je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.


Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages

The Hacker News - 5 Srpen, 2022 - 12:24
The U.S. Department of Homeland Security (DHS) has warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. If left unpatched, the issues could allow an adversary to issue fraudulent emergency alerts over TV, radio, and cable networks. The August 1 advisory comes courtesy of DHS' Federal Emergency Management Agency (FEMA). CYBIR security researcher KenRavie Lakshmanan
Kategorie: Hacking & Security

Resolving Availability vs. Security, a Constant Conflict in IT

The Hacker News - 5 Srpen, 2022 - 12:20
Conflicting business requirements is a common problem – and you find it in every corner of an organization, including in information technology. Resolving these conflicts is a must, but it isn’t always easy – though sometimes there is a novel solution that helps. In IT management there is a constant struggle between security and operations teams. Yes, both teams ultimately want to have secure The Hacker News
Kategorie: Hacking & Security

A Growing Number of Malware Attacks Leveraging Dark Utilities 'C2-as-a-Service'

The Hacker News - 5 Srpen, 2022 - 12:06
A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal of commandeering compromised systems. "It is marketed as a means to enable remote access, command execution, distributed denial-of-service (DDoS) attacks and cryptocurrency mining operations on infected systems," Cisco Talos said in a report shared Ravie Lakshmanan
Kategorie: Hacking & Security

CISA Adds Zimbra Email Vulnerability to its Exploited Vulnerabilities Catalog

The Hacker News - 5 Srpen, 2022 - 07:54
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a recently disclosed high-severity vulnerability in the Zimbra email suite to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue in question is CVE-2022-27924 (CVSS score: 7.5), a command injection flaw in the platform that could lead to the execution of arbitrary Ravie Lakshmanan
Kategorie: Hacking & Security

GitHub blighted by “researcher” who created thousands of malicious projects

Sophos Naked Security - 4 Srpen, 2022 - 20:06
If you spew projects laced with hidden malware into an open source repository, don't waste your time telling us "no harm done" afterwards.

S3 Ep94: This sort of crypto (graphy), and the other sort of crypto (currency!) [Audio + Text]

Sophos Naked Security - 4 Srpen, 2022 - 19:52
Latest episode - listen now! (Or read if that's what you prefer.)

Who Has Control: The SaaS App Admin Paradox

The Hacker News - 4 Srpen, 2022 - 17:50
Imagine this: a company-wide lockout to the company CRM, like Salesforce, because the organization's external admin attempts to disable MFA for themselves. They don't think to consult with the security team and don't consider the security implications, only the ease which they need for their team to use their login.  This CRM, however, defines MFA as a top-tier security setting; for example, The Hacker News
Kategorie: Hacking & Security

Critical RCE Bug Could Let Hackers Remotely Take Over DrayTek Vigor Routers

The Hacker News - 4 Srpen, 2022 - 15:10
As many as 29 different router models from DrayTek have been identified as affected by a new critical, unauthenticated remote code execution vulnerability that, if successfully exploited, could lead to full compromise of the devices and unauthorized access to the broader network. "The attack can be performed without user interaction if the management interface of the device has been configured Ravie Lakshmanan
Kategorie: Hacking & Security

Nesmějte se obětem podfuku. Dokonce i v IT firmě málem naletěli na falešný e-mail - bezpečnost - 4 Srpen, 2022 - 14:57
Případů, kdy pracovníky firem oklame podvodný e-mail, který obsahuje informace o údajné změně účtu obchodního partnera, přibývá. Jen v Olomouckém kraji začali kriminalisté šetřit tento týden dva. Firmy poslaly na falešné účty dohromady více než 1,4 milionu korun. Poté, co o případech informovaly, ozval se Martin Baier z ostravské IT firmy, který podvod odhalil na poslední chvíli.
Kategorie: Hacking & Security

New Woody RAT Malware Being Used to Target Russian Organizations

The Hacker News - 4 Srpen, 2022 - 14:55
An unknown threat actor has been targeting Russian entities with a newly discovered remote access trojan called Woody RAT for at least a year as part of a spear-phishing campaign. The advanced custom backdoor is said to be delivered via either of two methods: archive files or Microsoft Office documents leveraging the now-patched "Follina" support diagnostic tool vulnerability (CVE-2022-30190) inRavie Lakshmanan
Kategorie: Hacking & Security

Linux 6.0 Adding Run-Time Verification For Running On Safety Critical Systems - 4 Srpen, 2022 - 13:47
Another big ticket feature has made it for the Linux 6.0 kernel: the Runtime Verification infrastructure for running Linux on safety-critical systems.
Kategorie: Hacking & Security

The Linux Foundation Announces Keynote Speakers for Open Source Summit Europe 2022 - 4 Srpen, 2022 - 13:43
Global visionaries headline the premier open source event in Europe to share on OSS adoption in Europe , driving the circular economy, finding inspiration through the pandemic, supply chain security and more.
Kategorie: Hacking & Security

Emmabunt¼s 1.02 Brings Debian Bullseye 11.4 Goodies, Improves UEFI/Secure Boot Support - 4 Srpen, 2022 - 13:00
Emmabunt¼s 1.02 is here almost seven months after Emmabunt¼s 1.01 and it's based on the Debian GNU/Linux 11.4 ''Bullseye'' release that arrived last month with 79 security updates and 81 miscellaneous bug fixes.
Kategorie: Hacking & Security

Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage

The Hacker News - 4 Srpen, 2022 - 12:24
A threat actor is said to have "highly likely" exploited a security flaw in an outdated Atlassian Confluence server to deploy a never-before-seen backdoor against an unnamed organization in the research and technical services sector. The attack, which transpired over a seven-day-period during the end of May, has been attributed to a threat activity cluster tracked by cybersecurity firm DeepwatchRavie Lakshmanan
Kategorie: Hacking & Security

Three Common Mistakes That May Sabotage Your Security Training

The Hacker News - 4 Srpen, 2022 - 09:58
Phishing incidents are on the rise. A report from IBM shows that phishing was the most popular attack vector in 2021, resulting in one in five employees falling victim to phishing hacking techniques. The Need for Security Awareness Training  Although technical solutions protect against phishing threats, no solution is 100% effective. Consequently, companies have no choice but to involve their The Hacker News
Kategorie: Hacking & Security

Cisco Business Routers Found Vulnerable to Critical Remote Hacking Flaws

The Hacker News - 4 Srpen, 2022 - 07:11
Cisco on Wednesday rolled out patches to address eight security vulnerabilities, three of which could be weaponized by an unauthenticated attacker to gain remote code execution (RCE) or cause a denial-of-service (DoS) condition on affected devices. The most critical of the flaws impact Cisco Small Business RV160, RV260, RV340, and RV345 Series routers. Tracked as CVE-2022-20842 (CVSS score: 9.8)Ravie Lakshmanan
Kategorie: Hacking & Security

Post-quantum cryptography – new algorithm “gone in 60 minutes”

Sophos Naked Security - 3 Srpen, 2022 - 20:55
And THIS is why you don't knit your own home-made encryption algorithms and hope no one looks at them.

Single-Core CPU Cracked Post-Quantum Encryption Candidate Algorithm in Just an Hour

The Hacker News - 3 Srpen, 2022 - 18:09
A late-stage candidate encryption algorithm that was meant to withstand decryption by powerful quantum computers in the future has been trivially cracked by using a computer running Intel Xeon CPU in an hour's time. The algorithm in question is SIKE — short for Supersingular Isogeny Key Encapsulation — which made it to the fourth round of the Post-Quantum Cryptography (PQC) standardization Ravie Lakshmanan
Kategorie: Hacking & Security

VMWare Urges Users to Patch Critical Authentication Bypass Bug

Threatpost - 3 Srpen, 2022 - 17:23
Vulnerability—for which a proof-of-concept is forthcoming—is one of a string of flaws the company fixed that could lead to an attack chain.
Kategorie: Hacking & Security

VirusTotal Reveals Most Impersonated Software in Malware Attacks

The Hacker News - 3 Srpen, 2022 - 14:36
Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and increase the likelihood of a successful social engineering attack. Other most impersonated legitimate apps by icon include 7-Zip, TeamViewer, CCleaner, Microsoft Edge, Steam, Zoom, and WhatsApp, an analysis from VirusTotal has revealed. "One of theRavie Lakshmanan
Kategorie: Hacking & Security
Syndikovat obsah