Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

PixPirate: New Android Banking Trojan Targeting Brazilian Financial Institutions

The Hacker News - 4 Únor, 2023 - 14:39
A new Android banking trojan has set its eyes on Brazilian financial institutions to commit fraud by leveraging the PIX payments platform. Italian cybersecurity company Cleafy, which discovered the malware between the end of 2022 and the beginning of 2023, is tracking it under the name PixPirate. "PixPirate belongs to the newest generation of Android banking trojan, as it can perform ATS (Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comMobile Security / Malware37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers

The Hacker News - 4 Únor, 2023 - 06:30
VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on compromised systems. "These attack campaigns appear to exploit CVE-2021-21974, for which a patch has been available since February 23, 2021," the Computer Emergency Response Team (CERT) of France said in an advisory on Friday. VMware, in its own alert released at the time, described the issue as an Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comEnterprise Security / Ransomware37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Warning: Hackers Actively Exploiting Zero-Day in Fortra's GoAnywhere MFT

The Hacker News - 4 Únor, 2023 - 05:41
A zero-day vulnerability affecting Fortra's GoAnywhere MFT managed file transfer application is being actively exploited in the wild. Details of the flaw were first publicly shared by security reporter Brian Krebs on Mastodon. No public advisory has been published by Fortra. The vulnerability is a case of remote code injection that requires access to the administrative console of the applicationRavie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comZero-Day / Vulnerability37.09024 -95.7128919.5819625045790815 -130.869141 64.598517495420921 -60.556641
Kategorie: Hacking & Security

OpenSSH fixes double-free memory bug that’s pokable over the network

Sophos Naked Security - 3 Únor, 2023 - 18:59
It's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...

Síťová úložiště QNAP jsou děravá, NASy mohou zpřístupnit data na dálku. Oprava už existuje

Zive.cz - bezpečnost - 3 Únor, 2023 - 17:45
Tchajwanský výrobce síťových úložišť QNAP varuje své zákazníky před bezpečnostní chybou, která ovlivňuje jeho zařízení NAS. Kritická zranitelnost může umožnit vzdálené útoky, proto je majitelům důrazně doporučeno nainstalovat nejnovější aktualizace. Firma nedávno odhalila v operačním systému svých ...
Kategorie: Hacking & Security

Is Your EV Charging Station Safe? New Security Vulnerabilities Uncovered

The Hacker News - 3 Únor, 2023 - 16:36
Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely shut down charging stations and even expose them to data and energy theft. The findings, which come from Israel-based SaiFlow, once again demonstrate the potential risks facing the EV charging infrastructure. The issues have been identified in version 1.6J of the Open Charge Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comAutomotive Security / Vulnerability37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware

The Hacker News - 3 Únor, 2023 - 16:03
In a continuing sign that threat actors are adapting well to a post-macro world, it has emerged that the use of Microsoft OneNote documents to deliver malware via phishing attacks is on the rise. Some of the notable malware families that are being distributed using this method include AsyncRAT, RedLine Stealer, Agent Tesla, DOUBLEBACK, Quasar RAT, XWorm, Qakbot, BATLOADER, and FormBook. Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comAttack Vector / Endpoint Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations

The Hacker News - 3 Únor, 2023 - 13:12
The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part of a cyber espionage campaign that leverages a new backdoor to exfiltrate data. "The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers," Trend Micro researchers Mohamed Fahmy, Sherif Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comCyber Espionage / Cyber Threat37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Linux Foundation Launches Open Source Metaverse Group to Drive Interoperability

LinuxSecurity.com - 3 Únor, 2023 - 13:00
The Open Metaverse Foundation (OMF), launched last week by the Linux Foundation , was created to implement the protection and interoperability standards required to drive metaverse adoption at scale, according to Royal O'Brien, a Linux Foundation GM and the executive director of OMF.
Kategorie: Hacking & Security

Protecting Against Linux Malware

LinuxSecurity.com - 3 Únor, 2023 - 13:00
Linux is a popular and powerful operating system, but it is not immune to malware. In fact, malware that targets Linux systems is on the rise. In fact, findings from Atlas VPN based on data from threat intelligence platform AV-ATLAS, claims that in 2022 there were 1.9 million new Linux malware threats, bringing the figure up 50% year-on-year.
Kategorie: Hacking & Security

The Pivot: How MSPs Can Turn a Challenge Into a Once-in-a-Decade Opportunity

The Hacker News - 3 Únor, 2023 - 12:37
Cybersecurity is quickly becoming one of the most significant growth drivers for Managed Service Providers (MSPs). That's the main insight from a recent study from Lumu: in North America, more than 80% of MSPs cite cybersecurity as a primary growth driver of their business. Service providers have a huge opportunity to expand their business and win new customers by developing their cybersecurity The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comDevSecOps / Cybersecurity37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Atlassian's Jira Service Management Found Vulnerable to Critical Vulnerability

The Hacker News - 3 Únor, 2023 - 08:55
Atlassian has released fixes to resolve a critical security flaw in Jira Service Management Server and Data Center that could be abused by an attacker to pass off as another user and gain unauthorized access to susceptible instances. The vulnerability is tracked as CVE-2023-22501 (CVSS score: 9.4) and has been described as a case of broken authentication with low attack complexity. "An Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comCloud Security / Vulnerability37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products

The Hacker News - 3 Únor, 2023 - 08:26
F5 has warned of a high-severity flaw impacting BIG-IP appliances that could lead to denial-of-service (DoS) or arbitrary code execution. The issue is rooted in the iControl Simple Object Access Protocol (SOAP) interface and affects the following versions of BIG-IP - 13.1.5 14.1.4.6 - 14.1.5 15.1.5.1 - 15.1.8 16.1.2.2 - 16.1.3, and 17.0.0 "A format string vulnerability exists in iControl SOAP Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comNetwork Security / Vulnerability37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

CISA Alert: Oracle E-Business Suite and SugarCRM Vulnerabilities Under Attack

The Hacker News - 3 Únor, 2023 - 06:23
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on February 2 added two security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation. The first of the two vulnerabilities is CVE-2022-21587 (CVSS score: 9.8), a critical issue impacting versions 12.2.3 to 12.2.11 of the Oracle Web Applications Desktop Integrator product. "Oracle Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comVulnerability Management37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New Russian-Backed Gamaredon's Spyware Variants Targeting Ukrainian Authorities

The Hacker News - 2 Únor, 2023 - 13:43
The State Cyber Protection Centre (SCPC) of Ukraine has called out the Russian state-sponsored threat actor known as Gamaredon for its targeted cyber attacks on public authorities and critical information infrastructure in the country. The advanced persistent threat, also known as Actinium, Armageddon, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, and UAC-0010, has a track record of Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comCyber Risk / Threat Detection37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Intel's "DOITM" Security Feature Not Intended For Always-On Use, Linux Patches To Be Revised

LinuxSecurity.com - 2 Únor, 2023 - 13:00
Last week I wrote about Linux developers evaluating a new "DOITM" security mitigation for the latest Intel CPUs . While the cost for now of engaging the Data Operand Independent Timing Mode (DOITM) functionality is minimal, following internal Intel engineering discussions it looks like the Linux kernel patches will need to be re-worked with this functionality not intended to always be enabled.
Kategorie: Hacking & Security

Cybersecurity Budgets Are Going Up. So Why Aren't Breaches Going Down?

The Hacker News - 2 Únor, 2023 - 11:04
Over the past few years, cybersecurity has become a major concern for businesses around the globe. With the total cost of cybercrime in 2023 forecasted to reach $8 Trillion – with a T, not a B – it’s no wonder that cybersecurity is top of mind for leaders across all industries and regions. However, despite growing attention and budgets for cybersecurity in recent years, attacks have only become The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comThreat Intelligence37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

North Korean Hackers Exploit Unpatched Zimbra Devices in 'No Pineapple' Campaign

The Hacker News - 2 Únor, 2023 - 10:45
A new intelligence gathering campaign linked to the prolific North Korean state-sponsored Lazarus Group leveraged known security flaws in unpatched Zimbra devices to compromise victim systems. That's according to Finnish cybersecurity company WithSecure (formerly F-Secure), which codenamed the incident No Pineapple in reference to an error message that's used in one of the backdoors. Targets of Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comHealthcare / Cyber Attack37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers

The Hacker News - 2 Únor, 2023 - 07:47
At least 1,200 Redis database servers worldwide have been corralled into a botnet using an "elusive and severe threat" dubbed HeadCrab since early September 2021. "This advanced threat actor utilizes a state-of-the-art, custom-made malware that is undetectable by agentless and traditional anti-virus solutions to compromise a large number of Redis servers," Aqua security researcher Asaf Eitani Ravie Lakshmananhttp://www.blogger.com/profile/10975661172932160797noreply@blogger.comDatabase Security / Cryptocurrency37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security
Syndikovat obsah