Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Top Reasons to Use Linux Over Windows

LinuxSecurity.com - 10 Únor, 2024 - 14:45
As an increasing number of users and businesses worldwide make the switch to Linux, there are clearly some compelling arguments for using Linux instead of the Windows operating system. Reasons to consider making the switch to Linux include stability and security, customization and flexibility, open-source nature, cost-effectiveness, and community support.
Kategorie: Hacking & Security

Alert: New Stealthy "RustDoor" Backdoor Targeting Apple macOS Devices

The Hacker News - 10 Únor, 2024 - 08:12
Apple macOS users are the target of a new Rust-based backdoor that has been operating under the radar since November 2023. The backdoor, codenamed RustDoor by Bitdefender, has been found to impersonate an update for Microsoft Visual Studio and target both Intel and Arm architectures. The exact initial access pathway used to propagate the implant is currently not known, although
Kategorie: Hacking & Security

Alert: New Stealthy "RustDoor" Backdoor Targeting Apple macOS Devices

The Hacker News - 10 Únor, 2024 - 08:12
Apple macOS users are the target of a new Rust-based backdoor that has been operating under the radar since November 2023. The backdoor, codenamed RustDoor by Bitdefender, has been found to impersonate an update for Microsoft Visual Studio and target both Intel and Arm architectures. The exact initial access pathway used to propagate the implant is currently not known, although Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Closing the Security Gap: Navigating Modern Technology and Outdated Systems in Linux Security

LinuxSecurity.com - 9 Únor, 2024 - 18:52
Most businesses understand the need for cybersecurity. However, many of those same companies still rely on outdated systems, making it hard to ensure the security they know they need.
Kategorie: Hacking & Security

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

The Hacker News - 9 Únor, 2024 - 17:32
The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that "Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period of time," Check Point said in a report this
Kategorie: Hacking & Security

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

The Hacker News - 9 Únor, 2024 - 17:32
The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that "Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period of time," Check Point said in a report this Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

MoqHao Android Malware Evolves with Auto-Execution Capability

The Hacker News - 9 Únor, 2024 - 14:34
Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices without requiring any user interaction. "Typical MoqHao requires users to install and launch the app to get their desired purpose, but this new variant requires no execution," McAfee Labs said in a report published this week. "While the app is
Kategorie: Hacking & Security

MoqHao Android Malware Evolves with Auto-Execution Capability

The Hacker News - 9 Únor, 2024 - 14:34
Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices without requiring any user interaction. "Typical MoqHao requires users to install and launch the app to get their desired purpose, but this new variant requires no execution," McAfee Labs said in a report published this week. "While the app is Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA

The Hacker News - 9 Únor, 2024 - 11:58
Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet industry requirements, organizations must maintain a fast-paced development process while staying up-to-date with the latest security patches. However, in practice, developers often face a large amount of security work
Kategorie: Hacking & Security

Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA

The Hacker News - 9 Únor, 2024 - 11:58
Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet industry requirements, organizations must maintain a fast-paced development process while staying up-to-date with the latest security patches. However, in practice, developers often face a large amount of security work The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

The Hacker News - 9 Únor, 2024 - 11:28
Sixty-one banking institutions, all of them originating from Brazil, are the target of a new banking trojan called Coyote. "This malware utilizes the Squirrel installer for distribution, leveraging Node.js and a relatively new multi-platform programming language called Nim as a loader to complete its infection," Russian cybersecurity firm Kaspersky said in a Thursday report. What
Kategorie: Hacking & Security

New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

The Hacker News - 9 Únor, 2024 - 11:28
Sixty-one banking institutions, all of them originating from Brazil, are the target of a new banking trojan called Coyote. "This malware utilizes the Squirrel installer for distribution, leveraging Node.js and a relatively new multi-platform programming language called Nim as a loader to complete its infection," Russian cybersecurity firm Kaspersky said in a Thursday report. What Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

The Hacker News - 9 Únor, 2024 - 08:45
Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is likely being exploited in the wild. The vulnerability, CVE-2024-21762 (CVSS score: 9.6), allows for the execution of arbitrary code and commands. "An out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially
Kategorie: Hacking & Security

Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

The Hacker News - 9 Únor, 2024 - 08:45
Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is likely being exploited in the wild. The vulnerability, CVE-2024-21762 (CVSS score: 9.6), allows for the execution of arbitrary code and commands. "An out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

The Hacker News - 9 Únor, 2024 - 08:40
Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management. The cloud offers scalability, adaptability, and accessibility, enabling businesses to achieve sustainable growth. However, adopting cloud technologies into your infrastructure presents various cybersecurity risks and
Kategorie: Hacking & Security

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

The Hacker News - 9 Únor, 2024 - 08:40
Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management. The cloud offers scalability, adaptability, and accessibility, enabling businesses to achieve sustainable growth. However, adopting cloud technologies into your infrastructure presents various cybersecurity risks and The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

The Hacker News - 9 Únor, 2024 - 04:35
Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication. The issue, tracked as CVE-2024-22024, is rated 8.3 out of 10 on the CVSS scoring system. "An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti
Kategorie: Hacking & Security

Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

The Hacker News - 9 Únor, 2024 - 04:35
Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication. The issue, tracked as CVE-2024-22024, is rated 8.3 out of 10 on the CVSS scoring system. "An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organization

The Hacker News - 9 Únor, 2024 - 04:30
An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber espionage campaign designed to drop a previously undocumented backdoor called Zardoor. Cisco Talos, which discovered the activity in May 2023, said the campaign has likely persisted since at least March 2021, adding it has identified only one compromised target to date, although it's
Kategorie: Hacking & Security

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organization

The Hacker News - 9 Únor, 2024 - 04:30
An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber espionage campaign designed to drop a previously undocumented backdoor called Zardoor. Cisco Talos, which discovered the activity in May 2023, said the campaign has likely persisted since at least March 2021, adding it has identified only one compromised target to date, although it's Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security
Syndikovat obsah