<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Cyberyara | Cybersecurity Insights, Threat Analysis & Practical Guides]]></title><description><![CDATA[Stay ahead in cybersecurity with expert insights, threat analysis, and hands-on guides. Explore strategies, tools, and trends to strengthen your security skills.]]></description><link>https://cyberyara.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1715279851823/jrxGP2Whz.png</url><title>Cyberyara | Cybersecurity Insights, Threat Analysis &amp; Practical Guides</title><link>https://cyberyara.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 21:10:03 GMT</lastBuildDate><atom:link href="https://cyberyara.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[The Psychology Behind Your Cybersecurity]]></title><description><![CDATA[You’ve probably heard —or read— variations of the saying, ‘A chain is only as strong as its weakest link.’ While its origins may be uncertain, this is especially true in cybersecurity. Humans are often considered exactly that, a highly coercible targ...]]></description><link>https://cyberyara.com/the-psychology-behind-your-cybersecurity</link><guid isPermaLink="true">https://cyberyara.com/the-psychology-behind-your-cybersecurity</guid><category><![CDATA[threat intel]]></category><category><![CDATA[network baselines]]></category><category><![CDATA[threat intelligence]]></category><category><![CDATA[social engineering]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[cognitive bias]]></category><category><![CDATA[stress management]]></category><category><![CDATA[Threat actors]]></category><category><![CDATA[Insider Threat]]></category><category><![CDATA[Cognitive Biases]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Mon, 31 Mar 2025 18:22:28 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1743289087361/d5ad268a-cffe-4565-8a24-66b8f52157a1.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You’ve probably heard —or read— variations of the saying, ‘A chain is only as strong as its weakest link.’ While its origins may be uncertain, this is especially true in cybersecurity. Humans are often considered exactly that, a highly coercible target, and hackers know this well… that’s why they are actively trying to trick us.</p>
<p>As someone with a Master’s in Social Community Psychology transitioning into cybersecurity, I’ve found that understanding group dynamics and human behavior is a great complement for analyzing threats and cyber defense. My experience as a program manager, where I oversaw the complexities of 24/7 residential shelters, has provided me with a unique lens for understanding human behavior in high-stakes situations, which I find particularly relevant to cybersecurity. During my time in the SANS Cyber Immersion Academy, where I took courses like SEC 401 and SEC 504, I found so many parallels between psychology and cybersecurity. For example, these courses’ emphasis on baselines mirrored my work in 24/7 shelters, where anticipating deviations in routines was key to averting crises or, at the very least, regaining control of situations that could impact staff and clients.</p>
<p>Cybersecurity requires diverse skills, and I believe, understanding human behavior is among the most critical. In this article, I’ll explore how integrating psychology, from cognitive biases to stress resilience, with insights from <a target="_blank" href="https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/">threat intelligence</a> can help anticipate, identify, and mitigate threats. This is not about <a target="_blank" href="https://keepnetlabs.com/blog/the-role-of-human-error-in-successful-cyber-security-breaches">human error</a>, it is about transforming the so-called ‘weakest link’ into a stronger defense.</p>
<h2 id="heading-understanding-baselines-normal-vs-abnormal">Understanding Baselines: Normal vs. Abnormal</h2>
<p>In psychology, establishing behavioral baselines is essential for identifying deviations that may indicate underlying issues. The same applies to cybersecurity, for example, without knowing normal network activity, detecting anomalies becomes difficult. As Professor Bryan Simon emphasizes in the SANS SEC 401 course: <em>‘Know thy systems!’</em> — a principle that applies equally to understanding human behavior and network traffic.</p>
<p>Cybersecurity experts must understand what constitutes normal network activity to identify potential intrusions. This parallels behavioral assessments, where normal behavior must be established to spot anomalies. As a program manager overseeing two 24/7 residential shelters, I saw firsthand how ‘baselines’ operate in high-risk human environments. While humans aren’t identical to systems, the principle holds: knowing clients’ routines, staffing patterns, and facility dynamics allows us to detect risks early, whether a sudden shift in a client’s behavior or an unexpected staff absence. Just as a shelter’s stability depends on recognizing deviations from the norm, cybersecurity relies on spotting anomalies like unusual login times or data transfers in network traffic.</p>
<p>By continuously monitoring and analyzing network patterns, cybersecurity professionals can detect irregularities, much like psychologists or mental health therapists observe and interpret behavioral shifts. This detection is enhanced by threat intelligence, which reveals common adversary tactics, techniques, and procedures (TTPs) and their preferred methods of manipulation, for instance, using urgent language. Knowing what specific deviations attackers often cause allows defenders to align their baseline monitoring with likely malicious activity, transforming human observation into a security advantage. Due to my experience, I see threat intel as those client notes or past observations that guide behavioral professionals to anticipate future behavior and potential triggers, so threat intel provides cybersecurity experts with a record of adversary tactics and motivations, allowing for a more informed and proactive defense.</p>
<p><strong>Recommended Reading:</strong></p>
<ul>
<li><strong><em>"Intrusion Detection"</em></strong> by Rebecca Gurley Bace and Peter Mell: This book goes deep into methods for setting up and maintaining network baselines for security purposes.</li>
</ul>
<h2 id="heading-social-engineering-exploiting-trust-authority-and-habituation">Social Engineering: Exploiting Trust, Authority, and Habituation</h2>
<p>While understanding normal system and network behavior is crucial, attackers also exploit our understanding of 'normal' human interactions and tendencies to manipulate us through social engineering.</p>
<p>Social engineering attacks exploit psychological principles to coerce us into, for example, revealing confidential information or doing something on their behalf. Knowledge of psychological tactics, such as trust, authority, and social proof, can help cybersecurity professionals better defend against these attacks. Let’s see some case study examples:</p>
<ol>
<li><p><strong>Seagate Technology (2016)</strong></p>
<p> In 2016, Seagate Technology fell victim to a sophisticated phishing attack. The attackers employed a tactic known as "whaling," where they impersonated Seagate CEO Stephen Luczo in an email to the HR department. The email requested W-2 forms and personally identifiable information (PII) of all employees. Believing it was legitimate, the HR employee complied. Just like that, they went from being a regular staff doing their job to becoming an <a target="_blank" href="https://www.cisa.gov/topics/physical-security/insider-threat-mitigation">unintentional insider threat</a> as they provided sensitive information to threat actors. A great reminder about how even well-meaning folks can become vectors for attacks.</p>
</li>
<li><p><strong>Democratic National Committee (DNC, 2016)</strong></p>
<p> <a target="_blank" href="https://web-assets.esetstatic.com/wls/2019/10/ESET_Operation_Ghost_Dukes.pdf">APT29 (Cozy Bear), a Russian state-sponsored group</a>, breached the Democratic National Committee in 2016 using spear-phishing emails disguised as legitimate Google security alerts. Staff were tricked into entering credentials on fake login pages—a tactic known as "credential harvesting." This attack exploited the <strong>affect heuristic</strong>: trusting a familiar brand like Google and overlooking subtle anomalies like mismatched URLs. Also, authority bias: assumes legitimacy due to Google’s credibility.</p>
<p> <em>Similar risks arise from</em> <strong><em>habituation</em></strong>—a psychological phenomenon where users prioritize convenience over caution due to repeated exposure to ‘normal’ prompts. For example:</p>
<ul>
<li><p>Clicking "OK" on Microsoft’s User Account Control (UAC) prompts without reading them.</p>
</li>
<li><p>Granting data access to services or apps via, for example, Google sign-in without reviewing permissions.</p>
</li>
</ul>
</li>
</ol>
<p>    Attackers exploit this reduced scrutiny by mimicking trusted interfaces, knowing users will likely bypass the defenses in place.</p>
<ol start="3">
<li><p><strong>MGM Resorts Hack (2023)</strong></p>
<p> In 2023, MGM Resorts faced a ransomware attack by <a target="_blank" href="https://attack.mitre.org/groups/G1015/">Scattered Spider.</a> The attack used a common social engineering technique, vishing (phishing over the phone), to impersonate an employee and gain admin privileges.</p>
<p> How? By impersonating an MGM Resorts employee in a call to the IT help desk, the attackers obtained administrator privileges to MGM's Okta and Azure tenant environments. As a result of the attack, MGM experienced disruptions to essential services, including reservation systems and digital room keys.</p>
</li>
</ol>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1743292659137/c3a63a3f-933d-4459-9073-1e10f9f2166d.png" alt class="image--center mx-auto" /></p>
<p>These incidents demonstrate the critical need for robust cybersecurity awareness and training programs to mitigate social engineering threats effectively. This training becomes far more effective when informed by threat intelligence. Understanding how specific adversaries craft their campaigns—knowing their preferred social engineering playbooks—allows organizations to tailor awareness programs. Instead of generic warnings, training can focus on countering the actual tactics employees are likely to face, empowering them to actively protect themselves and the organization. By teaching employees what to look for, we create a much more resilient defense, a human-centric approach focused on increasing their awareness and providing specific skills to spot these attacks.</p>
<p>For a deeper dive into the psychological principles behind these attacks, see the Cognitive Biases section below.</p>
<p><strong>Practical Tips:</strong></p>
<ul>
<li><p>Train everyone regularly, or educate yourself about the methods or tricks of social engineering and how to recognize them! It’s getting thicker by the minute, given Gen AI and all the tools available.</p>
</li>
<li><p>Use what is known about real attacker tactics (that's where threat intelligence comes in!) to create simulated phishing campaigns.</p>
</li>
<li><p>Foster a culture of skepticism and verification, encouraging employees to double-check unexpected requests for sensitive information.</p>
</li>
</ul>
<p><strong>Something to read:</strong></p>
<ul>
<li><strong><em>"Social Engineering: The Art of Human Hacking"</em></strong> by Christopher Hadnagy: This book explores the psychological tactics used in social engineering and how to counteract them.</li>
</ul>
<h2 id="heading-cognitive-biases-and-decision-making"><strong>Cognitive Biases and Decision-Making</strong></h2>
<p>Cognitive biases can cloud judgment in any field, but their impact on cybersecurity decision-making is particularly critical, as they influence everything from threat analysis to incident response.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1743289659197/3c4b6e41-3d9e-49a2-bb2e-194be866ee00.jpeg" alt class="image--center mx-auto" /></p>
<p>Let’s explore some <a target="_blank" href="https://www.securitymagazine.com/articles/96918-10-cognitive-biases-that-can-derail-cybersecurity-programs">cognitive biases</a> that can impact cyber defenses:</p>
<ol>
<li><p><strong>Authority Bias:</strong> This is the tendency to comply with requests from perceived authority figures without verification. Psychologists like <a target="_blank" href="https://youtu.be/vuMt8b4UrcI?si=9rm88hkUQCX2FubC">Stanley Milgram</a> demonstrated how authority figures can override personal judgment—a principle that attackers exploit in social engineering. Like in the MGM breach, attackers pretended to be employees calling IT support. Similarly, in the Seagate attack, HR staff complied with a fake email from the “CEO” requesting sensitive employee data.</p>
</li>
<li><p><strong>Anchoring:</strong> This bias occurs when we rely too heavily on the first piece of information we find. For instance, if a Chief Information Security Officer (CISO) prioritizes a specific cyber threat, other team members may focus solely on that threat, neglecting other potential risks.</p>
</li>
<li><p><strong>Availability Heuristic:</strong> Security teams often assess risks based on recent experiences or industry trends. This can result in overlooking less obvious threats that do not fit the familiar pattern. For example, while security teams might proactively prioritize defenses against the threat of ransomware attacks, this could also lead to overlooking other significant vulnerabilities or attack vectors that aren't trending yet.</p>
</li>
<li><p><a target="_blank" href="https://stanford.edu/~knutson/jdm/finucane00.pdf"><strong>Affect Heuristic</strong></a><strong>:</strong> This mental shortcut is heavily influenced by emotions. For example, if security staff feel confident about a situation, they may perceive it as low risk and fail to investigate thoroughly, potentially overlooking significant threats.</p>
</li>
<li><p><strong>Optimism Bias:</strong> Many people, including security teams, believe that because they have security measures in place, they are immune to attacks. This “it won’t happen to us” mentality can lead to complacency and underpreparedness. Threat intelligence directly counters this bias by presenting concrete evidence of real-world risks, such as sector-specific targeting trends. This helps teams to address likely attack vectors based on evidence, rather than relying on potentially dangerous assumptions. For more real-world examples, see <a target="_blank" href="https://securitylit.medium.com/the-optimism-bias-in-cybersecurity-real-examples-76b01dcd8555">this article about optimism bias in Cybersecurity</a>.</p>
</li>
<li><p><strong>Decision Fatigue:</strong> Continuous decision-making is exhausting for anyone. In Security Operations Centers (SOC), for instance, one of the risks is that <a target="_blank" href="https://www.usenix.org/system/files/usenixsecurity24-yang-limin.pdf">overwhelmed or fatigued security staff may ignore alerts from security tools</a>, potentially leading to missed critical threats.</p>
</li>
</ol>
<p><strong>Practical Tips:</strong></p>
<ul>
<li><p>Build a culture where we all feel comfortable asking questions and reviewing each other's work. It's about having each other's backs and being open to different ways of seeing things – challenging assumptions is key!</p>
</li>
<li><p>Use structured techniques, like this one called "<a target="_blank" href="https://www.cia.gov/resources/csi/static/Pyschology-of-Intelligence-Analysis.pdf">Analysis of Competing Hypotheses</a>” (p.95). It's a way to consider all the possible explanations instead of sticking with the first one that makes sense. This encourages a thorough analysis.</p>
</li>
<li><p>Keep learning and be ready to adapt when new information pops up. Let's not get too stuck on initial thoughts! Staying curious and open to new evidence is crucial.</p>
</li>
<li><p>Leverage information about cognitive biases to improve decision-making. For example, peer reviews help us catch our blind spots.</p>
</li>
</ul>
<p><strong>Something to read:</strong></p>
<ul>
<li><p><strong><em>"Thinking, Fast and Slow"</em></strong> by Daniel Kahneman: Kahneman presents various cognitive biases and their impacts on decision-making, offering valuable insights for anyone, including cybersecurity folks!</p>
</li>
<li><p><strong><em>“</em></strong><a target="_blank" href="https://www.cia.gov/resources/csi/static/Pyschology-of-Intelligence-Analysis.pdf"><strong><em>Psychology of Intelligence Analysis</em></strong></a><strong><em>”</em></strong> by Richard J Heuer, Jr: The author explores the psychological factors that can affect intelligence analysis, providing insights for cyber threat intelligence professionals looking to improve their analytical skills and objectivity.</p>
</li>
</ul>
<h2 id="heading-stress-management-and-resilience">Stress Management and Resilience</h2>
<p>The high-pressure nature of cybersecurity work can lead to burnout and decreased performance. Applying psychological principles of stress management and resilience can help professionals maintain their mental health and perform effectively under pressure.</p>
<p>As a program manager in a 24/7 residential facility, I witnessed firsthand how chronic stress affects performance. Social workers and managers faced relentless demands: staffing shortages, traumatic cases, overnight emergencies, and the emotional toll of clients’ crises; therefore, Burnout wasn’t just a buzzword. Based on my research, cybersecurity <a target="_blank" href="https://www.usenix.org/system/files/usenixsecurity24-yang-limin.pdf">incident responders face similar challenges</a>: high-stakes alerts, sleepless on-call rotations, and the pressure to mitigate threats in real-time.</p>
<p>My experience taught me that resilience isn’t just individual—it’s systemic. Just as in social services, we implemented team discussions after a crisis and mandatory downtime for staff to process high-stress events, cybersecurity teams need similar support. Without it, even the most skilled professional risks becoming the next ‘<a target="_blank" href="https://www.cisa.gov/sites/default/files/2022-11/Insider%20Threat%20Mitigation%20Guide_Final_508.pdf">insider threat</a>’—not from malice, but from exhaustion.</p>
<p>Just as shelters use debriefings as part of a broader strategy to build resilience, cybersecurity teams can implement structured support systems to maintain vigilance and prevent burnout.</p>
<p><strong>Practical Tips:</strong></p>
<ul>
<li><p>Implement a range of stress management resources, such as regular workshops on coping strategies, physical wellness activities, and provide access to mental health support services.</p>
</li>
<li><p>Encourage a balanced work-life environment to prevent burnout.</p>
</li>
<li><p>Develop a support system within the team to share the workload and provide emotional support during high-pressure situations.</p>
</li>
<li><p>Build peer mentoring systems—a tactic rooted in community psychology—to distribute workloads and combat decision fatigue.</p>
</li>
</ul>
<p><strong>Something to read:</strong></p>
<ul>
<li><strong><em>"The Resilient Practitioner: Burnout Prevention and Self-Care Strategies for Counselors, Therapists, Teachers, and Health Professionals"</em></strong> by Thomas M. Skovholt and Michelle Trotter-Mathison: Although focused on health professionals, the principles of resilience and self-care are highly relevant to cybersecurity.</li>
</ul>
<h2 id="heading-conclusion">Conclusion</h2>
<p>Ultimately, recognizing the impact of human behavior, informed by psychological principles, is essential for building a truly resilient cybersecurity posture that can complement the defenses. My journey, from social-community psychology and managing high-risk human environments (like shelters) to my cybersecurity training and certifications, has solidified the undeniable parallels between understanding human dynamics in crisis and effectively responding to cyber incidents, a key insight reinforced by my studies and research. I hope that this integrated perspective inspires a more human-centered approach to security, leading to stronger and more adaptable defenses.</p>
<p>Security isn’t just about technology; it’s about people. A truly resilient cybersecurity strategy doesn’t just defend against threats—it anticipates them by understanding human behavior. In this effort, threat intelligence acts as a vital bridge, providing defenders with insights into how adversaries are actively exploiting human psychology, allowing us to anticipate and proactively strengthen our defenses, transforming the 'weakest link' into a powerful asset.</p>
<p>So, the next time you think about cybersecurity, ask yourself: Are you securing just the system or the people who interact with it every day?</p>
]]></content:encoded></item><item><title><![CDATA[Wiper Malware: A Silent Weapon of Cyber Warfare]]></title><description><![CDATA[Cyberattacks have long been a critical battleground in modern conflicts, and wiper malware has proved to be one of the most destructive cyber weapons. Unlike ransomware, which seeks financial gain, wiper malware is designed to cause irreversible dama...]]></description><link>https://cyberyara.com/wiper-malware-a-silent-weapon-of-cyber-warfare</link><guid isPermaLink="true">https://cyberyara.com/wiper-malware-a-silent-weapon-of-cyber-warfare</guid><category><![CDATA[WiperMalware]]></category><category><![CDATA[NotPetya]]></category><category><![CDATA[Shamoon]]></category><category><![CDATA[AcidRain]]></category><category><![CDATA[OlympicDestroyer]]></category><category><![CDATA[Maersk]]></category><category><![CDATA[ZeroDay]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[Cyberattacks]]></category><category><![CDATA[Ukraine]]></category><category><![CDATA[Russia]]></category><category><![CDATA[sony]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Wed, 26 Mar 2025 16:30:43 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741220268286/941d7cad-17c7-4232-8380-72bba1cacfe1.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cyberattacks have long been a critical battleground in modern conflicts, and wiper malware has proved to be one of the most destructive cyber weapons. Unlike ransomware, which seeks financial gain, wiper malware is designed to cause irreversible damage by deleting files, corrupting systems, and crippling entire networks.</p>
<p>With the recent buzz surrounding <a target="_blank" href="https://www.netflix.com/title/81598435">Netflix’s <em>Zero Day</em></a>, a series exploring the chaos caused by a zero-day cyberattack, I felt it was the perfect time to dive into known cyberattacks that have disrupted real-world systems and operations. While <em>Zero Day</em> focuses on a fictional zero-day vulnerability and its global consequences, wiper malware represents another form of cyber destruction, and many have experienced what these types of attacks can do.</p>
<p>Wiper malware has been in use for over a decade, but its role in cyber warfare, geopolitical conflicts, and sabotage operations has expanded significantly in recent years. A recent example occurred during Russia’s 2022 invasion of Ukraine, where cyberattacks, including multiple wiper malware strains, were used to target critical infrastructure alongside military operations.</p>
<h2 id="heading-the-viasat-cyberattack"><strong>The Viasat Cyberattack</strong></h2>
<p>On February 24, 2022—the same day Russia launched its military invasion of Ukraine—a cyberattack targeted <strong>Viasat</strong>, a satellite communications provider. The attack disabled KA-SAT modems, disrupting internet services for thousands of users in Ukraine and some parts of Europe. For example, the attack disrupted remote monitoring and control of approximately <a target="_blank" href="https://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/">5,800 wind turbines in Germany</a>, preventing operators from accessing them</p>
<p>Following the incident, researchers at <a target="_blank" href="https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/">SentinelLabs identified a new wiper malware they named <strong>AcidRain</strong></a>. Unlike ransomware, which demands a ransom to unlock data, AcidRain was designed to erase data from modems and routers, potentially rendering them inoperable without recovery options.</p>
<p>Attacks like this highlight a hard reality: wiper malware is a modern cyber warfare weapon that sabotages critical infrastructure.</p>
<p>With geopolitical tensions rising, it is crucial to understand how wiper malware works, its devastating impact, and how organizations can defend against it.</p>
<hr />
<h2 id="heading-what-is-wiper-malware"><strong>What is Wiper Malware?</strong></h2>
<p>Wiper malware is a destructive form of malicious software that permanently deletes, overwrites, or corrupts data, often leaving devices completely unusable. Recovery is extremely difficult without specialized forensic methods or offline backups.</p>
<h3 id="heading-key-characteristics-of-wiper-malware"><strong>Key Characteristics of Wiper Malware:</strong></h3>
<ul>
<li><p><strong>Data Destruction:</strong> Systematically deletes, overwrites, or corrupts files at the disk level, often targeting boot records to make systems unbootable. This makes recovery extremely difficult without backups or specialized forensic methods</p>
</li>
<li><p><strong>No Ransom Demand:</strong> Unlike ransomware, wiper malware provides no decryption keys or ransom demands. It is designed for sabotage, not financial gain.</p>
</li>
<li><p><strong>Wide-scale Impact:</strong> These attacks can cripple networks by wiping servers, corrupting databases, and IoT devices, leading to widespread service disruptions.</p>
</li>
</ul>
<h3 id="heading-who-is-targeted">Who is targeted?</h3>
<p>Governments, critical infrastructure, financial institutions, and major enterprises have all been victims of wiper attacks.</p>
<hr />
<h2 id="heading-how-does-wiper-malware-work"><strong>How Does Wiper Malware Work?</strong></h2>
<h3 id="heading-wiper-malware-employs-various-techniques-to-destroy-data-and-make-systems-inoperable">Wiper malware employs various techniques to destroy data and make systems inoperable:</h3>
<ol>
<li><p><strong>Initial Access</strong> – Attackers gain entry via phishing, supply chain attacks, or exploiting unpatched software.</p>
</li>
<li><p><strong>Privilege Escalation</strong> – Once inside, they gain admin rights to increase their control.</p>
</li>
<li><p><strong>File &amp; System Wiping</strong> – Some wipers target the Master Boot Record (MBR), preventing the system from booting or delete/corrupt key system files.</p>
</li>
<li><p><strong>Network Propagation</strong> – In larger networks, wiper malware spreads to other connected devices, causing broader damage.</p>
</li>
</ol>
<hr />
<h2 id="heading-notable-wiper-malware-attacks"><strong>Notable Wiper Malware Attacks</strong></h2>
<h3 id="heading-1-notpetya-2017httpsattackmitreorgsoftwares0368"><strong>1.</strong> <a target="_blank" href="https://attack.mitre.org/software/S0368/"><strong>NotPetya (2017)</strong></a></h3>
<ul>
<li><p><strong>Target:</strong> Ukrainian businesses, but quickly spread worldwide (Maersk, FedEx, Merck).</p>
</li>
<li><p><strong>Impact:</strong> Originally thought to be ransomware, NotPetya was later identified as a wiper in disguise. It encrypted data with no way to decrypt it (recover it), causing an estimated $10 billion in damages.</p>
</li>
<li><p><strong>Key Lesson:</strong> Wiper malware may resemble ransomware, but its intent is purely destructive, not financial.</p>
</li>
</ul>
<h3 id="heading-2-shamoon-2012-2016-2020httpsattackmitreorgsoftwares0140"><strong>2.</strong> <a target="_blank" href="https://attack.mitre.org/software/S0140/"><strong>Shamoon (2012, 2016, 2020)</strong></a></h3>
<ul>
<li><p><strong>Target:</strong> Energy sector, notably Saudi Aramco and RasGas.</p>
</li>
<li><p><strong>Impact:</strong> Shamoon erased data on 35,000 company computers at Saudi Aramco, replacing files with an image of a burning American flag. Later versions targeted other companies.</p>
</li>
<li><p><strong>Key Lesson:</strong> Wiper malware can serve as a cyber weapon for political messaging and industrial sabotage.</p>
</li>
</ul>
<h3 id="heading-3-acidrain-2022httpsattackmitreorgsoftwares1125"><strong>3.</strong> <a target="_blank" href="https://attack.mitre.org/software/S1125/"><strong>AcidRain (2022)</strong></a></h3>
<ul>
<li><p><strong>Target:</strong> Viasat satellite modems, affecting Ukraine and parts of Europe.</p>
</li>
<li><p><strong>Impact:</strong> Unlike traditional wipers, AcidRain was designed to <strong>erase firmware</strong> on satellite modems; thousands were disabled, and internet services were knocked offline.</p>
</li>
<li><p><strong>Key Lesson:</strong> Wiper malware isn’t limited to computers; it can target network infrastructure and IoT devices, expanding the attack surface.</p>
</li>
</ul>
<h3 id="heading-4-olympic-destroyer-2018httpsattackmitreorgsoftwares0365"><strong>4.</strong> <a target="_blank" href="https://attack.mitre.org/software/S0365/"><strong>Olympic Destroyer (2018)</strong></a></h3>
<ul>
<li><p><strong>Target:</strong> Winter Olympics IT infrastructure (Pyeongchang, South Korea).</p>
</li>
<li><p><strong>Impact:</strong> The attack crippled ticketing systems, broadcasting, and event services, causing widespread operational chaos. Olympic Destroyer contained data-wiping functionality but also included anti-forensic measures to mislead investigators.</p>
</li>
<li><p><strong>Key Lesson:</strong> Wiper malware can be used to sabotage global events and disrupt international operations.</p>
  <div data-node-type="callout">
  <div data-node-type="callout-emoji">💡</div>
  <div data-node-type="callout-text">Extra: <a target="_self" href="https://darknetdiaries.com/episode/77/">Hear the Darknet Diaries episode #77 about the Olympic Destroyer</a>!</div>
  </div>


</li>
</ul>
<h3 id="heading-can-organizations-recover-from-wiper-attacks">Can Organizations Recover from Wiper Attacks?</h3>
<p>While wiper malware is destructive by design, some companies have successfully recovered by implementing robust cybersecurity and disaster recovery plans. Here are two examples:</p>
<ul>
<li><p><strong>Maersk &amp; NotPetya (2017)</strong> – The global shipping giant had all but one of its domain controllers wiped. Thanks to an unaffected office in Ghana, Maersk was able to restore operations within 10 days after rebuilding its IT infrastructure from these isolated backups.</p>
</li>
<li><p><strong>Sony Pictures (2014 Attack)</strong> – After the North Korea-linked Destover wiper malware attack, Sony relied on off-site backups and network isolation to recover operations, though data loss was significant and also led to public leaks of sensitive information.</p>
</li>
</ul>
<p>These cases highlight the importance of offline backups, rapid response, and resilient IT infrastructure in surviving cyberattacks.</p>
<h3 id="heading-who-is-behind-wiper-attacks">Who is Behind Wiper Attacks?</h3>
<p>Determining <strong>who is responsible</strong> <a target="_blank" href="https://cloud.google.com/blog/topics/threat-intelligence/trade-offs-attribution/">(attribution)</a> for cyberattacks is complex because attackers use:</p>
<ul>
<li><p><strong>False flags</strong>: Making the attack appear to come from another country.</p>
</li>
<li><p><strong>VPNs &amp; Proxy Servers</strong>: Hiding their true locations.</p>
</li>
<li><p><strong>Compromised Systems</strong>: Launching attacks from hacked machines. false flags, VPNs, and compromised systems to hide their identities.</p>
</li>
</ul>
<p>Security researchers rely on:</p>
<ul>
<li><p><strong>Malware code similarities</strong>: Comparing wiper malware with known nation-state tools.</p>
</li>
<li><p><strong>Infrastructure analysis</strong>: Tracking IP addresses, command-and-control servers, and domain registrations.</p>
</li>
<li><p><strong>Victim Profiling</strong>: Identifying which industries, organizations, or countries are being targeted.</p>
</li>
<li><p><strong>Threat Actor Profiling</strong>: Analyzing who benefits from the attack and linking it to potential perpetrators.</p>
</li>
</ul>
<p>Attribution is rarely 100% certain, but <a target="_blank" href="https://cloud.google.com/blog/topics/threat-intelligence/trade-offs-attribution/">cybersecurity experts</a> rely on technical forensics and geopolitical context to assign responsibility.</p>
<h3 id="heading-why-is-wiper-malware-a-growing-threat"><strong>Why is Wiper Malware a Growing Threat?</strong></h3>
<p>While wiper malware primarily targets organizations, governments, and critical infrastructure, individuals and businesses can still take steps to protect their data and systems from destructive cyber threats.</p>
<p>1. <strong>Increasing Geopolitical Tensions:</strong> Nation-state actors are using wiper malware as a tool for cyber warfare, targeting critical infrastructure.</p>
<p>2. <strong>Escalating Cyber Sabotage:</strong> Wiper malware is being deployed not just in war zones, but also in financial, energy, and government sectors.</p>
<p>3. <strong>Harder to Defend Against:</strong> Unlike ransomware, wiper malware often leaves no straightforward recovery options, making mitigation strategies critical.</p>
<h3 id="heading-how-to-defend-against-wiper-malware">How to Defend Against Wiper Malware</h3>
<h4 id="heading-for-organizations-amp-enterprises"><strong>For Organizations &amp; Enterprises</strong></h4>
<ul>
<li><p><strong>Network Segmentation</strong>: Prevents malware from spreading across critical systems by isolating sensitive networks.</p>
</li>
<li><p><strong>Advanced Threat Detection</strong>: AI-powered security tools can detect wiper malware before activation.</p>
</li>
<li><p><strong>Endpoint Detection and Response (EDR)</strong> – EDR solutions provide continuous monitoring and response capabilities at the endpoint level (device), allowing organizations to detect and contain wiper malware before it spreads throughout the network.</p>
</li>
<li><p><strong>Incident Response Plans</strong>: A prepared and tested response strategy can reduce downtime.</p>
</li>
<li><p><strong>Patch &amp; Update Software</strong>: Regular updates help eliminate security vulnerabilities.</p>
</li>
<li><p><strong>Zero-Trust Security Model</strong>: Requires continuous verification for network access.</p>
</li>
</ul>
<h4 id="heading-for-individuals-amp-small-businesses"><strong>For Individuals &amp; Small Businesses</strong></h4>
<ul>
<li><p><strong>Regular Backups</strong>: Store backups offline and in the cloud to ensure data recovery.</p>
</li>
<li><p><strong>Software Updates</strong>: Patch vulnerabilities to prevent exploits.</p>
</li>
<li><p><strong>Email &amp; Link Caution</strong>: Be cautious with emails and links, as phishing is a common method for delivering wiper malware.</p>
</li>
<li><p><strong>Security Tools</strong>: Use firewalls, antivirus software, and multi-factor authentication (MFA) for added protection.</p>
</li>
</ul>
<hr />
<h2 id="heading-tldr-wiper-malware-vs-zero-day-exploits"><strong>TL;DR: Wiper Malware vs. Zero-Day Exploits</strong></h2>
<p>While Netflix’s <em>Zero Day</em> explores cyberattacks that may seem similar, most wiper malware does not rely on zero-day exploits. Some, like NotPetya, have used zero-days to spread, but not all wipers require them to cause destruction. A zero-day is an unknown software vulnerability, while a wiper is designed for destruction. Defending against both requires proactive patching, backups, and threat detection</p>
<hr />
<h2 id="heading-conclusion"><strong>Conclusion</strong></h2>
<p>Wiper malware is a dangerous and evolving threat, used in cyber warfare and politically motivated attacks. Whether targeting critical infrastructure, financial institutions, or global events, its effects can be catastrophic.</p>
<p>Understanding how wiper malware operates, its real-world consequences, and how to defend against it is essential. Preparation is the best defense.</p>
<p>✅ <strong>Want to learn more?</strong></p>
<ul>
<li><p>Check <a target="_blank" href="https://cyberyara.com/understanding-mitre-attandck">my beginner guide to MITRE ATT&amp;CK</a> to understand cyberattack techniques.</p>
</li>
<li><p>Explore <a target="_blank" href="https://www.cisa.gov/cybersecurity-awareness-month"><strong>CISA’s cybersecurity best practices</strong></a><strong>.</strong></p>
</li>
<li><p>Evaluate your organization’s cyber resilience with <a target="_blank" href="https://www.nist.gov/cybersecurity">NIST cybersecurity resources.</a></p>
</li>
</ul>
<p>💬 <strong>How prepared do you think most organizations are against wiper malware? Share your thoughts!</strong></p>
]]></content:encoded></item><item><title><![CDATA[Understanding MITRE ATT&CK]]></title><description><![CDATA[When I first started studying for my GIAC certifications, particularly during the SEC 504 course Hackers, Tools, and Incident Handling, I was intrigued and overwhelmed by the depth and constant evolution of adversary behaviors. We focused heavily on ...]]></description><link>https://cyberyara.com/understanding-mitre-attandck</link><guid isPermaLink="true">https://cyberyara.com/understanding-mitre-attandck</guid><category><![CDATA[mitre-attack]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[CyberSec]]></category><category><![CDATA[Security]]></category><category><![CDATA[securityawareness]]></category><category><![CDATA[Threat actors]]></category><category><![CDATA[MITRE]]></category><category><![CDATA[Security Frameworks]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Wed, 05 Mar 2025 08:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1741311306456/2e817a2e-a4ac-46fe-ab58-9466fa787372.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When I first started studying for my GIAC certifications, particularly during the <a target="_blank" href="https://www.sans.org/cyber-security-courses/hacker-techniques-incident-handling/">SEC 504 course Hackers, Tools, and Incident Handling</a>, I was intrigued and overwhelmed by the depth and constant evolution of adversary behaviors. We focused heavily on TTPs (Tactics, Techniques, and Procedures) and how they map to real-world cyberattacks. The MITRE ATT&amp;CK framework, vast and ever-evolving, initially seemed like a lot to absorb. However, with ongoing study and practice, I began to understand how these concepts are applied in defending against cyber threats.</p>
<p>MITRE ATT&amp;CK can be just as daunting for beginners. It’s a framework that organizes vast amounts of information about how attackers operate, which can feel overwhelming if you're starting. But trust me, once you break it down, it becomes an incredibly valuable tool for understanding and defending against cyber threats. In this guide, I'll help you make sense of the ATT&amp;CK framework, how it's structured, and how you can use it to improve your cybersecurity practices. Whether you're a beginner or someone working to sharpen your skills, let's dive in and make MITRE ATT&amp;CK less intimidating!</p>
<h2 id="heading-what-is-mitre-attampck"><strong>What Is MITRE ATT&amp;CK?</strong></h2>
<p><a target="_blank" href="https://attack.mitre.org/matrices/enterprise/#">MITRE ATT&amp;CK (Adversarial Tactics, Techniques, and Common Knowledge)</a> is a publicly accessible knowledge base that catalogs real-world adversary behaviors. Think of it as a "playbook" of how attackers operate, organized into tactics (goals) and techniques (methods). Unlike traditional threat lists, ATT&amp;CK focuses on <em>how</em> attacks happen, not just <em>what</em> they look like. Please note that while this guide focuses on the Enterprise Matrix, MITRE also offers frameworks for <a target="_blank" href="https://attack.mitre.org/matrices/mobile/">Mobile</a> and <a target="_blank" href="https://attack.mitre.org/matrices/ics/">Industrial Control Systems (ICS)</a>.</p>
<div data-node-type="callout">
<div data-node-type="callout-emoji">💡</div>
<div data-node-type="callout-text">NOTE: This article discusses the current version of MITRE ATT&amp;CK is 17.01</div>
</div>

<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748478360068/0149c230-289c-4035-8cca-5051a0a70144.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-why-it-matters"><strong>Why It Matters</strong></h2>
<ul>
<li><p><strong>Common Language</strong>: Security teams use ATT&amp;CK to communicate threats clearly.</p>
</li>
<li><p><strong>Detection &amp; Response</strong>: Helps organizations spot attacker behaviors, not just malware signatures.</p>
</li>
<li><p><strong>Proactive Defense</strong>: By anticipating attacker workflows, teams can prioritize patching vulnerabilities or monitoring high-risk techniques.</p>
</li>
</ul>
<h2 id="heading-key-concepts-tactics-techniques-and-sub-techniques"><strong>Key Concepts: Tactics, Techniques, and Sub-Techniques</strong></h2>
<p><strong>Tactics: The "Why" Behind Attacks</strong></p>
<p>Tactics represent the "why" behind an attacker’s actions. In other words, the adversary's goals at various stages of the attack. Note that all tactics IDs start with TA, then the number. ex. Reconnaissance: <strong>TA</strong>0043</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748478846189/dcc0b596-856d-4bb5-9748-2ffd12f2c5b3.png" alt class="image--center mx-auto" /></p>
<p>Here are the main tactics and their goals:</p>
<ul>
<li><p><strong>TA0043: Reconnaissance</strong> – Collect data to plan future malicious activities.</p>
</li>
<li><p><strong>TA0042: Resource Development</strong> – Identify resources to support malicious operations.</p>
</li>
<li><p><strong>TA0001: Initial Access</strong> – Gain first access to your network.</p>
</li>
<li><p><strong>TA0002: Execution</strong> – Execute malicious code.</p>
</li>
<li><p><strong>TA0003: Persistence</strong> – Maintain their foothold.</p>
</li>
<li><p><strong>TA0004: Privilege Escalation</strong> – Get access to higher-level permissions.</p>
</li>
<li><p><strong>TA0005: Defense Evasion</strong> – Evade defenses to avoid being detected.</p>
</li>
<li><p><strong>TA0006: Credential Access</strong> – Acquire account names and passwords.</p>
</li>
<li><p><strong>TA0007: Discovery</strong> – Investigate your environment.</p>
</li>
<li><p><strong>TA0008: Lateral Movement</strong> – Move through your environment.</p>
</li>
<li><p><strong>TA0009: Collection</strong> – Collect data relevant to their goal.</p>
</li>
<li><p><strong>TA0011: Command and Control</strong> – Control compromised systems and communicate with them.</p>
</li>
<li><p><strong>TA0010: Exfiltration</strong> – Steal collected data.</p>
</li>
<li><p><strong>TA0040: Impact</strong> – Alter, corrupt, or destroy your systems and data.</p>
</li>
</ul>
<p>As seen in the image above, each tactic includes several techniques.</p>
<p><strong>Techniques: The "How"</strong><br />Techniques are specific actions attackers use to achieve their goals. Note that all technique IDs start with T, then the number. ex. Phishing: <strong>T</strong>1566 For example:</p>
<ul>
<li><p><strong>Phishing (T1566)</strong>: Sending deceptive emails to trick users into sharing sensitive information.</p>
</li>
<li><p><strong>Use Alternate Authentication Material (T1550)</strong>: Using alternative credentials or methods for authentication, such as password hashes or Kerberos tickets.</p>
</li>
</ul>
<p>Some techniques like <strong>Use Alternate Authentication Material</strong> have sub-techniques. Let’s explore that.</p>
<p><strong>Sub-Techniques: Granular Details</strong><br />Sub-techniques refine techniques into detailed actions. Techniques that have sub-techniques have a gray sidebar. It is important to note that not all techniques have sub-techniques. If a technique has a sub-technique, you will see a grey area next to the technique name. To see the sub-techniques of the technique you must click in the gray area. Note that their IDs will append a sub-ID to the technique ID (ex. T1550.<strong>002</strong>)</p>
<p>For instance, under <a target="_blank" href="https://attack.mitre.org/techniques/T1550/"><strong>Use Alternate Authentication Material (T1550)</strong></a> there are currently four sub-techniques, two of them are:</p>
<ul>
<li><p><a target="_blank" href="https://attack.mitre.org/techniques/T1550/002/"><strong>T1550.002</strong>: <strong>Pass-the-Hash</strong></a> via NTLM, a specific method for bypassing authentication using hash values from NTLM (Windows authentication protocol).</p>
</li>
<li><p><a target="_blank" href="https://attack.mitre.org/techniques/T1550/004/"><strong>T1550.004</strong>: <strong>Web Session Cookie</strong></a> – Stealing and using session cookies to impersonate a user without needing their password.</p>
</li>
</ul>
<p>Another example, <a target="_blank" href="https://attack.mitre.org/techniques/T1003/"><strong>OS</strong> <strong>Credential Dumping (T1003</strong></a><strong>),</strong> has 8 sub-techniques so far, two of which are:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1741290508992/86c8a779-a35f-40e1-b71e-6dce6a0ad905.png" alt class="image--center mx-auto" /></p>
<ul>
<li><p><strong>T1003.001</strong>: LSASS Memory: Extracting passwords from memory.</p>
</li>
<li><p><strong>T1003.002</strong>: Security Account Manager (SAM): Extracting passwords from registry keys.</p>
</li>
</ul>
<h2 id="heading-the-pyramid-of-pain-why-behavior-matters"><strong>The Pyramid of Pain: Why Behavior Matters</strong></h2>
<p>The Pyramid of Pain, created by David Bianco, helps us understand why focusing on TTPs is more effective in defending against adversaries than relying on traditional indicators of compromise (IOCs). Unlike IOCs, such as file hashes or IP addresses, which attackers can easily change, behaviors (TTPs) are harder to adapt quickly and provide a much more lasting challenge for threat actors.</p>
<p>Before MITRE ATT&amp;CK, defenses typically focused on low-level indicators like IP addresses or file hashes. However, these indicators are easily changed or masked by attackers, making them less effective at deterring threats. The Pyramid of Pain illustrates how defenses become more effective when they target behaviors (TTPs—Tactics, Techniques, and Procedures) rather than just indicators.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1741288571261/38085722-8e7e-4d0a-a5c8-2a802ddc748b.webp" alt class="image--center mx-auto" /></p>
<ul>
<li><p><strong>Lower Levels</strong>: Indicators of Compromise (IOCs) like IP addresses, file hashes, or domain names are easy for attackers to change and, therefore, cause minimal “pain” for them. For example, attackers can quickly change a file hash or switch to a new IP address, making this level of defense only a minor hurdle for skilled adversaries. While IOCs can help detect attacks, they don’t provide much resistance.</p>
</li>
<li><p><strong>Middle Levels</strong>: <strong>Tactics and Techniques</strong> are harder for attackers to change, but they can still adjust their methods. For example, if a defender blocks one phishing technique, attackers might adapt by using a different method. This is where <strong>MITRE ATT&amp;CK</strong> shines as it provides a detailed catalog of how attackers achieve their objectives, allowing defenders to identify and block common attack strategies that are more difficult to change.</p>
</li>
<li><p><strong>Higher Levels</strong>: <strong>Tactics, Techniques, and Procedures (TTPs)</strong> represent the strategic approaches attackers use. These are the most challenging aspects for attackers to change because they are part of their overall attack methodology. For example, an attacker’s method for lateral movement or credential dumping will rely on a consistent set of behaviors, even if they use different tools. When defenses are focused on detecting and blocking TTPs, they become much more difficult for attackers to bypass, forcing them to rethink their strategy.</p>
</li>
</ul>
<p>By focusing on TTPs, MITRE ATT&amp;CK helps defenders "raise the pain" for attackers—making it more challenging for them to succeed and forcing them to evolve their methods.</p>
<h2 id="heading-tracking-threat-actors-by-groups-and-software"><strong>Tracking Threat Actors by Groups and Software</strong></h2>
<p>MITRE ATT&amp;CK profiles:</p>
<ul>
<li><p><a target="_blank" href="https://attack.mitre.org/groups/"><strong>Groups</strong></a>: Named threat actors (ex. APT29, Lazarus Group, Dragonfly) and their TTPs.</p>
</li>
<li><p><a target="_blank" href="https://attack.mitre.org/software/"><strong>Software</strong></a>: Tools/malware they use (ex. Mimikatz for credential dumping, ID: <strong>S</strong>0002).</p>
</li>
</ul>
<p>In MITRE ATT&amp;CK, <strong>groups</strong> refer to specific threat actor teams or campaigns that engage in cyberattacks. These groups are often associated with certain tactics, techniques, and procedures (TTPs) that MITRE tracks, which help us understand their methods and behaviors. However, threat actors sometimes operate under multiple names or aliases, which can create confusion when reviewing reports or intelligence.</p>
<p>For example, <strong>Dragonfly (ID: G0035)</strong> is a well-known cyber espionage group attributed to Russia, targeting critical infrastructure. Within the Dragonfly umbrella, one of the notable subgroups is <strong>Berserk Bear</strong>, which has been particularly active in attacking energy sectors. Although the name "Berserk Bear" is frequently mentioned in some threat intelligence reports, it is ultimately part of the Dragonfly group, and understanding this connection is key. In MITRE ATT&amp;CK, you'll find the complete list of aliases associated with a group, which helps clarify any potential confusion about its identity.</p>
<p>It’s important to remember that groups like <strong>Dragonfly</strong> and its subgroups may not only use multiple aliases but can also adapt or change their tactics over time. This makes tracking these threat actors a dynamic challenge. For example, Dragonfly uses sub-techniques like <strong>PowerShell Scripting (T1059.001)</strong> and tools like <strong>Mimikatz (S0002)</strong>, which remain part of the group’s ongoing operations despite potential shifts in their campaigns.</p>
<h2 id="heading-how-to-use-mitre-attampck"><strong>How to Use MITRE ATT&amp;CK</strong></h2>
<ul>
<li><p><strong>Threat Intelligence</strong>: Map detected activities to known adversary behaviors.</p>
</li>
<li><p><strong>Detection Engineering</strong>: Build alerts for techniques like lateral movement (ex. suspicious RDP logins).</p>
</li>
<li><p><strong>Red Team Exercises</strong>: Simulate attacks to test defenses.</p>
</li>
<li><p><strong>Incident Response</strong>: Investigate breaches by aligning evidence with TTPs.</p>
</li>
</ul>
<h2 id="heading-getting-started"><strong>Getting Started</strong></h2>
<ol>
<li><p><strong>Explore the Matrix</strong>: Visit <a target="_blank" href="https://attack.mitre.org/matrices/enterprise/">MITRE’s ATT&amp;CK</a> Website.</p>
</li>
<li><p><strong>Use Free Tools</strong>: Try the <a target="_blank" href="https://mitre-attack.github.io/attack-navigator/"><strong>ATT&amp;CK Navigator</strong></a> for visual mapping.</p>
</li>
<li><p><strong>Focus on Relevance</strong>: Prioritize techniques common to your industry (ex. ransomware for healthcare).</p>
</li>
<li><p><strong>Join the Community</strong>: Contribute insights or use case studies from MITRE’s updates.</p>
</li>
</ol>
<h2 id="heading-key-takeaways"><strong>Key Takeaways</strong></h2>
<ul>
<li><p>MITRE ATT&amp;CK is about behavior, not just indicators.</p>
</li>
<li><p>Use it to align defenses with real-world attack patterns.</p>
</li>
<li><p>Start small: focus on high-impact techniques first (ex. phishing).</p>
</li>
<li><p>MITRE ATT&amp;CK is a living framework, updated regularly with community contributions.</p>
</li>
</ul>
<p>By understanding MITRE ATT&amp;CK, you’ll shift from reactive to proactive cybersecurity—catching attackers by their habits, not just their tools.</p>
<p>If you're eager to get hands-on with MITRE ATT&amp;CK, I highly recommend checking out the <a target="_blank" href="https://mitre-attack.github.io/attack-navigator/">ATT&amp;CK Navigator</a> or diving into a <a target="_blank" href="https://ctftime.org/ctf-wtf/">Capture the Flag (CTF) challenge</a> to start mapping real-world attacks to tactics and techniques.</p>
<hr />
]]></content:encoded></item><item><title><![CDATA[Digital Citizenship: Your Shield in the Cybersecurity Battle]]></title><description><![CDATA[The internet has revolutionized how we live, work, and interact with the world. Many of us—especially millennials who remember a less connected world—don't know how we ever managed without it. While the benefits are undeniable, it has also introduced...]]></description><link>https://cyberyara.com/digital-citizenship-your-shield-in-the-cybersecurity-battle</link><guid isPermaLink="true">https://cyberyara.com/digital-citizenship-your-shield-in-the-cybersecurity-battle</guid><category><![CDATA[Digital Citizenship]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[Password security]]></category><category><![CDATA[MFA]]></category><category><![CDATA[#CyberThreats]]></category><category><![CDATA[Two-factor authentication]]></category><category><![CDATA[#onlinesafety]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Mon, 23 Dec 2024 04:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1731175504307/cba06f93-b6db-4083-8afa-0784de5e1b05.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The internet has revolutionized how we live, work, and interact with the world. Many of us—especially millennials who remember a less connected world—don't know how we ever managed without it. While the benefits are undeniable, it has also introduced unprecedented challenges to our online security. According to the <a target="_blank" href="https://www.idtheftcenter.org/publication/2023-data-breach-report/">Identity Theft Resource Center Report</a>, 2,365 cyberattacks occurred in 2023, affecting over 343 million individuals—and the total number of compromises is even higher.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1731182599488/4a99d3c2-e872-490b-b4be-3dbc1ca62fbf.webp" alt class="image--center mx-auto" /></p>
<h2 id="heading-the-digital-world-we-live-in"><strong>The Digital World We Live In</strong></h2>
<p>Given our reliance on technology, it's our responsibility to cultivate responsible and informed online behavior. This is where digital citizenship emerges as a critical component of a strong cybersecurity strategy. While this might not sound new—especially for those who've adapted from analog to digital life—digital citizenship isn't just beneficial for specific age groups; it's essential for everyone and should start from a young age. We all need updates and continuous learning to keep up with the evolving digital landscape.</p>
<h2 id="heading-what-is-digital-citizenship">What Is Digital Citizenship?</h2>
<p>Think of digital citizenship as your "driver's license" for the internet. It's not just about knowing how to use technology—it's about using it responsibly, ethically, and safely. This includes:</p>
<ul>
<li><p>Understanding and navigating the online world with ethics</p>
</li>
<li><p>Respecting others in digital spaces</p>
</li>
<li><p>Discerning reliable information</p>
</li>
<li><p>Maintaining personal data privacy</p>
</li>
<li><p>Questioning source reliability</p>
</li>
<li><p>Avoiding risky behaviors</p>
</li>
</ul>
<h2 id="heading-why-digital-citizenship-matters-for-your-cybersecurity">Why Digital Citizenship Matters for Your Cybersecurity</h2>
<h3 id="heading-the-growing-threat-landscape"><strong>The Growing Threat Landscape</strong></h3>
<p>The digital threat landscape continues to evolve at an alarming pace. According to the ThreatDown <em>report</em> <a target="_blank" href="https://www.threatdown.com/wp-content/uploads/2024/08/ThreatDown-State-of-Malware-2024.pdf"><em>2024 State of Malware</em></a>, ransomware attacks surged by 68% in 2023, with the LockBit gang demanding a staggering $80 million in a single attack on Royal Mail. These escalating threats make it crucial for digital citizens to stay informed and maintain strong security practices.</p>
<h3 id="heading-1-strengthening-information-literacy">1. Strengthening Information Literacy</h3>
<p>Cybersecurity isn't just about technology; it's about making informed choices. According to <a target="_blank" href="https://blog.checkpoint.com/research/check-point-research-reveals-q2-2024-brand-phishing-trends-microsoft-tops-list-while-new-entries-signal-shifting-threat-landscape/">Check Point Research</a>, Microsoft accounted for 57% of all brand phishing attempts in Q2 2024, while Apple held second place with 10%. These statistics highlight how cybercriminals frequently impersonate trusted brands to trick users into giving away sensitive information.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1731178820297/0f360e53-a595-4f66-b3c2-cc1c373775b1.webp" alt class="image--center mx-auto" /></p>
<h3 id="heading-2-safeguarding-personal-privacy">2. Safeguarding Personal Privacy</h3>
<p>As reported by <a target="_blank" href="https://www.ibm.com/reports/data-breach">IBM</a>, 343 million individuals were affected by data breaches in 2023, with the average cost of a single breach rising to $4.88 million in 2024. The impact is staggering—compromised business emails alone accounted for over $2.9 billion in losses last year.</p>
<h3 id="heading-3-understanding-algorithmic-influence">3. Understanding Algorithmic Influence</h3>
<p>Social media algorithms often amplify sensational or misleading content to increase engagement. This can lead users to unreliable or malicious websites that spread misinformation or scams. According to the <a target="_blank" href="https://www.sitelock.com/resources/security-report/">SiteLock Website Security Report 2022</a>, roughly 4.1 million websites were infected with malware. By understanding how algorithms work and being critical of the content they promote, individuals can better protect themselves from harmful or compromised sites.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1731178906367/df1bf83b-d0e3-417e-8fd8-74309dbb7edc.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-becoming-a-better-digital-citizen-an-action-plan">Becoming a Better Digital Citizen: An Action Plan</h2>
<p>To safeguard yourself in the face of these growing threats, here are some simple yet powerful steps to improve your digital citizenship</p>
<h3 id="heading-verify-before-you-share">Verify Before You Share</h3>
<p>Take time to verify facts by consulting credible sources. Share only content from reputable websites and news outlets to avoid spreading misinformation.</p>
<h3 id="heading-protect-your-digital-self-aka-your-personal-information">Protect Your Digital Self (a.k.a. Your Personal Information)</h3>
<ol>
<li><p>Use <strong>secure passwords</strong>: Length over complexity, use <strong>12+ characters</strong> and memorable passphrases (ex.“CoffeeTreeSandwich or MyBellyLovesTacoTuesdays”) for stronger security. See <a target="_blank" href="https://www.youtube.com/watch?v=xUp5S0nBnfc">How to make passwords more secure</a>  </p>
</li>
<li><p>Activate <strong>two-factor authentication</strong> (2FA): Enable 2FA on key accounts, ideally with an app like Google Authenticator. See <a target="_blank" href="https://www.youtube.com/watch?v=hGRii5f_uSc">Why You Should Turn On Two Factor Authentication</a></p>
</li>
<li><p>Be selective about <strong>personal information sharing</strong>: Many people share to connect, but oversharing is a gift to malicious actors like scammers and fraudsters. See <a target="_blank" href="https://www.youtube.com/watch?v=6AXkJ3dot2s">How To Protect Your Online Privacy With A Threat Model</a></p>
</li>
<li><p>Consider using a <a target="_blank" href="https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/what-is-vpn.html"><strong>VPN (Virtual Private Network)</strong></a> for added security: Use a trusted VPN on public Wi-Fi to keep your data private. See <a target="_blank" href="https://www.youtube.com/watch?v=_wQTRMBAvzg">What Is A VPN? Explained</a></p>
</li>
</ol>
<h2 id="heading-the-stakes-are-rising">The Stakes Are Rising</h2>
<p>According to projections, global cybercrime costs <a target="_blank" href="https://www.esentire.com/resources/library/2023-official-cybercrime-report">could hit $10.5 trillion by 2025</a>. Digital citizenship is an accessible tool to combat this trend by promoting safer online habits. Schools, organizations, and communities must prioritize digital citizenship by implementing workshops, online courses, and programs that equip individuals with skills to verify sources, protect privacy, and engage respectfully.</p>
<p>Research shows that many internet users lack these critical skills, making digital literacy in education essential to developing informed citizens who can confidently navigate misinformation and cyber threats. This education must start young—our children are growing up in an increasingly connected world and need these skills from an early age.</p>
<h2 id="heading-your-role-in-the-digital-future">Your Role in the Digital Future</h2>
<p>As we navigate an increasingly complex digital landscape, digital citizenship is essential for fostering responsible technology use, enhancing online safety, and promoting positive interactions within our virtual communities. By embracing digital citizenship principles, we empower ourselves and others to engage ethically and thoughtfully online.</p>
<p>For more detailed insights into cybersecurity risks, common attack vectors, and the financial impact of breaches on individuals and organizations, check out this Forbes <a target="_blank" href="https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-statistics/">cybersecurity stats summary</a>.</p>
<p>What steps will you take today to become a better digital citizen? Whether by advocating for digital literacy in your community or practicing safer online habits, each of us plays a role in creating a secure digital space. Share your thoughts and experiences in the comments below.</p>
<h2 id="heading-additional-resources">Additional Resources</h2>
<ul>
<li><p>National Cybersecurity Alliance: <a target="_blank" href="http://www.staysafeonline.org">www.staysafeonline.org</a></p>
</li>
<li><p>Digital Citizenship Institute: <a target="_blank" href="http://www.digitalcitizenshipinstitute.com">www.digitalcitizenshipinstitute.com</a></p>
</li>
<li><p>FBI's Internet Crime Complaint Center: <a target="_blank" href="http://www.ic3.gov">www.ic3.gov</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[How Secure Web Traffic Happens: Step-by-Step Guide]]></title><description><![CDATA[We've all experienced that sense of relief when we see the lock icon or “your connection is secure”. But have you ever wondered what's happening behind the scenes to make that possible? Secure web traffic is essential for protecting sensitive data tr...]]></description><link>https://cyberyara.com/how-secure-web-traffic-happens-step-by-step-guide</link><guid isPermaLink="true">https://cyberyara.com/how-secure-web-traffic-happens-step-by-step-guide</guid><category><![CDATA[Secure Web Traffic]]></category><category><![CDATA[https]]></category><category><![CDATA[http]]></category><category><![CDATA[Security]]></category><category><![CDATA[Web Security]]></category><category><![CDATA[TLS]]></category><category><![CDATA[Certificate Authority]]></category><category><![CDATA[SSL/TLS]]></category><category><![CDATA[SSL Certificate]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Mon, 04 Nov 2024 18:10:04 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1730742954338/5657b3a4-ac0b-4713-986f-8b9d7e379e13.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We've all experienced that sense of relief when we see the lock icon or “your connection is secure”. But have you ever wondered what's happening behind the scenes to make that possible? Secure web traffic is essential for protecting sensitive data transmitted over the internet. This process is primarily achieved through protocols like HTTPS (HyperText Transfer Protocol Secure), which ensures that the data exchanged between a client's web browser and a web server is encrypted and secure.</p>
<p>Let's take a closer look at how this secure communication works, along with important distinctions between SSL and TLS:</p>
<h4 id="heading-1-client-web-request">1. Client Web Request</h4>
<p>When you enter a URL in your browser (e.g., <a target="_blank" href="https://example.com">https://cyberyara.com</a>), the browser sends an HTTP request to the web server hosting the website. This request is typically made over port 443, the default port for HTTPS. The "S" stands for Secure, indicating that the connection will be encrypted while in transit.</p>
<h4 id="heading-2-server-responds">2. Server Responds</h4>
<p>The web server receives the request and responds by sending its SSL/TLS certificate to the client. This certificate contains the server's public key and initiates the secure communication process.</p>
<h4 id="heading-3-client-validates-certificate-and-crypto">3. Client Validates Certificate and Crypto</h4>
<p>Upon receiving the server's certificate, the client (browser) performs several checks to validate it:</p>
<ul>
<li><p><strong>Checking Certificate Authority (CA):</strong> The browser checks if a trusted CA issued the certificate. Trusted CAs are entities that browsers recognize as legitimate issuers of certificates.</p>
</li>
<li><p><strong>Validity Period:</strong> The browser checks the certificate's validity period to ensure it is not expired.</p>
</li>
<li><p><strong>Revocation Status:</strong> The browser may check if the certificate has been revoked using methods like Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP).</p>
</li>
<li><p><strong>Digital Signature Verification:</strong> The browser extracts the server's public key from the certificate and hashes it. It then compares this hash to the one included in the digital signature of the certificate. If they match, the certificate is verified as authentic.</p>
</li>
</ul>
<h4 id="heading-4-the-client-generates-and-encrypts-the-session-key">4. The Client Generates and Encrypts the Session Key</h4>
<p>Once the certificate is validated, the client generates a symmetric session key. Symmetric encryption uses the same key for both encryption and decryption, which is faster and more efficient for encrypting large amounts of data.</p>
<p>The client encrypts this session key using the server's public key (obtained from the server's certificate) and sends the encrypted session key to the server. This ensures that only the server, which holds the corresponding private key, can decrypt the session key.</p>
<h4 id="heading-5-optional-client-certificate-exchange">5. Optional Client Certificate Exchange</h4>
<p>In some scenarios, the server might request a certificate from the client to authenticate the client. This is more common in environments where both parties need to verify each other’s identity, such as in banking or enterprise settings.</p>
<h4 id="heading-6-server-decrypts-the-session-key">6. Server Decrypts the Session Key</h4>
<p>The server receives the encrypted session key and decrypts it using its private key. Now, both the client and the server share the same symmetric session key, which will be used to encrypt and decrypt all subsequent data exchanged during the session.</p>
<h4 id="heading-7-8-key-exchange-finished">7-8. Key Exchange Finished</h4>
<p>At this point, the key exchange process is complete. Both the client and the server have securely exchanged a session key and can now begin secure communication.</p>
<h4 id="heading-9-encrypted-messages-are-exchanged">9. Encrypted Messages Are Exchanged</h4>
<p>With the session key in place, all data transmitted between the client and the server is encrypted using symmetric encryption. This ensures that even if an attacker intercepts the data, they will not be able to read it without the session key.</p>
<hr />
<h3 id="heading-explanation-of-key-terms">Explanation of Key Terms</h3>
<ul>
<li><p><strong>HTTPS (HyperText Transfer Protocol Secure):</strong> An extension of HTTP that uses SSL/TLS to encrypt data between the client and server.</p>
</li>
<li><p><strong>SSL/TLS (Secure Sockets Layer/Transport Layer Security):</strong> Protocols that provide secure communication over a computer network. It's important to note that SSL is deprecated due to security vulnerabilities, and TLS is the modern, more secure protocol that should be used. Despite this, some people still use the term SSL when referring to TLS.</p>
<ul>
<li><p><strong>SSL (Secure Sockets Layer):</strong> Developed by Netscape in the mid-1990s to secure web traffic. SSL had several versions, with SSL 3.0 being the last before transitioning to TLS.</p>
</li>
<li><p><strong>TLS (Transport Layer Security):</strong> The successor to SSL, designed to provide stronger encryption and better security. TLS has undergone several updates, with TLS 1.2 and TLS 1.3 being the most widely used versions today. TLS 1.3 offers improved performance and security features over its predecessors.</p>
</li>
</ul>
</li>
<li><p><strong>Certificate Authority (CA):</strong> An entity that issues digital certificates to verify the identity of organizations and individuals.</p>
</li>
<li><p><strong>Digital Certificate:</strong> An electronic document that uses a digital signature to bind a public key with an identity.</p>
</li>
<li><p><strong>Public Key:</strong> A key that can be shared with anyone and is used to encrypt data.</p>
</li>
<li><p><strong>Private Key:</strong> A key that is kept secret and is used to decrypt data encrypted with the corresponding public key.</p>
</li>
<li><p><strong>Symmetric Encryption:</strong> A type of encryption where the same key is used for both encryption and decryption.</p>
</li>
<li><p><strong>Digital Signature:</strong> A cryptographic signature that verifies the authenticity and integrity of a message, software, or digital document.</p>
</li>
</ul>
<h3 id="heading-real-world-examples-and-case-studies">Real-World Examples and Case Studies</h3>
<ol>
<li><strong>Heartbleed Vulnerability:</strong> Discovered in 2014, Heartbleed was a serious vulnerability in the OpenSSL cryptographic software library. This bug allowed attackers to steal information protected, under normal conditions, by SSL/TLS encryption. The incident highlighted the importance of keeping cryptographic libraries up to date and ensuring that vulnerabilities are promptly patched.</li>
</ol>
<h3 id="heading-latest-trends-and-advancements">Latest Trends and Advancements</h3>
<ul>
<li><p><strong>HTTP/3 and QUIC Protocol:</strong> HTTP/3, the latest version of the HTTP protocol, is designed to improve performance and security. It is built on the QUIC protocol, which uses UDP instead of TCP. QUIC includes built-in encryption and aims to reduce latency, improve connection reliability, and enhance security.</p>
</li>
<li><p><strong>TLS 1.3 Adoption:</strong> The adoption of TLS 1.3 is increasing due to its improved security and performance. TLS 1.3 removes outdated cryptographic algorithms and introduces features like 0-RTT (zero round-trip time) to speed up the handshake process.</p>
</li>
</ul>
<h3 id="heading-conclusion">Conclusion</h3>
<p>Understanding the process of secure web traffic is crucial for ensuring data privacy and security online. By following the steps outlined above, HTTPS establishes a secure channel between the client and server, protecting data from eavesdroppers and ensuring that sensitive information remains confidential and intact during transmission. Remember, while SSL was once widely used, it is now deprecated in favor of TLS, which provides enhanced security and should be the protocol of choice for secure web communication.</p>
]]></content:encoded></item><item><title><![CDATA[Russian Influence Campaign: A Deep Dive into Cyber Tactics and Accusations]]></title><description><![CDATA[Yesterday, we saw breaking news about a coordinated influence campaign involving a “U.S. Company 1,” which utilized media influencers to spread false information. This was revealed in an unsealed indictment from the U.S. Department of Justice.
Today,...]]></description><link>https://cyberyara.com/russian-influence-campaign-a-deep-dive-into-cyber-tactics-and-accusations</link><guid isPermaLink="true">https://cyberyara.com/russian-influence-campaign-a-deep-dive-into-cyber-tactics-and-accusations</guid><category><![CDATA[Russia]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Influencers]]></category><category><![CDATA[social media]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Thu, 05 Sep 2024 19:13:51 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1725563164732/1deee596-4c81-4780-8ecd-5da8a6bf1ccd.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Yesterday, we saw breaking news about a coordinated influence campaign involving a “U.S. Company 1,” which utilized media influencers to spread false information. This was revealed in an <a target="_blank" href="https://www.justice.gov/opa/media/1366266/dl">unsealed indictment from the U.S. Department of Justice</a>.</p>
<p>Today, the U.S. Department of Justice has released another significant document UNITED STATES OF AMERICA v. CERTAIN DOMAINS: <a target="_blank" href="https://www.justice.gov/opa/media/1366261/dl">a 277-page affidavit supporting a seizure warrant</a>. This affidavit details a Russian-backed cyber-driven influence campaign known as “Doppelganger” primarily aimed to undermine elections and diminish international support for Ukraine. Additionally, describes how Russian entities, under the direction of high-ranking officials, employed cybersecurity tactics and disinformation techniques to manipulate public opinion in the U.S. and other countries.</p>
<p><strong>Cybersecurity Tactics at the Core of Doppelganger Campaign</strong></p>
<p>The Doppelganger campaign employed a wide array of cybersecurity tools to obfuscate its true origin, often masking the involvement of the Russian government. Central to this operation was the use of Virtual Private Servers (VPSs) and Virtual Private Networks (VPNs). These tools allowed operatives to mask their true locations and appear to be operating from within the U.S. By layering multiple VPS services, they were able to further conceal their identities and locations, making it harder for cybersecurity experts and law enforcement to detect the true origins of the operation (p. 38).</p>
<p>Additionally, Doppelganger operatives purchased compromised IP addresses on cybercriminal forums, allowing them to further mask their activities. Spur, a U.S. cybersecurity firm that analyzed the operation, noted that many of these VPSs were paid for using cryptocurrency, complicating efforts to trace the payments. According to the indictment, some payments were made via cryptocurrency to U.S.-based domain registrars, adding additional layers of anonymity to the operation (p. 35-61)."</p>
<p><strong>Fake News Websites and Social Media Manipulation</strong></p>
<p>A core component of the Doppelganger campaign was to impersonate “news websites, staged videos, and fake social media accounts” (p.12). For example, the creation of fake news websites closely mimicked the branding and appearance of legitimate outlets like The Washington Post, Fox News, and Forward (see exhibit 1, p. 88-107). These websites were designed to deceive users into believing they were accessing trusted news sources. This tactic allowed the operatives to spread false news stories and pro-Russian narratives under the guise of legitimate journalism, a hallmark of the campaign.</p>
<p>The Doppelganger campaign also extensively utilized artificial intelligence (AI) to generate fake social media profiles, posing as U.S. citizens or residents of other target countries. According to the indictment, "Among the methods Doppelganger used to drive viewership to the cybersquatted and unique media domains were the deployment of 'influencers' worldwide, paid social media advertisements (in some cases created using artificial intelligence tools), and the creation of fake social media profiles posing as U.S. (or other non-Russian) citizens to post comments on social media platforms with links to the cybersquatted domains, all of which attempted to trick viewers into believing they were being directed to a legitimate news media outlet's website." (p. 2)</p>
<p><a target="_blank" href="https://support.anthropic.com/en/articles/8525154-claude-is-providing-incorrect-or-misleading-responses-what-s-going-on"><strong>Hack</strong></a><a target="_blank" href="https://claude.ai/settings/billing"><strong>in</strong></a><a target="_blank" href="https://support.anthropic.com/en/articles/8525154-claude-is-providing-incorrect-or-misleading-responses-what-s-going-on"><strong>g and Technical</strong></a> <a target="_blank" href="https://claude.ai/settings/billing?action=subscribe"><strong>In</strong></a><a target="_blank" href="https://support.anthropic.com/en/articles/8525154-claude-is-providing-incorrect-or-misleading-responses-what-s-going-on"><strong>frastructure</strong></a></p>
<p><a target="_blank" href="https://support.anthropic.com/en/articles/8525154-claude-is-providing-incorrect-or-misleading-responses-what-s-going-on">In addition to VPS layering and d</a><a target="_blank" href="https://claude.ai/settings/billing">omai</a><a target="_blank" href="https://support.anthropic.com/en/articles/8525154-claude-is-providing-incorrect-or-misleading-responses-what-s-going-on">n spoof</a><a target="_blank" href="https://claude.ai/settings/billing?action=subscribe">in</a><a target="_blank" href="https://support.anthropic.com/en/articles/8525154-claude-is-providing-incorrect-or-misleading-responses-what-s-going-on">g, the indictment reveals that hacking played a</a> key r<a target="_blank" href="https://claude.ai/settings/billing">ole in Doppelgang</a>er’s operations. For example, servers used to host these cybersquatted domains were linked to cybercriminal networks that had been previously involved in hacking activities. The indictment notes that some of these servers had been accessed via known cybercriminal IP addresses and were registered using false identities.</p>
<blockquote>
<p>"The IP addresses used to access the registrars all resolved to either VPS services, or IP addresses that the cybersecurity company Spur previously associated with criminal cyber actors who compromise IP addresses and sell access to them, to allow buyers to gain further anonymity online. Even the VPS services used by the personas were accessed through other VPS services and paid for using cryptocurrency." (p.37)</p>
</blockquote>
<p>Furthermore, Doppelganger operatives employed botnets, networks of automated accounts, to amplify their disinformation on social media. The bots were used to post links to the fake news articles across social media platforms, creating the illusion of grassroots support for the Russian narratives. The indictment describes how these bots were programmed to mimic the behavior of real users, sharing posts and commenting on them in ways that would appear genuine to the average social media user (p.30). Given these tactics, the document presents evidence of countermeasure efforts implemented by various government and private agencies across Germany, France, the US, and Israel, as well as major online platforms and fact-checkers. Since September 2022, these efforts have included publishing articles critiquing the project's impact on public opinion.on exhibit 2A (p. 108-116)</p>
<p><strong>Social Media Manipulation and AI</strong></p>
<p>The Doppelganger campaign made extensive use of artificial intelligence (AI) to generate fake profiles and posts on social media. These profiles, which posed as U.S. citizens or residents of other target countries, were used to share links to cybersquatting domains and to comment on political topics in order to manipulate public discourse. According to the indictment, social media profiles were created using AI-generated images and used to engage in discussions and share disinformation articles” (p. 123).</p>
<blockquote>
<p>"Among the methods Doppelganger used to drive viewership to the cybersquatted and unique media domains were the deployment of “influencers” worldwide, paid social media advertisements (in some cases created using artificial intelligence tools), and the creation of fake social media profiles posing as U.S. (or other non-Russian) citizens to post comments on social media platforms with links to the cybersquatted domains, all of which attempted to trick viewers into believing they were being directed to a legitimate news media outlet’s website." (pg 2)</p>
</blockquote>
<p>In fall 2023, the Russian company, Social Design Agency (SDA), developed "The Good Old U.S.A. Project" to influence U.S. public opinion ahead of the 2024 federal elections. The project aimed to shift sentiment toward prioritizing domestic issues over foreign spending, particularly in Ukraine. The strategy involved targeting social media users with misleading content disguised as news, using social media advertising, influencers, and bots to amplify "bogus stories" and false narratives. The campaign also employed targeted advertising to track and influence American reactions in real time, adjusting strategies based on user responses. Records from Meta, obtained through a warrant, revealed that Doppelganger used AI tools to create negative ads about U.S. politicians and operated Meta pages with names similar to legitimate news organizations. Additionally, U.S. credit cards were used to purchase ads on Facebook. As detailed on page 31 "Meta records also revealed that Doppelganger used credit cards issued by U.S. financial institutions to purchase Facebook advertisements".</p>
<p>Another notable component of the overall campaign was the “Guerrilla Media Campaign in the United States.” This proposal outlined a strategy for exploiting the perceived polarization of U.S. society by focusing on eight distinct “Campaign Topics.” It anticipated utilizing social media platforms such as Facebook, X (formerly known as Twitter), YouTube, and Truth Social. The campaign's plan included creating multiple “perishable” accounts to manage comments and disseminate propaganda through posts, memes, and “video content, including news stories in the Fox News style”(p.32). The goal was to use a mix of realistic information and minimal fake news to create a perception of reality that contradicted official media narratives.</p>
<p>The indictment further notes that the campaign involved creating numerous fake accounts due to enforcement efforts by U.S. social media companies aimed at identifying and deactivating accounts linked to Doppelganger. These fake profiles, combined with paid advertisements funded by cryptocurrency transactions, were designed to blend in with legitimate political ads, obscuring their true purpose. This AI-driven approach was part of a broader strategy to “engage in targeted social engineering based on information trends and users’ emotional attitudes” (p. 150).</p>
<p><strong>The Accusations:</strong></p>
<p>The Doppelganger operatives are facing serious accusations, including:</p>
<p>1. <strong>Money Laundering:</strong> The operatives are accused of using cryptocurrency to fund their activities, including purchasing VPS services and domains from U.S.-based registrars. This financial obfuscation was key to maintaining the anonymity of the operation, bypassing traditional financial systems, which complicates law enforcement efforts to trace the funds.</p>
<p>2. <strong>Conspiracy:</strong> The alleged central actors, including Sergei Kiriyenko, Ilya Gambashidze, and Nikolai Tupikin, are charged with conspiring to influence U.S. elections and reduce international support for Ukraine. The indictment outlines their direct involvement in planning and executing the Doppelganger operation, noting, that these individuals conspired to deploy disinformation aimed at U.S. voters, seeking to exploit political divisions to advance Russian geopolitical interests.</p>
<p>3. <strong>Trafficking in Counterfeit Goods:</strong> By creating fake news websites that closely mimicked legitimate media outlets, the operatives engaged in the illegal use of copyrighted logos and designs. On page 18, it states that their "use of the marks is likely to cause confusion, mistake, or to deceive the public".</p>
<p>4. <strong>Violation of the International Emergency Economic Powers Act (IEEPA):</strong> The operatives are also accused of violating U.S. sanctions imposed on Russian entities. By purchasing domains and services from U.S. companies without obtaining the necessary licenses, they violated economic sanctions. Based on the document, the defendants knowingly engaged in prohibited transactions with U.S. entities, including domain registrars, in violation of IEEPA. (p. 18).</p>
<p>The indictment of the Doppelganger campaign exposes the growing threat of cyber-driven disinformation and the sophistication of state-sponsored cyber operations. By using VPSs, compromised IP addresses, AI-generated social media profiles, and bots, the operatives behind Doppelganger were able to carry out a covert influence campaign aimed at manipulating elections and public discourse. As cybersecurity professionals continue to grapple with the challenges posed by disinformation and hacking, this case serves as a stark reminder of the importance of vigilance in the face of evolving cyber threats.</p>
]]></content:encoded></item><item><title><![CDATA[How to do a simple port scanner with Python]]></title><description><![CDATA[Where there is an internet connection, there is a threat. And in the current world we are living, everything is connected, literally, everything. Thanks to the Internet of Things (IoT), you own many things that are connected to the net just because. ...]]></description><link>https://cyberyara.com/how-to-do-a-simple-port-scanner-with-python</link><guid isPermaLink="true">https://cyberyara.com/how-to-do-a-simple-port-scanner-with-python</guid><category><![CDATA[port-scanner]]></category><category><![CDATA[Python]]></category><category><![CDATA[network security]]></category><category><![CDATA[portscanner]]></category><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Thu, 09 May 2024 20:53:37 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1715287899746/9d2350ae-8b8c-4738-a92e-92f185986586.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Where there is an internet connection, there is a threat. And in the current world we are living, everything is connected, literally, everything. Thanks to the Internet of Things (IoT), you own many things that are connected to the net just because. Therefore, keeping our networks safe from threats is important. One way we do this is by checking for open ports on our networks. That is called port scanning.</p>
<p><strong>Port scanning</strong> involves probing computer systems or networks to uncover open ports and services. Ports act as gateways, each serving a distinct function – for instance, port 80 commonly handles web traffic, while port 22 facilitates secure shell connections. By identifying open ports, cybersecurity professionals can evaluate a system's vulnerability to potential attacks.</p>
<p>Understanding the importance of port scanning is essential. It empowers you to:</p>
<ul>
<li><p>Assess a network's security posture.</p>
</li>
<li><p>Identify potential entry points for attackers.</p>
</li>
<li><p>Implement appropriate security measures.</p>
</li>
<li><p>Detect unauthorized or suspicious activities.</p>
</li>
</ul>
<p>There are many well-known port scanning tools like <a target="_blank" href="https://nmap.org/">Nmap</a>, <a target="_blank" href="https://www.kali.org/tools/masscan/">Masscan</a>, and <a target="_blank" href="https://github.com/zmap/zmap">Zmap</a>. However, this article is aimed at you to create your own!</p>
<p>Now, let's discuss how to create a simple command-line interface (CLI) tool that automates network security tasks using Python. I hope that by breaking down the code into chunks and explaining each step in detail, you'll not only enhance your Python programming skills but also deepen your understanding of network security principles.</p>
<p>When developing any tool, especially one that interacts with networks, it's crucial to consider security implications. Before going into the code, let's discuss specific security measures implemented in the tool and how they mitigate potential risks.</p>
<ul>
<li><p><strong>Error Handling and Input Validation</strong>: One crucial aspect of security is robust error handling and input validation. In this port scanning tool, I incorporated error-handling mechanisms to handle unexpected scenarios. For instance, catching socket-related errors and handling them appropriately to prevent crashes or unexpected behavior. Additionally, validating user input ensures that only valid IP addresses are accepted, mitigating the risk of injection attacks or unintended behavior.</p>
</li>
<li><p><strong>Securing Network Communication</strong>: When interacting with network resources, we must ensure secure communication to protect against eavesdropping and tampering. This tool utilizes the socket module's capabilities to establish secure TCP connections. By leveraging the built-in features of the socket module, I ensure that communication between our tool and the target host is encrypted and authenticated, reducing the risk of unauthorized access or data compromise.</p>
</li>
<li><p><strong>Preventing Common Vulnerabilities</strong>: Furthermore, I took measures to prevent common vulnerabilities such as buffer overflows or denial-of-service attacks. By carefully managing resources and implementing safeguards within our code, we mitigate the risk of exploitation by malicious actors. Additionally, I followed best practices for secure coding, such as using well-established libraries and avoiding unsafe functions or practices that could introduce vulnerabilities.</p>
</li>
<li><p><strong>Continual Vigilance</strong>: While this simple port scanning tool may provide a foundation for network exploration, it's essential to remember that security is an iterative process. As you continue to develop your skills in cybersecurity and software development, always prioritize security considerations in your projects. Stay informed about emerging threats and best practices, and regularly update your code to address any potential vulnerabilities or weaknesses. By maintaining a vigilant stance on security, you can ensure that your projects remain resilient in the face of evolving threats.</p>
</li>
</ul>
<p>This is a constant, ensuring that your code is secure, never ends!</p>
<p>Now let's go into the code of a simple port scanning tool:</p>
<p>First, we begin by importing the necessary modules.</p>
<pre><code class="lang-python"><span class="hljs-keyword">import</span> socket
<span class="hljs-keyword">import</span> signal
<span class="hljs-keyword">import</span> sys
</code></pre>
<p>The <code>socket</code> module provides access to the BSD socket interface, which we'll use for network communication. <code>signal</code> and <code>sys</code> are imported to handle interrupts gracefully, ensuring our tool exits cleanly when the user presses Ctrl + C.</p>
<p><strong>Signal Handling for Interruptions</strong>:</p>
<pre><code class="lang-python"><span class="hljs-function"><span class="hljs-keyword">def</span> <span class="hljs-title">signal_handler</span>(<span class="hljs-params">sig, frame</span>):</span>
    <span class="hljs-string">"""Signal handler for Ctrl + C"""</span>
    print(<span class="hljs-string">"Thank you for using EZ Port Scanning!"</span>)
    sys.exit(<span class="hljs-number">0</span>)
</code></pre>
<p>Next, we define a signal handler function to catch Ctrl + C interrupts, ensuring a clean exit message is printed before terminating the program.</p>
<p><strong>Scanning Ports</strong>:</p>
<pre><code class="lang-python"><span class="hljs-function"><span class="hljs-keyword">def</span> <span class="hljs-title">port_scans</span>(<span class="hljs-params">target</span>):</span>
    <span class="hljs-string">"""Scan ports for a given target IP address and print open ports"""</span>
    <span class="hljs-keyword">for</span> port <span class="hljs-keyword">in</span> range(<span class="hljs-number">1</span>, <span class="hljs-number">1025</span>):
        sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        result = sock.connect_ex((target, port))

        <span class="hljs-keyword">if</span> result == <span class="hljs-number">0</span>:
            print(<span class="hljs-string">f"Port <span class="hljs-subst">{port}</span> is open"</span>)

        sock.close()
</code></pre>
<p>The <code>port_scans</code> function takes a target IP address as input and iterates over ports 1 to 1024. For each port, it attempts to establish a TCP connection. If successful, it prints that the port is open.</p>
<p><strong>Main Function and User Interaction</strong>:</p>
<pre><code class="lang-python"><span class="hljs-function"><span class="hljs-keyword">def</span> <span class="hljs-title">main</span>():</span>
    <span class="hljs-string">"""Main function for the Easy Port Scanner program"""</span>
    print(<span class="hljs-string">"*** Welcome to Easy Port Scanning! ***"</span>)
    print(<span class="hljs-string">"[Use Ctrl + C to quit at any time.]"</span>)

    <span class="hljs-comment"># Set up a signal handler for Ctrl + C</span>
    signal.signal(signal.SIGINT, signal_handler)

    <span class="hljs-keyword">while</span> <span class="hljs-literal">True</span>:
        target = input(<span class="hljs-string">"Enter IP Address to scan (or type 'exit' to quit): "</span>)

        <span class="hljs-keyword">if</span> target.lower() <span class="hljs-keyword">in</span> [<span class="hljs-string">'exit'</span>, <span class="hljs-string">'quit'</span>]:
            print(<span class="hljs-string">"Thank you for using EZ Port Scanning!"</span>)
            <span class="hljs-keyword">break</span>

        print(<span class="hljs-string">"*"</span> * <span class="hljs-number">30</span>)
        print(<span class="hljs-string">f"*** Scanning: <span class="hljs-subst">{target}</span>  ***"</span>)
        print(<span class="hljs-string">"*"</span> * <span class="hljs-number">30</span>)

        <span class="hljs-keyword">try</span>:
            port_scans(target)
        <span class="hljs-keyword">except</span> socket.gaierror:
            print(<span class="hljs-string">"Invalid IP Address. Please enter a valid IP."</span>)
        <span class="hljs-keyword">except</span> KeyboardInterrupt:
            print(<span class="hljs-string">"\nScan interrupted."</span>)
        <span class="hljs-keyword">except</span> Exception <span class="hljs-keyword">as</span> e:
            print(<span class="hljs-string">f"An error occurred: <span class="hljs-subst">{e}</span>"</span>)

        response = input(<span class="hljs-string">"Would you like to scan another IP Address? Type Y / N: "</span>)
        <span class="hljs-keyword">if</span> response.upper() != <span class="hljs-string">'Y'</span>:
            print(<span class="hljs-string">"Thanks for using EZ Port Scanning!"</span>)
            <span class="hljs-keyword">break</span>

<span class="hljs-keyword">if</span> __name__ == <span class="hljs-string">"__main__"</span>:
    main()
</code></pre>
<p>Finally, the main function orchestrates the tool's execution. It greets the user, sets up the signal handler, and enters a loop to continuously prompt for target IP addresses. After scanning a target, it asks if the user wants to scan another IP or exit the program. This ensures a smooth user experience with clear prompts and handling for potential interruptions during scanning.</p>
<p>In conclusion, we've covered the development of a simple yet effective port scanning tool in Python. By prioritizing security, code readability, and error handling, we've developed a tool that can be a valuable asset in various network security and administration tasks.</p>
<p>Remember to validate inputs, handle errors gracefully, and follow best practices for secure coding. As you continue to explore and develop your Python skills, consider expanding upon this project with new features and optimizations. For example, consider the following:</p>
<ol>
<li><p><strong>Implement Multithreading</strong>: Consider adding multithreading capabilities to enhance scanning performance, allowing for concurrent scanning of multiple ports or hosts.</p>
</li>
<li><p><strong>Enhance Reporting</strong>: Improve reporting features to provide detailed logs and analysis of scan results, facilitating comprehensive security assessments.</p>
</li>
<li><p><strong>Add Port Range Specification</strong>: Provide options for users to specify port ranges for scanning, increasing flexibility and efficiency in target selection.</p>
</li>
<li><p><strong>Integrate Port Banner Grabbing</strong>: Extend the tool to include port banner grabbing functionality, gathering information about services running on open ports for deeper vulnerability analysis.</p>
</li>
</ol>
<p>Security is an ongoing process, so stay informed about emerging threats and regularly update your code to address any potential vulnerabilities.</p>
<p>Check this project repository on my <a target="_blank" href="https://github.com/YarelysRR/EZPortScanner">GitHub</a>  </p>
<p>Happy learning and happy scanning!</p>
]]></content:encoded></item><item><title><![CDATA[Safeguard Your Code: 6 Basic Vulnerabilities to Avoid and  Tips to Improve Your Code Security]]></title><description><![CDATA[In the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnera...]]></description><link>https://cyberyara.com/safeguard-your-code-6-basic-vulnerabilities-to-avoid-and-tips-to-improve-your-code-security</link><guid isPermaLink="true">https://cyberyara.com/safeguard-your-code-6-basic-vulnerabilities-to-avoid-and-tips-to-improve-your-code-security</guid><category><![CDATA[code security]]></category><category><![CDATA[Security]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security vulnerabilities ]]></category><category><![CDATA[vulnerabilities]]></category><category><![CDATA[CyberSec]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Fri, 05 Apr 2024 21:36:43 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1711480377023/249b548a-59d7-4337-96f1-a7bec4eb0b7c.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the coding world, even the smallest oversight can pave the way for security vulnerabilities, leaving your application susceptible to exploitation by malicious actors. Cybersecurity incidents are rising and will continue as long as there is vulnerable code. It is impossible to write 100% safe code; after all, all programmers are human, and everyone makes mistakes regardless of their level of expertise. We must recognize this while also improving the code security. We can achieve it by being mindful of common pitfalls and best practices and prioritizing security.</p>
<p>Here are six essential vulnerabilities that I've learned in my ongoing Cybersecurity journey that I hope can help you with your code. Although the following examples are in C code, these vulnerabilities are not attached to a specific language:</p>
<ol>
<li><p><strong>Unsanitized Inputs:</strong> Trusting user inputs blindly is equal to leaving the front door of your application wide open. Therefore, it is crucial to validate and sanitize inputs to prevent injection attacks like SQL injection or cross-site scripting (XSS). Input validation ensures that only expected and safe data enters your system, protecting it from malicious payloads.</p>
<p> <em>Example:</em></p>
<pre><code class="lang-c"> <span class="hljs-keyword">char</span> username[<span class="hljs-number">50</span>];
 <span class="hljs-built_in">printf</span>(<span class="hljs-string">"Enter your username: "</span>);
 fgets(username, <span class="hljs-keyword">sizeof</span>(username), <span class="hljs-built_in">stdin</span>); <span class="hljs-comment">// Use fgets() for safer input reading</span>
</code></pre>
<p> Explanation:</p>
<p> <code>fgets()</code> is used to read user input into the <code>username</code> array. Unlike other input functions like <code>scanf()</code>, <code>fgets()</code> allows specifying the maximum number of characters to read, thereby preventing buffer overflow. This ensures safer input handling and reduces the risk of vulnerabilities. Note: <code>scanf()</code> opens your code to malicious inputs. <strong>Why?</strong> It doesn't check if the user input is within the data bytes allocated for an input. Therefore, whatever the amount of data the user inputs, C will put that data at the memory address, even if there isn't enough space for it. This can cause the program to crash and introduce a known exploit: buffer overflow. This is why <code>fgets()</code> is recommended.</p>
</li>
<li><p><strong>Improper Error Handling:</strong> Neglecting error handling might seem inconsequential until it leads to information leakage or system crashes. Avoid verbose error messages that disclose sensitive information and opt for graceful error-handling mechanisms. Logging errors securely can help you identify and mitigate issues without exposing your system's inner workings.</p>
<p> <em>Example:</em></p>
<pre><code class="lang-c"> FILE *file = fopen(<span class="hljs-string">"example.txt"</span>, <span class="hljs-string">"r"</span>);
 <span class="hljs-keyword">if</span> (file == <span class="hljs-literal">NULL</span>) {
     <span class="hljs-built_in">fprintf</span>(<span class="hljs-built_in">stderr</span>, <span class="hljs-string">"Error: Unable to open file 'example.txt' for reading.\n"</span>);
     <span class="hljs-built_in">exit</span>(EXIT_FAILURE);
 }
</code></pre>
<p> Explanation:</p>
<p> <code>fprintf()</code> is used to print a custom error message to the standard error stream (<code>stderr</code>) if the file opening fails. This custom error message provides more descriptive information about the error and the specific file that couldn't be opened, enhancing clarity for the user or the developer. Finding a balance between providing informative error messages for troubleshooting purposes and safeguarding confidential data from potential misuse by malicious individuals is crucial.</p>
</li>
<li><p><strong>Using Deprecated or Vulnerable Libraries:</strong> Relying on outdated libraries is akin to building your castle on a crumbling foundation. Regularly update dependencies to patch security vulnerabilities and benefit from new features and optimizations. Utilize tools like dependency checkers to stay informed about the latest updates and security advisories.</p>
<p> <em>Example:</em></p>
<pre><code class="lang-c"> <span class="hljs-comment">// Example of using outdated OpenSSL library function</span>
 <span class="hljs-meta">#<span class="hljs-meta-keyword">include</span> <span class="hljs-meta-string">&lt;openssl/sha.h&gt;</span></span>
</code></pre>
<p> Explanation:</p>
<p> In this example, the code includes a header file from the OpenSSL library, which may contain functions that are deprecated or vulnerable to security exploits. This practice can introduce potential security risks into the codebase. Outdated libraries may have known vulnerabilities that could be exploited. To mitigate these risks, it's important to regularly update dependencies and use the latest versions of libraries, ensuring that security patches are applied and known vulnerabilities are addressed.</p>
<p> Using deprecated or vulnerable libraries like OpenSSL can introduce significant security risks into your codebase. It's crucial to stay informed about security advisories and regularly update dependencies to mitigate these risks. OpenSSL has encountered notable vulnerabilities in the past, including:</p>
<ul>
<li><p><strong>Heartbleed (CVE-2014-0160):</strong> A critical vulnerability in OpenSSL's TLS Heartbeat extension, allowing attackers to read sensitive information from server memory, potentially exposing private keys, user credentials, and other confidential data.</p>
</li>
<li><p><strong>POODLE (CVE-2014-3566):</strong> This attack exploited a vulnerability in SSL 3.0, supported by OpenSSL, allowing attackers to decrypt encrypted data by exploiting the padding behavior of SSL 3.0 cipher suites.</p>
</li>
<li><p><strong>DROWN (CVE-2016-0800)</strong>: A vulnerability affecting OpenSSL and other TLS implementations, enabling attackers to decrypt encrypted communications by exploiting servers supporting SSLv2 and modern TLS protocols.</p>
</li>
<li><p><strong>BLEichenbacher's ROBOT Attack (CVE-2017-3737)</strong>: This vulnerability allowed attackers to decrypt encrypted communications by exploiting a flaw in the TLS protocol's RSA decryption process, affecting servers using OpenSSL.</p>
</li>
</ul>
</li>
</ol>
<p>    While OpenSSL has tried to address these vulnerabilities, it's essential to consider alternatives like wolfSSL. WolfSSL offers a lightweight, portable, and secure SSL/TLS library for resource-constrained environments like embedded systems and IoT devices, prioritizing security and performance.</p>
<ol start="4">
<li><p><strong>Insecure Data Storage:</strong> Storing sensitive data like passwords or API keys in plaintext is like storing a treasure in a glass jar. Employ cryptographic techniques like hashing and encryption to secure sensitive information. Additionally, implement proper access controls and utilize secure storage solutions to mitigate the risk of data breaches.</p>
<p> <em>Example:</em></p>
<pre><code class="lang-c"> <span class="hljs-comment">// Storing password in plaintext</span>
 <span class="hljs-keyword">char</span> password[<span class="hljs-number">50</span>] = <span class="hljs-string">"mysupersecretpassword"</span>;

 <span class="hljs-comment">// Storing API Keys in plaintext</span>
 <span class="hljs-keyword">char</span> WeatherAPI[<span class="hljs-number">200</span>] = <span class="hljs-string">"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ5SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c"</span>
</code></pre>
<p> Explanation:</p>
<p> These examples highlight a common security flaw where sensitive information, such as passwords or API keys, is stored in plaintext within the code. It's crucial to exercise caution when handling such sensitive data, especially when considering scenarios like uploading code to public repositories like GitHub. Storing data as plaintext means storing it without any form of protection, leaving it vulnerable to unauthorized access.</p>
<p> Developers should prioritize the adoption of cryptographic techniques such as hashing and encryption to safeguard sensitive information effectively.</p>
<ul>
<li><p><strong>Hashing:</strong> involves converting data into a fixed-size string of characters, known as a hash, using a mathematical algorithm. Unlike encryption, hashing is a one-way process, meaning it cannot be reversed to retrieve the original data. By hashing passwords before storing them, even if the hashed passwords are compromised, the original password cannot be retrieved by attackers.</p>
</li>
<li><p><strong>Encryption</strong>, on the other hand, entails transforming data into a scrambled format using an encryption algorithm and a secret key. Unlike hashing, encryption can be reversed with the decryption key to retrieve the original data. Encrypting sensitive data like passwords or API keys ensures that even if unauthorized users gain access to the data, they cannot decipher it without the decryption key.</p>
</li>
</ul>
</li>
</ol>
<p>    Moreover, it's essential to implement proper access controls to restrict unauthorized access to sensitive data. Access controls delineate who can access what data and what actions they can perform. By enforcing stringent access controls, developers can significantly mitigate the risk of data breaches and unauthorized access attempts.</p>
<p>    It's worth noting that storing passwords in plaintext is highly discouraged in professional environments. The best practice is to hash passwords and compare the hash value for authentication. However, instances of insecure code like storing passwords in plaintext may still be encountered as developers continue to learn and adopt best practices.</p>
<ol start="5">
<li><p><strong>Ignoring Security Best Practices:</strong> Disregarding established security best practices is like navigating a ship without a compass in an unfamiliar sea. Embrace principles like the <em>principle of least privilege</em>, secure by default, and defense in depth. Regularly conduct security audits, penetration testing, and code reviews to fortify your defenses against evolving threats.</p>
<p> <em>Example:</em></p>
<pre><code class="lang-c"> <span class="hljs-comment">// Not validating user permissions before accessing sensitive data</span>
 <span class="hljs-keyword">if</span> (userRole == ADMIN) {
     <span class="hljs-comment">// Allow access to admin panel without proper authorization check</span>
 }
</code></pre>
<p> Explanation:</p>
<p> In this example, the code fails to validate user permissions before granting access to sensitive data or functionalities. Without proper authorization checks, any user with the ADMIN role can gain unauthorized access to the admin panel, potentially compromising the security of the application. To mitigate this risk, ensure your code implements robust authorization checks based on user roles or specific permissions. Consider using role-based access control (RBAC), access control lists (ACLs), or other authorization mechanisms to restrict access to sensitive functionalities only to authorized users. Regularly audit and review access controls to maintain the integrity and security of your application.</p>
</li>
<li><p><strong>Mindful Usage of</strong><code>printf()</code><strong>:</strong></p>
<p> When working with user input in C, it’s crucial to exercise caution, especially when using functions like <code>printf()</code> that support format specifiers such as <code>%s</code>, <code>%d</code>, etc. Mishandling user input using <code>printf()</code> can lead to vulnerabilities known as format string vulnerabilities.</p>
</li>
</ol>
<pre><code class="lang-c"><span class="hljs-meta">#<span class="hljs-meta-keyword">include</span> <span class="hljs-meta-string">&lt;stdio.h&gt;</span></span>

<span class="hljs-function"><span class="hljs-keyword">int</span> <span class="hljs-title">main</span><span class="hljs-params">()</span> </span>{
    <span class="hljs-keyword">char</span> user_input[<span class="hljs-number">50</span>];
    <span class="hljs-comment">// Unsafe usage of printf with format specifiers</span>
    <span class="hljs-built_in">printf</span>(<span class="hljs-string">"Enter your name: "</span>);
    fgets(user_input, <span class="hljs-keyword">sizeof</span>(user_input), <span class="hljs-built_in">stdin</span>);
    <span class="hljs-built_in">printf</span>(<span class="hljs-string">"Hello, %s!\n"</span>, user_input);  <span class="hljs-comment">// Potential format string vulnerability</span>

    <span class="hljs-keyword">return</span> <span class="hljs-number">0</span>;
}
</code></pre>
<p><strong>Explanation:</strong></p>
<p>In the example, if an attacker inputs a string containing format specifiers, they could exploit this vulnerability to compromise the program's security and potentially leak sensitive information or execute arbitrary code.</p>
<p>When using <code>printf()</code> with <code>user_input</code> obtained from <code>fgets()</code> without proper validation, it can result in potential format string vulnerabilities. Format string vulnerabilities occur when an attacker provides input that includes format specifiers (e.g., <code>%s</code>) to <code>printf()</code> or similar functions. If the code fails to properly sanitize or validate the user input, the attacker can manipulate the format string to read or write arbitrary memory, potentially leading to unauthorized access or code execution.</p>
<p><strong>Examples of Potential Vulnerabilities:</strong></p>
<ul>
<li><p><strong>Password Leak:</strong> An attacker could input a format string containing <code>%s</code> to read sensitive information stored in memory, such as passwords or other confidential data. This information could then be leaked to the attacker, compromising the security of the system.</p>
</li>
<li><p><strong>Arbitrary Code Execution:</strong> By crafting a carefully constructed format string, an attacker could overwrite critical memory addresses and inject malicious code into the program's execution flow. This could lead to arbitrary code execution, allowing the attacker to take control of the system, escalate privileges, or perform other malicious actions.</p>
</li>
</ul>
<p><strong>Safe Usage of printf():</strong></p>
<p>To use <code>printf()</code> safely, it’s essential to properly sanitize the input to prevent format string vulnerabilities. In this example, the user input is sanitized by replacing the newline character (<code>\n</code>) added by <code>fgets()</code> with a null terminator (<code>\0</code>), ensuring that the input is properly null-terminated before being used with <code>printf()</code>.</p>
<pre><code class="lang-c"><span class="hljs-meta">#<span class="hljs-meta-keyword">include</span> <span class="hljs-meta-string">&lt;stdio.h&gt;</span></span>

<span class="hljs-function"><span class="hljs-keyword">int</span> <span class="hljs-title">main</span><span class="hljs-params">()</span> </span>{
    <span class="hljs-keyword">char</span> user_input[<span class="hljs-number">50</span>];

    <span class="hljs-comment">// Safe usage of printf with proper input sanitization</span>
    <span class="hljs-built_in">printf</span>(<span class="hljs-string">"Enter your name: "</span>);
    fgets(user_input, <span class="hljs-keyword">sizeof</span>(user_input), <span class="hljs-built_in">stdin</span>);
    <span class="hljs-keyword">for</span> (<span class="hljs-keyword">int</span> i = <span class="hljs-number">0</span>; i &lt; <span class="hljs-keyword">sizeof</span>(user_input); i++) {
        <span class="hljs-keyword">if</span> (user_input[i] == <span class="hljs-string">'\n'</span>) {
            user_input[i] = <span class="hljs-string">'\0'</span>;
            <span class="hljs-keyword">break</span>;
        }
    }
    <span class="hljs-built_in">printf</span>(<span class="hljs-string">"Hello, %s!\n"</span>, user_input);  <span class="hljs-comment">// Safe usage with sanitized input</span>

    <span class="hljs-keyword">return</span> <span class="hljs-number">0</span>;
}
</code></pre>
<p><strong>Consideration for Simple String Output:</strong></p>
<p>Additionally, if you're only printing a string without any format specifiers or user input, it’s safer to use <code>puts()</code> instead of <code>printf()</code>. <code>puts()</code> automatically appends a newline character to the output and doesn’t support format specifiers, reducing the risk of format string vulnerabilities. It’s a straightforward and safer alternative for outputting simple strings.</p>
<pre><code class="lang-c"><span class="hljs-meta">#<span class="hljs-meta-keyword">include</span> <span class="hljs-meta-string">&lt;stdio.h&gt;</span></span>

<span class="hljs-function"><span class="hljs-keyword">int</span> <span class="hljs-title">main</span><span class="hljs-params">()</span> </span>{
    <span class="hljs-comment">// Safer alternative with puts() for simple string output</span>
    <span class="hljs-built_in">puts</span>(<span class="hljs-string">"Good luck in your security journey!"</span>);  <span class="hljs-comment">// No format specifiers used</span>
    <span class="hljs-keyword">return</span> <span class="hljs-number">0</span>;
}
</code></pre>
<p>These are only six vulnerabilities that I thought would be helpful to share. However, there are many more! Keep learning and researching how to improve your code. I will continue my journey and share new things I learn along the way.</p>
<p>Now that you've gained insights into common vulnerabilities and best practices for securing your code, it's time to take action. Here's what you can do next:</p>
<ul>
<li><p><strong>Audit Your Code</strong>: Conduct a thorough review of your existing codebases to identify any potential security vulnerabilities. Look for areas where unsanitized inputs, improper error handling, or insecure data storage practices may be present.</p>
</li>
<li><p><strong>Implement Security Measures</strong>: Take proactive steps to address the vulnerabilities you've identified. Update your code to incorporate input validation, proper error handling, and secure data storage techniques such as hashing and encryption.</p>
</li>
<li><p><strong>Stay Informed</strong>: Stay abreast of the latest developments in cybersecurity and coding best practices. Follow reputable sources, participate in online communities, and continue learning to enhance your knowledge and skills in code security.</p>
</li>
<li><p><strong>Share Your Knowledge</strong>: Spread awareness about the importance of code security within your professional network and community. Share this article or other resources with colleagues and peers to help them improve their coding practices.</p>
</li>
</ul>
<p>Remember, proactive security measures are essential for safeguarding your code and protecting your applications from potential threats. By taking these steps, you contribute to building a more secure and resilient software ecosystem.</p>
<p>Keep learning, stay vigilant, and prioritize security in your coding journey.</p>
]]></content:encoded></item><item><title><![CDATA[Is the Google Cybersecurity Certificate Worth Your 2024  Investment Goals?]]></title><description><![CDATA[In the dynamic landscape of cybersecurity, the Google Cybersecurity Certificate, an eight-course program released on May 2023, emerges as a pathway for individuals aspiring to enter the field. Tailored for entry-level positions, the self-paced curric...]]></description><link>https://cyberyara.com/is-the-google-cybersecurity-certificate-worth-your-2024-investment-goals</link><guid isPermaLink="true">https://cyberyara.com/is-the-google-cybersecurity-certificate-worth-your-2024-investment-goals</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Google]]></category><category><![CDATA[Certification]]></category><category><![CDATA[education]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Mon, 11 Mar 2024 07:00:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1707856454249/2e7541c4-c905-4f02-ab5c-4e385444999d.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the dynamic landscape of cybersecurity, the Google Cybersecurity Certificate, an eight-course program released on May 2023, emerges as a pathway for individuals aspiring to enter the field. Tailored for entry-level positions, the self-paced curriculum provides a great starting point for understanding various cybersecurity aspects, from foundational principles to advanced network security measures.</p>
<p>Google mentions the courses help prepare you for the CompTIA Security+ exam, the industry-leading certification for cybersecurity roles. While opinions on this claim may vary, individual learning styles differ. The decision ultimately rests on your personal preferences</p>
<p><strong>Program Overview:</strong></p>
<ul>
<li><p><strong>Estimated Completion Time:</strong><br />  About 6 months with a commitment of 7 hours per week or quicker with a full-time dedication.</p>
</li>
<li><p><strong>Trial:</strong><br />  It offers a 7-day trial (full access to the courses!)</p>
</li>
<li><p><strong>Where can you take it:</strong><br />  Available on <a target="_blank" href="https://www.coursera.org/professional-certificates/google-cybersecurity">Coursera</a></p>
</li>
<li><p><strong>Cost:</strong><br />  You need to pay the Specialization subscription which is paid monthly. This monthly subscription gives you access to all the Google Cybersecurity Courses (8). Although, <a target="_blank" href="https://grow.google/intl/en_ca/certificates/cybersecurity/#:~:text=How%20much%20is%20the%20Cybersecurity,Certificates%20are%20completely%20self-paced.">Grow with Google</a> still says is $49 per month,</p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1707854653290/d2120fd0-e342-4a4c-852f-6f7ba106d432.png" alt /></p>
<p>  when I joined through Coursera I paid only $15.44(including taxes) for a month!</p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1707853818946/5bfd0916-fac4-4787-9cc5-174d13bb0ba4.png" alt /></p>
</li>
<li><p><strong>Overall learner's sentiment:</strong><br />  As of Feb 2024: 4.8 out of 17,000+ ratings. Speaking the language of Google reviews if this were a restaurant an order from this place would be in your cart already!</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1707853760527/f4d32e53-0078-4fcd-a6c3-f67c1ead2131.png" alt class="image--center mx-auto" /></p>
<ul>
<li><strong>Content relevance:</strong><br />  The content is regularly updated to keep pace with industry developments.</li>
</ul>
<p><strong>Courses Highlights:</strong></p>
<ol>
<li><p><strong>Foundations of Cybersecurity:</strong></p>
<ul>
<li><p>An immersive introduction to the dynamic cybersecurity field.</p>
</li>
<li><p>Covers significant events, job responsibilities, and ethical considerations.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Fundamental understanding of cybersecurity principles.</p>
</li>
<li><p><em>Estimated Time:</em> 21 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Play It Safe: Manage Security Risks:</strong></p>
<ul>
<li><p>Focuses on using frameworks and controls for risk management.</p>
</li>
<li><p>Hands-on experience in incident response through playbooks.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Proficiency in risk management and incident response strategies.</p>
</li>
<li><p><em>Estimated Time:</em> 11 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Connect and Protect: Networks and Network Security:</strong></p>
<ul>
<li><p>A comprehensive exploration of network architecture, operations, and security.</p>
</li>
<li><p>Relevance to the modern cybersecurity landscape, encompassing cloud computing.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Recognition and mitigation of network-level vulnerabilities.</p>
</li>
<li><p><em>Estimated Time:</em> 14 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Tools of the Trade: Linux and SQL:</strong></p>
<ul>
<li><p>Focuses on essential computing skills for cybersecurity analysts.</p>
</li>
<li><p>Hands-on experience with Linux and SQL.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Proficiency in Linux command line, SQL queries, and real-world cybersecurity tasks.</p>
</li>
<li><p><em>Estimated Time:</em> 27 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Assets, Threats, and Vulnerabilities:</strong></p>
<ul>
<li><p>In-depth exploration of asset security, security controls, and vulnerability management.</p>
</li>
<li><p>Integration of real-world scenarios.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Effective data handling, encryption, and vulnerability assessment.</p>
</li>
<li><p><em>Estimated Time:</em> 26 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Sound the Alarm: Detection and Response:</strong></p>
<ul>
<li><p>Practical aspects of incident detection and response. For example, activities like documenting incidents in an incident handler's journal.</p>
</li>
<li><p>Utilization of tools such as IDS (Suricata) and SIEM tools like (Splunk and Google Chronicle).</p>
</li>
<li><p><strong>Acquired Skills:</strong> Incident response lifecycle understanding, network analysis.</p>
</li>
<li><p><em>Estimated Time:</em> 24 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Automate Cybersecurity Tasks with Python:</strong></p>
<ul>
<li><p>Introduction to Python programming in a cybersecurity context.</p>
</li>
<li><p>Emphasis on automation of tasks.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Practical Python skills for cybersecurity automation.</p>
</li>
<li><p><em>Estimated Time:</em> 30 hours.</p>
</li>
</ul>
</li>
<li><p><strong>Put It to Work: Prepare for Cybersecurity Jobs:</strong></p>
<ul>
<li><p>Focus on decision-making, incident escalation, ethical considerations, and job preparation.</p>
</li>
<li><p><strong>Acquired Skills:</strong> Incident escalation decision-making, ethical cybersecurity practices, job search, and interview preparation.</p>
</li>
<li><p><em>Estimated Time:</em> 18 hours.</p>
</li>
</ul>
</li>
</ol>
<p><strong>Target Audience:</strong></p>
<p>The Google Cybersecurity Certificate is well-suited for individuals looking to enter the cybersecurity field, especially those with a keen interest in technology and a desire to contribute to the ever-growing realm of digital security. The program is designed for beginners, making it accessible to those with limited tech backgrounds but willing to learn.</p>
<p><strong>Ideal Candidates:</strong></p>
<ul>
<li><p>Aspiring cybersecurity professionals seeking foundational knowledge and practical skills.</p>
</li>
<li><p>Individuals with a basic understanding of technology, even without prior cybersecurity experience.</p>
</li>
<li><p>People who are looking to transition into the cybersecurity domain.</p>
</li>
</ul>
<p>While the program caters to beginners, having a basic understanding of computer systems and networks can be advantageous, finishing the certificate sooner than estimated means reduced cost. Familiarity with fundamental technology concepts will help learners grasp the course content more efficiently. However, the hands-on nature of the program ensures that even those with minimal tech backgrounds can successfully navigate and complete the courses.</p>
<p>The self-paced nature of the Google Cybersecurity Certificate allows learners to progress at their own speed, accommodating varying levels of expertise. The inclusion of real-world scenarios and practical insights ensures that participants gain applicable skills regardless of their starting point.</p>
<p><strong>Premium Perks:</strong></p>
<p>As soon as you finish all eight courses, you receive the following:</p>
<ul>
<li><p><strong>CareerCircle:</strong> A career support website featuring a resume builder, interview preparation resources, and a job board exclusive to Google Certificate holders (this doesn't mean you will find a job!). Eligibility to work in the U.S. is required for CareerCircle resources.</p>
</li>
<li><p><strong>Big Interview:</strong> A free one-year subscription offering coaching from experts and opportunities to earn and practice interview skills.</p>
</li>
<li><p>A 30% discount code for the CompTIA Security+ exam, along with additional practice materials.</p>
</li>
</ul>
<p><strong>Is it worth your 2024 Goals investment?</strong> For me, it was YES. While it may not guarantee immediate job openings (despite the unfulfilled roles in the industry, many of them are looking for years of experience), I believe the investment is worthwhile. The structured curriculum, insightful discussions, and material curated by industry experts make it a valuable asset. The encouragement and guidance from Google professionals add an invaluable layer, making this certificate an investment in both knowledge and your future career potential.</p>
<p><strong>Recommendations:</strong></p>
<p>While the Google Cybersecurity Certificate offers substantial value, there's room for enhancement, especially for individuals with a basic tech background. The program could benefit from more hands-on exercises, particularly with widely used tools such as Wireshark, Splunk, Google Chronicle, and deeper Python and SQL practices. For example, providing at least optional advanced challenges can better prepare learners for the diverse and sophisticated threats they may encounter in real-world scenarios.</p>
<p><strong>Conclusion:</strong></p>
<p>The Google Cybersecurity Certificate provides a well-rounded curriculum with hands-on experiences and real-world scenarios. Graduates not only gain foundational knowledge but also practical skills, which are highly needed to enter the field. Continuous program updates and potential advanced challenges could further enhance its value.</p>
<p><strong>Share Your Experience!</strong></p>
<p>Have you taken the Google Cybersecurity Certificate? What was your experience? Are you considering it? Share your thoughts below!</p>
]]></content:encoded></item><item><title><![CDATA[Navigating the Job Hunt Maze: 10 Tips for Success]]></title><description><![CDATA[Finding a job in today's competitive job market can be challenging, and the struggle becomes even more real when you have a diverse range of experiences. In a world where traditional career trajectories are often linear and specialized, those with va...]]></description><link>https://cyberyara.com/navigating-the-job-hunt-maze-10-tips-for-success</link><guid isPermaLink="true">https://cyberyara.com/navigating-the-job-hunt-maze-10-tips-for-success</guid><category><![CDATA[Job Hunting]]></category><category><![CDATA[job search]]></category><category><![CDATA[career advice]]></category><category><![CDATA[switching careers]]></category><category><![CDATA[multiple skills]]></category><dc:creator><![CDATA[Yarelys Rivera]]></dc:creator><pubDate>Fri, 03 Nov 2023 01:48:58 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/-2vD8lIhdnw/upload/5c510fc470e39b97c953f356f1e8a152.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Finding a job in today's competitive job market can be challenging, and the struggle becomes even more real when you have a diverse range of experiences. In a world where traditional career trajectories are often linear and specialized, those with varied work experiences may encounter skepticism or uncertainty.</p>
<p>However, diversity in one's professional background can be a unique asset. It brings a breadth of perspectives, adaptable skills, and the ability to connect the dots across seemingly unrelated fields. Embracing this diversity can open doors to innovative solutions, fresh approaches, and a dynamic, well-rounded professional journey.</p>
<p>The key to landing a job or role you are interested in lies in presenting your unique qualifications effectively and putting extra work into your strategy.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1698975584609/6da054b8-ad08-4f4d-b7bd-f31728a56480.gif" alt class="image--center mx-auto" /></p>
<h2 id="heading-1-customize-your-linkedin-banner">1- Customize Your LinkedIn Banner</h2>
<p>LinkedIn is often the first platform recruiters and hiring managers check when evaluating candidates. A customized LinkedIn banner can make your profile stand out. Use a high-quality image that represents your personal brand and professional identity. This simple and small touch can leave a lasting impression and set you apart from others.</p>
<h2 id="heading-2-use-the-open-to-work-label">2- Use the 'Open to Work' Label</h2>
<p>The 'Open to Work' label on LinkedIn is a useful tool when job hunting. If you are thinking or have heard that "it looks desperate" ... FORGET ABOUT IT, this SHOULD be part of your strategy. Recruiters are targeting talent that is open to work. Embrace vulnerability, is part of the journey! Therefore, personalize your job preferences to signal your openness to specific opportunities, ensuring that you come across as a qualified candidate who's actively looking to make a positive career move.</p>
<h2 id="heading-3-highlight-your-hard-skills">3-Highlight Your Hard Skills</h2>
<p>Your resume and LinkedIn profile should prominently feature your hard skills. Use bullet points to list your technical abilities, certifications, and expertise. Employers often use keyword searches to find candidates, so make sure your skills align with the job you're seeking. What are hard skills? These are specific, teachable abilities or knowledge that can be measured and quantified, typically acquired through education or training, and are directly applicable to a job or task. Some hard skills: Computer Software Knowledge, Graphic Design, Project Management, Marketing, Copywriting, Languages</p>
<h2 id="heading-4-ab-test-your-resume">4- A/B Test Your Resume</h2>
<p>Creating a resume can be a daunting task, especially when you have varied experiences. Consider A/B testing your resume by creating two versions: a hybrid resume that showcases your diverse skills and a tailored resume that aligns with a specific job description. Have both versions on job boards and monitor which one yields better results. This data-driven approach can help you refine your resume for future applications.</p>
<h2 id="heading-5-attend-in-person-networking-events">5- Attend In-Person Networking Events</h2>
<p>While online networking is essential, attending in-person events can provide a significant advantage. Face-to-face interactions allow you to connect more in-depth with hiring managers, gain insights into company culture, and leave a memorable impression. Seek for industry-specific conferences, workshops, and job fairs to expand your network and access hidden job opportunities. Where to start? Meetup, Eventbrite, LinkedIn, Facebook events, and more!</p>
<h2 id="heading-6-engage-directly-with-hiring-managers">6- Engage Directly with Hiring Managers</h2>
<p>Don't limit your job search to recruiters alone. Engage directly with hiring managers whenever possible. Send a personalized message on LinkedIn or email, expressing your genuine interest in their organization and the role. Building a direct connection with decision-makers can set you on a faster track to an interview.</p>
<h2 id="heading-7-leverage-your-transferable-skills">7- Leverage Your Transferable Skills</h2>
<p>When you have multiple experiences, it's crucial to showcase how your diverse background equips you with adaptability, problem-solving, communication skills, etc. For example, I have experience as a Program Manager outside of tech. Despite the industry being different, many of the tasks and responsibilities might be very similar. Therefore, I must communicate how I was successful in my role as PM in a way it relates to the tech job I'm applying to. This can look like: "Ensured compliance with X requirements or grants..." or "Fostered relationships with external stakeholders or community partners...".</p>
<h2 id="heading-8-volunteer-and-freelance">8- Volunteer and Freelance</h2>
<p>If you're struggling to find a job, consider volunteering or taking on freelance projects related to the field you are interested in, if you have the time and resources. This can help you acquire relevant skills or it might help to keep your skills sharp. Additionally, it will also help you to build a network and gain valuable experience. Plus, it can lead to job offers or referrals.<br /><strong>Where:</strong> Upwork, Fiver, SimplyHired, and many more.</p>
<h2 id="heading-9-seek-mentorship">9- Seek Mentorship</h2>
<p>Mentorship can provide you with guidance, insights, and valuable connections. Find a mentor who has experience navigating a career path similar to yours. They can help you overcome challenges, set goals, and make informed career decisions. I know this might be more challenging in action, but don't lose hope.</p>
<h2 id="heading-10-send-personalized-messages">10- Send Personalized Messages</h2>
<p>When connecting with professionals on LinkedIn or reaching out via email, don't limit yourself to just sending connection requests. Take the extra step of sending personalized messages with each connection. Express the specific roles you are looking for and your genuine interest in their industry or organization. A well-crafted message can make a significant difference, showing that you're proactive and focused on building meaningful connections, not just collecting contacts. Personalization demonstrates your commitment to finding the right fit and can help you stand out in a crowded job market.  </p>
<h2 id="heading-summary">Summary</h2>
<p>To recap, job hunting is a daunting journey, especially when you are making a career switch or are interested in multiple roles (because you are confident you can be a great fit for each). Even though the road can be scary, there is always a good cliché at the end of it with the right approach and strategies. I meant, that we must be confident about securing a job that is the right match for our goals.</p>
<p><strong>Remember:</strong> Personalize your LinkedIn profile, use the 'Open to Work' label, highlight your hard skills, and experiment with your resume. Attend networking events, connect with hiring managers, and emphasize your transferable skills. Volunteering, mentorship, and a positive attitude can also go a long way in making your job search successful.</p>
<p><strong>Good luck!</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1698975531821/37591ad0-8cd0-44cd-a545-2cc03f610072.gif" alt class="image--center mx-auto" /></p>
]]></content:encoded></item></channel></rss>