a system for an extended period usually without the owner of the system being aware of the violation.
0
1
1
Watch all the gory details in real-time as we upgrade from ubuntu 20.04 to 22.04βΌοΈ https://t.co/QRK9PAQbSw
0
1
1
Cyber Security word of the day π¨π¨π¨ Trojan Horse (Trojan): A form of malware where a malicious payload is embedded inside of a benign host file. When the victim uses the host file, the malicious payload is automatically deposited onto their computer.
0
1
1
Watch all the gory details in real-time as we upgrade from ubuntu 20.04 to 22.04βΌοΈ https://t.co/QRK9PAQbSw
0
1
1
Cyber Security word of the day π¨π¨π¨ Trojan Horse (Trojan): A form of malware where a malicious payload is embedded inside of a benign host file. When the victim uses the host file, the malicious payload is automatically deposited onto their computer.
0
1
1
Cyber Security word of the day π¨π¨π¨ spoof (spoofing): The act of falsifying the identity, of the source of a communication or interaction. It is possible to spoof an IP address, MAC address, and email address.
0
1
2
Learn how to detect a portscan with SnortβΌοΈ https://t.co/rqbk7MQtUm
0
2
2
Cyber Security word of the day π¨π¨π¨ spoof (spoofing): The act of falsifying the identity, of the source of a communication or interaction. It is possible to spoof an IP address, MAC address, and email address.
0
1
2
Learn how to detect a portscan with SnortβΌοΈ https://t.co/rqbk7MQtUm
0
2
2
If you can imagine it, you can build it! Get rid of all the headaches with building your own virtualization lab @
0
0
1
Cyber Security word of the day π¨π¨π¨ Clickjacking: A hacking attack tricks victims into clicking on an unintended link or button and is usually disguised as a harmless element.
0
0
0
Watch as we use HyperQube's #cyberlab to turn Ubuntu 20.04 into a DHCP server! https://t.co/Ow7rTc5Hhj
0
2
1
Cyber Security word of the day π¨π¨π¨ DDoS: An acronym that stands for distributed denial of service β a form of cyber attack. This attack aims to make a service such as a website unusable by βfloodingβ it with malicious traffic or data from multiple sources (often botnets).
0
0
1
5. Aged Accounts As an attacker, aged accounts or accounts with no password expiration policy make ideal targets for adversaries looking to maintain long-term access to an environment.
0
0
0
4. Legacy Systems An engineering team could inform the security team that a legacy system cannot be replaced for one year due to a business-critical dependency. One year turns into 10, and soon there's a Windows 2003 server sitting in production with no plan to replace it.
1
0
0