Site icon QUE.com

CyberHunting.com

Welcome to CyberHunting.com web page, a community of security researchers. Providing information related to cyber threat hunting, penetration testing, bug bounty, security awareness and best practices information security.

CyberHunting.com

Publish your Article here.

Sponsors.

Investment News

New Domain For Sale

Latest News

  • From Simulation to Production: Building AI-Powered Robots with NVIDIA
    Building a robot that can reliably perceive, plan, and act in the real world is hard—especially when conditions change minute to minute. Modern robotics teams are no longer just writing control code. They’re training AI models, validating behaviors at scale, deploying on edge hardware, and continuously improving performance after release. NVIDIA’s robotics stack is designed
  • Greek Companies Boost Cybersecurity Scans Amid Rising Iran War Threats
    As geopolitical tensions intensify and concerns grow about a wider conflict involving Iran, Greek businesses are accelerating cybersecurity efforts—especially proactive vulnerability scanning and threat monitoring. For many organizations in Greece, the risk isn’t theoretical: regional instability often correlates with increased cyber activity, including distributed denial-of-service (DDoS) attacks, phishing campaigns, ransomware attempts, and supply-chain compromises. In
  • US Labels Anthropic an Unacceptable National Security Risk
    In a move that has intensified debates around artificial intelligence regulation, government procurement, and national security, reports that the US has labeled Anthropic an unacceptable national security risk are sending shockwaves through the tech industry. Whether driven by concerns about model capabilities, data handling, foreign influence, or broader geopolitical dynamics, the implications of such a
  • Gecko Robotics Secures $71M Contract to Inspect U.S. Navy Ships
    Gecko Robotics has landed a major win in the defense and maritime maintenance space: a $71 million contract to help inspect U.S. Navy ships. The deal underscores a growing shift toward advanced robotics, sensing, and analytics to modernize how critical assets are assessed, maintained, and kept mission-ready. For the Navy, the stakes are high—ship availability,
  • Mia Robotics Unmanned Ground Vehicles Redefine Civilian Engineering and Safety
    Civilian engineering is entering a new era where autonomy, precision, and human safety are becoming core project requirements—not optional upgrades. From infrastructure inspection and disaster response to hazardous material handling and remote-site logistics, unmanned ground vehicles (UGVs) are increasingly positioned as essential tools. At the center of this shift, Mia Robotics is helping redefine what

Start learning the Penetration Testing Execution Standard (PTEST) and Cyber Kill Chain.

Penetration Testing Execution Standard (PTEST)

  1. Pre-interaction
  2. Intelligence Gathering
  3. Threat Modelling
  4. Vulnerability Assessment
  5. Exploit
  6. Post-exploit
  7. Reporting

Cyber Kill Chain

  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control
  7. Actions on objectives.

Featured Image by Cristiana Gilardi.

You also should know about the Advanced Persistent Threats (APT) LifeCycle

  1. Define Target
  2. Intelligence Gathering. Reconnaissance, Research Infrastructure, Employee, etc.
  3. Test for detection
  4. Deployment
  5. Establish outbound connection. Efficient, Resilient and Stealth
  6. Exfiltrate Data
  7. Remain un-detected.

Examples of APT Characteristics.

  1. Zero-Day Exploit or a custom crafted malware design for specific target.
  2. Social Engineering is still one of the effective and useful tool to get information about the target.
  3. Low and slow fashion to blend in with normal activities.
  4. Keep in mind APT is for Advanced (special malware), Persistent (repetition and multiple delivery) and Threats ( looking for every vulnerabilities )

Learn simply watching Videos I personally created listed below.

Thank you.

Follow me at Twitter: @KINGnet Web: https://KING.net

Exit mobile version