Moving up the Cyber Kill ChainNeed something to read?Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam. With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of the Certified Ethical Hacker 312-50 Exam Guide.- Learn how to look at technology from the standpoint of an attacker- Understand the methods that attackers use to infiltrate networks- Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock testsCheck it out today!#208: Cutting off the ExploitA look at the issuesWelcome to another_secpro!Newsflash for those who missed it: Scattered Spider, the group that has been tied to a series of high-profile intrusions, raising fresh concerns about identity-based attacks and how fast threat actors are adapting, has been linked to a number of arrests in the UK. A number of young people have allegedly been involved with the cyber-gang, leading to arrests of 18, 19, and 21 year olds throughout England. As with the LAPSUS$ gang from yesteryear, it seems like another case of "innovative" young people turning to quick and dirty tactics and techniques to cause maximal damage.To get my fuller reflections on the case as it unfolds, check out this week's premium issue in the link below.Check out _secpro premiumBut, before we get bogged down in that, there's a whole newsletter still to go! Check out this week's articles, news, academic insights, and a few other little treats. If you want more, you know what you need to do - sign up to the premium and get access to everything we have on offer. Click the link above to visit our Substack and sign up there!Cheers!Austin MillerEditor-in-ChiefTime for a surveyWe're hoping to roll out some new features in the next few weeks, but we need your input. Check out the survey below and win afree month of _secpro premium!Check out the survey!This week's articlesExploitation in the Cyber Kill ChainBefore attackers can steal data, lock up systems, or pivot through a network, they need to get their malicious code to a target. That step is delivery. It’s the moment the payload—often malware or a malicious script—is moved from the attacker’s infrastructure into the environment of the target.Read the rest here!How AI Is Changing the Ethical Hacking GameCybersecurity has always been a race between hackers and defenders. With AI in the mix, that race just got a whole lot faster.Today's hackers are using artificial intelligence to speed up their attacks, identify new vulnerabilities, and automate decision-making. That means defenders have to be just as smart—if not smarter. In CEH v13, AI is no longer a side note. It's now a core part of the modern ethical hacker's toolkit.In the new edition of theCertified Ethical Hacker (CEH) v13: Exam 312-50 Guide, we've added entire sections in each chapter on AI-assisted hacking. You'll learn how hackers are training AI models to spot weak configurations, build deepfakes for social engineering, and evade detection tools. You'll also see how defenders can use AI to turn the tables—automating log analysis, simulating attacks, and identifying threats faster than ever before.Here's just a glimpse of what's inside:- How ShellGPT helps automate information gathering and vulnerability detection- Real-world examples of AI being used in phishing, malware development, and evasion- What tools like Microsoft Security Copilot and other AI models are doing to reshape defensive securityThis isn't just some guess about what might happen in the future; it's happening right now. The book helps you understand how to use these tools responsibly and ethically, all while staying within the CEH framework. Plus, it gets you ready for the CEH Exam.Want to read the rest? Sign up for the premiumNews BytesCritical Fortinet software under active attack: Threat actors are exploiting vulnerabilities in Fortinet’s software, targeting administrative interfaces. Researchers strongly urge affected customers to apply patches or disable the interfaces to prevent compromise.Fire Ant group compromising VMware ESXi and vCenter systems: A cyber espionage actor known as Fire Ant has used virtualization and networking flaws to penetrate VMware ESXi and vCenter environments. The campaign shows persistence, adaptability, and repeated re-entry attempts even after remediation.New CastleLoader malware spreading via fake GitHub repos and phishing: CastleLoader is deployed through GitHub-themed phishing and malicious repos. It distributes multiple info-stealers and RATs including RedLine, DeerStealer, and SectopRAT. At least 469 devices were affected in recent campaigns.Mitel MiVoice MX‑ONE authentication bypass vulnerability: A flaw in MiVoice MX‑ONE Provisioning Manager allows unauthenticated attackers to bypass login controls. The vulnerability applies to versions 7.3 through 7.8 SP1. Vendors have issued patches to correct the issue.Active exploitation of SharePoint zero‑day by China‑linked groups: State-affiliated groups—including Storm‑2603, Violet Typhoon, and Linen Typhoon—are exploiting zero-day flaws in on-premises SharePoint servers. Attacks are ongoing globally, including to U.S. government agencies. Emergency patches are in progress.SonicWall SMA 100 appliances suffer remote code execution hole: A high‑severity authenticated file-upload flaw in SonicWall SMA 100 appliances can lead to remote code execution. Administrators are directed to apply patches immediately to eliminate attack surface.This week's academiaBridging the Gap: A Survey and Classification of Research‑Informed Ethical Hacking Tools (Paolo Modesti, Lewis Golightly et al.): This 2024 survey analyses the divide between industry tooling and academic contributions in ethical hacking. It categorizes research‑informed tools into process‑based frameworks (e.g. PTES, MITRE ATT&CK) and knowledge‑based frameworks (e.g. CyBOK), assesses licensing, code availability, peer‑review status, and development activity. Helps bridge academic praxis and professional pentesting.Ethical Hacking and its Role in Cybersecurity (Fatima Asif, Fatima Sohail et al.): This 2024 review explores how ethical hacking techniques evolve within modern cybersecurity. It covers vulnerability detection, penetration testing, and legal/ethical considerations, emphasizing the role ethical hacking plays in strengthening organizational defenses and integration with policy frameworks.A Survey on Ethical Hacking: Issues and Challenges (Jean‑Paul A. Yaacoub, Hassan N. Noura et al.): Published in 2021, this paper details both technical and non‑technical stages of penetration testing. It addresses strengths—effective at identifying known vulnerabilities—and limitations, especially regarding unknown threats and the need for anomaly detection and honeypots. It outlines current challenges, including evolution of threats and need for coordinated defense frameworks.Ethical Intrusion: The Strategic Role of Ethical Hacking in the Modern Cybersecurity Framework (J. P. Pramod, Kuppala Nikhita et al.): A mid‑2025 study addressing ethical hacking as a strategic, proactive defence mechanism. This mixed‑methods work reviews penetration testing, network auditing, and social engineering across industries (healthcare, finance, retail). Identifies how ethical hacking enhances compliance, threat awareness, and shifts organisations from reactive to proactive cybersecurity postures.Upcoming events for _secpros this yearHere are the five conferences we're looking forward to the most this year (in no particular order...) and how you can get involved to boost your posture!DSEI (9th-12th September): DSEI stands out as a global platform that bridges defence, security, and cybersecurity. With its broad focus on cutting-edge technologies, this event is critical for those involved in national defence, law enforcement, and private security. Cybersecurity is a prominent theme, with sessions addressing both offensive and defensive cyber strategies.Defcon (7th-10th August): Defcon is a legendary event in the hacker and cybersecurity communities. Known for its hands-on approach, Defcon offers interactive workshops, capture-the-flag contests, and discussions on emerging threats. The conference is ideal for those looking to immerse themselves in technical aspects of cybersecurity.Black Hat (2nd-7th August): Black Hat USA is synonymous with advanced security training and research. This premier event features technical briefings, hands-on workshops, and sessions led by global security experts. Attendees can explore the latest trends in penetration testing, malware analysis, and defensive techniques, making it a must-attend for cybersecurity professionals.Check out the survey!*{box-sizing:border-box}body{margin:0;padding:0}a[x-apple-data-detectors]{color:inherit!important;text-decoration:inherit!important}#MessageViewBody a{color:inherit;text-decoration:none}p{line-height:inherit}.desktop_hide,.desktop_hide table{mso-hide:all;display:none;max-height:0;overflow:hidden}.image_block img+div{display:none}sub,sup{font-size:75%;line-height:0} @media (max-width: 100%;display:block}.mobile_hide{min-height:0;max-height:0;max-width: 100%;overflow:hidden;font-size:0}.desktop_hide,.desktop_hide table{display:table!important;max-height:none!important}}
Read more