Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

REvil’s Back; Coder Fat-Fingered Away Its Decryptor Key?

Threatpost - 13 Září, 2021 - 20:59
How did Kaseya get a universal decryptor after a mind-bogglingly big ransomware attack? A REvil coder misclicked, generated & issued it, and “That’s how we sh*t ourselves.”
Kategorie: Hacking & Security

WhatsApp’s End-to-End Encryption Isn’t Actually Broken

Threatpost - 13 Září, 2021 - 20:41
WhatsApp’s moderators sent messages flagged by intended recipients. Researchers say this isn't concerning -- yet.
Kategorie: Hacking & Security

Honing Cybersecurity Strategy When Everyone’s a Target for Ransomware

Threatpost - 13 Září, 2021 - 20:17
Aamir Lakhani, researcher at FortiGuard Labs, explains why organizations must extend cyber-awareness training across the entire enterprise, from Luddites to the C-suite.
Kategorie: Hacking & Security

WooCommerce Multi Currency Bug Allows Shoppers to Change eCommerce Pricing

Threatpost - 13 Září, 2021 - 20:08
The security vulnerability can be exploited with a malicious CSV file.
Kategorie: Hacking & Security

Critical Bug Reported in NPM Package With Millions of Downloads Weekly

The Hacker News - 13 Září, 2021 - 15:48
A widely used NPM package called 'Pac-Resolver' for the JavaScript programming language has been remediated with a fix for a high-severity remote code execution vulnerability that could be abused to run malicious code inside Node.js applications whenever HTTP requests are sent.  The flaw, tracked as CVE-2021-23406, has a severity rating of 8.1 on the CVSS vulnerability scoring system and affects
Kategorie: Hacking & Security

Time is running out for CentOS 8>

LinuxSecurity.com - 13 Září, 2021 - 14:59
But TuxCare can give you four more years.It came as a shock when RedHat announced that CentOS 8 support would end this year. Organisations who thought they had eight years to plan for its replacement now have less than four months.
Kategorie: Hacking & Security

Další velká díra ve Windows. Zranitelnost dovolí hackerům vzdáleně spustit škodlivý kód

Zive.cz - bezpečnost - 13 Září, 2021 - 14:45
Hackeři sdílejí na svých fórech návody, jak lze v systému Windows zneužít bezpečnostní chybu CVE-2021-40444, odhalenou minulý týden v úterý. Umožňují tak ostatním hackerům začít využívat novou zranitelnost při vlastních útocích. Takzvaná „zero-day“ zranitelnost umožňuje útočníkům vytvářet ...
Kategorie: Hacking & Security

CloudLinux Adds TuxCare Support for CentOS 8 Through 2025>

LinuxSecurity.com - 13 Září, 2021 - 14:24
Extended CloudLinux TuxCare support will give CentOS 8 users time to determine which of the CentOS clones will work best for them.
Kategorie: Hacking & Security

Open-Source Tool of the Month: Uptycs Addresses Modern Cloud-Native & Containerization Security Challenges with its Uptycs Security Analytics Platform>

LinuxSecurity.com - 13 Září, 2021 - 13:00
Cloud and container adoption is on the rise, as organizations are increasingly recognizing the potential for rapid growth and evolution that cloud-based infrastructure offers. That being said, along with these advantages comes significant security challenges.
Kategorie: Hacking & Security

Incident response analyst report 2020

Kaspersky Securelist - 13 Září, 2021 - 13:00

 Download full report (PDF)

The Incident response analyst report provides insights into incident investigation services conducted by Kaspersky in 2020. We deliver a range of services to help organizations when they are in need: incident response, digital forensics and malware analysis. Data in the report comes from our daily practices with organizations seeking assistance with full-blown incident response or complementary expert activities for their internal incident response teams.

In 2020, the pandemic forced companies to restructure their information security practices, accommodating a work-from-home (WFH) approach. Although key trends in terms of threats have stayed the same, our service approach moved to a near-complete – 97% of all cases – remote delivery.

Geography of incident responses by region, 2020

Most of the incident handling requests were received from the CIS (27.8%), European Union (24.7%) and the Middle East (22.7%) regions. In 2020, organizations seeking our assistance represented a wide spectrum of business sectors, industry, finance, government, telecoms, transportation and healthcare.

Share of incident responses by vertical and industry, 2020

Industrial businesses were the most affected by cyberattacks (22%), followed by government institutions (19%). Most of our responses were ransomware-related: in 32.7% of true positive cases, the incidents were caused by encrypted files.

Overall, the Incident response analyst report 2020 contains four chapters:

  • Reasons to go for incident response
    Most of the incidents with causes before the impact can be confidently classified as ransomware. This threat is overtaking money theft and other impacts as a more convenient monetization scheme with much broader industry coverage (not just finance).
  • Initial vectors, or how attackers got in
    Security issues with passwords, software vulnerabilities and social engineering combined into an overwhelming majority of initial access vectors during attacks.
  • Tools and exploits
    Almost half of all incident cases included the use of existing OS tools (like LOLbins), well-known offensive tools from GitHub (e.g. Mimikatz, AdFind, Masscan) and specialized commercial frameworks (Cobalt Strike).
  • Attack duration
    We grouped all incident cases into three categories with different attacker dwell times, incident response duration, initial access, and impact from the attack.

To learn more on these topics, please read the full report (English, PDF).

Jaké triky zkouší kyberzločinci nejčastěji

Novinky.cz - bezpečnost - 13 Září, 2021 - 10:59
Dramatický nárůst kybernetických útoků v letošním roce hlásí bezpečnostní experti. Hackeři se přitom nezaměřují pouze na počítače, ale stále častěji také na mobilní zařízení, u kterých lidé dlouhodobě zabezpečení podceňují.
Kategorie: Hacking & Security

WhatsApp to Finally Let Users Encrypt Their Chat Backups in the Cloud

The Hacker News - 13 Září, 2021 - 08:58
WhatsApp on Friday announced it will roll out support for end-to-end encrypted chat backups on the cloud for Android and iOS users, paving the way for storing information such as chat messages and photos in Apple iCloud or Google Drive in a cryptographically secure manner. The optional feature, which will go live to all of its two billion users in the coming weeks, is expected to only work on
Kategorie: Hacking & Security

Mēris Botnet Hit Russia's Yandex With Massive 22 Million RPS DDoS Attack

The Hacker News - 11 Září, 2021 - 13:18
Russian internet giant Yandex has been the target of a record-breaking distributed denial-of-service (DDoS) attack by a new botnet called Mēris. The botnet is believed to have pummeled the company's web infrastructure with millions of HTTP requests, before hitting a peak of 21.8 million requests per second (RPS), dwarfing a recent botnet-powered attack that came to light last month, bombarding 
Kategorie: Hacking & Security

Experts Link Sidewalk Malware Attacks to Grayfly Chinese Hacker Group

The Hacker News - 11 Září, 2021 - 10:34
A previously undocumented backdoor that was recently found targeting an unnamed computer retail company based in the U.S. has been linked to a longstanding Chinese espionage operation dubbed Grayfly. In late August, Slovakian cybersecurity firm ESET disclosed details of an implant called SideWalk, which is designed to load arbitrary plugins sent from an attacker-controlled server, gather
Kategorie: Hacking & Security

Microsoft Warns of Cross-Account Takeover Bug in Azure Container Instances

The Hacker News - 11 Září, 2021 - 10:33
Microsoft on Wednesday said it remediated a vulnerability in its Azure Container Instances (ACI) services that could have been weaponized by a malicious actor "to access other customers' information" in what the researchers described as the "first cross-account container takeover in the public cloud." An attacker exploiting the weakness could execute malicious commands on other users' containers
Kategorie: Hacking & Security

Jak bezpečně používat platební kartu. Bez frází, zato s praktickými tipy

Zive.cz - bezpečnost - 11 Září, 2021 - 09:15
Platební karta se stala běžnou součástí našeho života, máme ji z peněžence, telefonu, nahranou v Netflixu. Věnujte proto několik minut nastavení její bezpečnosti – je to lepší než pak řešit velké problémy.
Kategorie: Hacking & Security

MyRepublic Data Breach Raises Data-Protection Questions

Threatpost - 10 Září, 2021 - 22:17
The incident raises considerations for security for critical data housed in third-party infrastructure, researchers say.
Kategorie: Hacking & Security

Top Steps for Ransomware Recovery and Preparation

Threatpost - 10 Září, 2021 - 21:37
Alex Restrepo, Virtual Data Center Solutions at Veritas Technologies, discusses post-attack restoration options, and how to prepare for another one in the future.
Kategorie: Hacking & Security

Yandex Pummeled by Potent Meris DDoS Botnet

Threatpost - 10 Září, 2021 - 18:31
Record-breaking distributed denial of service attack targets Russia’s version of Google - Yandex.
Kategorie: Hacking & Security

SOVA, Worryingly Sophisticated Android Trojan, Takes Flight

Threatpost - 10 Září, 2021 - 18:25
The malware appeared in August with an ambitious roadmap (think ransomware, DDoS) that could make it 'the most feature-rich Android malware on the market.'
Kategorie: Hacking & Security
Syndikovat obsah