Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account

The Hacker News - 25 Březen, 2024 - 12:37
In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes known as Nobelium). The concerning detail about this case is how easy it was to breach the software giant. It wasn’t a highly technical hack that exploited a zero-day vulnerability – the hackers used a simple password spray attack to take control of The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New "GoFetch" Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

The Hacker News - 25 Březen, 2024 - 10:02
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data
Kategorie: Hacking & Security

New "GoFetch" Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

The Hacker News - 25 Březen, 2024 - 10:02
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch, the vulnerability relates to a microarchitectural side-channel attack that takes advantage of a feature known as data memory-dependent prefetcher (DMP) to target constant-time cryptographic implementations and capture sensitive data Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

The Hacker News - 25 Březen, 2024 - 08:37
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning global manufacturing, technology, and
Kategorie: Hacking & Security

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

The Hacker News - 25 Březen, 2024 - 08:37
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning global manufacturing, technology, and Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Charting the Course of Cybersecurity Education for Linux Admins

LinuxSecurity.com - 24 Březen, 2024 - 12:00
Linux administrators and infosec professionals face rising cyber threats in today's interconnected digital world. As open-source platforms gain more importance, securing them becomes mission-critical for organizations worldwide.
Kategorie: Hacking & Security

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

The Hacker News - 24 Březen, 2024 - 06:38
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe. According
Kategorie: Hacking & Security

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

The Hacker News - 24 Březen, 2024 - 06:38
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe. According Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

German Police Seize 'Nemesis Market' in Major International Darknet Raid

The Hacker News - 24 Březen, 2024 - 06:24
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said it seized the digital infrastructure associated with the darknet service located in Germany and Lithuania and confiscated €94,000 ($102,107)
Kategorie: Hacking & Security

German Police Seize 'Nemesis Market' in Major International Darknet Raid

The Hacker News - 24 Březen, 2024 - 06:24
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said it seized the digital infrastructure associated with the darknet service located in Germany and Lithuania and confiscated €94,000 ($102,107)Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties

The Hacker News - 23 Březen, 2024 - 07:03
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia's Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or
Kategorie: Hacking & Security

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties

The Hacker News - 23 Březen, 2024 - 07:03
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia's Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

The Hacker News - 22 Březen, 2024 - 15:08
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer. The campaigns impact more than 100 organizations in the E.U. and the U.S., Palo Alto Networks Unit 42 researchers said in a new report published today. "These campaigns come in the form of spam emails with attachments that eventually
Kategorie: Hacking & Security

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

The Hacker News - 22 Březen, 2024 - 15:08
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer. The campaigns impact more than 100 organizations in the E.U. and the U.S., Palo Alto Networks Unit 42 researchers said in a new report published today. "These campaigns come in the form of spam emails with attachments that eventually Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking

The Hacker News - 22 Březen, 2024 - 14:45
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could be potentially exploited by a malicious actor to hijack victims' sessions and achieve remote code execution on underlying instances. The vulnerability, now addressed by AWS, has been codenamed FlowFixation by Tenable.
Kategorie: Hacking & Security

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking

The Hacker News - 22 Březen, 2024 - 14:45
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could be potentially exploited by a malicious actor to hijack victims' sessions and achieve remote code execution on underlying instances. The vulnerability, now addressed by AWS, has been codenamed FlowFixation by Tenable. Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

The Hacker News - 22 Březen, 2024 - 12:28
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux hosts as part of an "aggressive" campaign. Google-owned Mandiant is tracking the activity under its uncategorized moniker UNC5174 (aka Uteus or Uetus), describing it as a "former
Kategorie: Hacking & Security

Implementing Zero Trust Controls for Compliance

The Hacker News - 22 Březen, 2024 - 12:28
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls within their environment and mitigate countless cyber threats, including zero-days, unseen network footholds, and malware attacks as a direct result of user error. With the capabilities of the
Kategorie: Hacking & Security

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

The Hacker News - 22 Březen, 2024 - 12:28
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux hosts as part of an "aggressive" campaign. Google-owned Mandiant is tracking the activity under its uncategorized moniker UNC5174 (aka Uteus or Uetus), describing it as a "former Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Implementing Zero Trust Controls for Compliance

The Hacker News - 22 Březen, 2024 - 12:28
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls within their environment and mitigate countless cyber threats, including zero-days, unseen network footholds, and malware attacks as a direct result of user error. With the capabilities of the The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security
Syndikovat obsah