Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

The Hacker News - 9 Prosinec, 2023 - 12:52
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive information from kernel memory on current and upcoming CPUs from Intel, AMD, and Arm. The attack is an end-to-end exploit for Spectre based on a new feature in Intel CPUs called Linear Address Masking (LAM) as well as its analogous Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comCyber Threat / Hardware Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Researchers Unveal GuLoader Malware's Latest Anti-Analysis Techniques

The Hacker News - 9 Prosinec, 2023 - 08:16
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging. "While GuLoader's core functionality hasn't changed drastically over the past few years, these constant updates in their obfuscation techniques make analyzing GuLoader a time-consuming and resource-intensive process," Elastic Security Labs Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comMalware / Cyberattack37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands

The Hacker News - 8 Prosinec, 2023 - 18:22
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as MediaTek and Qualcomm impact USB and IoT modems as well as hundreds of smartphone models running Android and iOS. Of the 14 flaws – collectively called 5Ghoul (a combination of "5G" and "Ghoul") – 10 affect 5G modems from the two companies, out of which three Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comVulnerability / Mobile Network37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

N. Korea's Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

The Hacker News - 8 Prosinec, 2023 - 14:33
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of a spear-phishing campaign with the ultimate goal of distributing backdoors on compromised systems. "The threat actor ultimately uses a backdoor to steal information and execute commands," the AhnLab Security Emergency Response Center (ASEC) said in an Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comCyber Espionage / Cryptocurrency37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Ransomware-as-a-Service: The Growing Threat You Can't Ignore

The Hacker News - 8 Prosinec, 2023 - 12:08
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of ransomware, one trend that has gained prominence is Ransomware-as-a-Service (RaaS). This alarming development has transformed the cybercrime landscape, enabling individuals with limited technical expertise to carry out devastating attacks. The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comRansomware / Threat Intelligence37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

The Hacker News - 8 Prosinec, 2023 - 10:52
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy malware. "Attackers can use this type of malware to gain money by building a proxy server network or to perform criminal acts on behalf of the victim: to launch attacks on websites, companies and individuals, buy guns, drugs, and other illicit Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comEndpoint Security / Malware37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

The Hacker News - 8 Prosinec, 2023 - 10:23
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with another bug to execute arbitrary PHP code on vulnerable sites. "A remote code execution vulnerability that is not directly exploitable in core; however, the security team feels that there is a potential for high severity when combined with some plugins, Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comVulnerability / Website Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme

The Hacker News - 8 Prosinec, 2023 - 06:41
The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after he was arrested in Miami earlier this year. Anatoly Legkodymov (aka Anatolii Legkodymov, Gandalf, and Tolik), according to the U.S. Justice Department, admitted to operating an unlicensed money-transmitting business that enabled other criminal actors to launder their The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comCryptocurrency / Cyber Crime37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing Tactics

The Hacker News - 7 Prosinec, 2023 - 15:36
The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while simultaneously improving its detection evasion capabilities. The Microsoft Threat Intelligence team is tracking under the cluster as Star Blizzard (formerly SEABORGIUM). It's also called Blue Callisto, BlueCharlie (or TAG-53),
Kategorie: Hacking & Security

Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing Tactics

The Hacker News - 7 Prosinec, 2023 - 15:36
The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while simultaneously improving its detection evasion capabilities. The Microsoft Threat Intelligence team is tracking under the cluster as Star Blizzard (formerly SEABORGIUM). It's also called Blue Callisto, BlueCharlie (or TAG-53), The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comThreat Intelligence / Cyber Espionage37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

The Hacker News - 7 Prosinec, 2023 - 12:46
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices and inject keystrokes to achieve code execution as the victim. "Multiple Bluetooth stacks have authentication bypass
Kategorie: Hacking & Security

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

The Hacker News - 7 Prosinec, 2023 - 12:46
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices and inject keystrokes to achieve code execution as the victim. "Multiple Bluetooth stacks have authentication bypass The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comMobile Security / Vulnerability37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'

The Hacker News - 7 Prosinec, 2023 - 12:44
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of cybersecurity, humans consistently remain primary targets for attackers. Over the years, these attackers have developed their expertise in exploiting various human qualities, sharpening their skills to manipulate biases and emotional triggers with the objective of
Kategorie: Hacking & Security

Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'

The Hacker News - 7 Prosinec, 2023 - 12:44
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of cybersecurity, humans consistently remain primary targets for attackers. Over the years, these attackers have developed their expertise in exploiting various human qualities, sharpening their skills to manipulate biases and emotional triggers with the objective of The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comSocial Engineering / Cyber Threat37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Building a Robust Threat Intelligence with Wazuh

The Hacker News - 7 Prosinec, 2023 - 11:51
Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It enables organizations to gain a comprehensive insight into historical, present, and anticipated threats, providing context about the constantly evolving threat landscape. Importance of threat intelligence in the cybersecurity ecosystem
Kategorie: Hacking & Security

Building a Robust Threat Intelligence with Wazuh

The Hacker News - 7 Prosinec, 2023 - 11:51
Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It enables organizations to gain a comprehensive insight into historical, present, and anticipated threats, providing context about the constantly evolving threat landscape. Importance of threat intelligence in the cybersecurity ecosystem The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comThreat Intelligence / Network Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Governments May Spy on You by Requesting Push Notifications from Apple and Google

The Hacker News - 7 Prosinec, 2023 - 11:24
Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of interest, according to U.S. Senator Ron Wyden. "Push notifications are alerts sent by phone apps to users' smartphones," Wyden said. "These alerts pass through a digital post office run by the phone operating system provider -- overwhelmingly Apple or Google. Because of
Kategorie: Hacking & Security

Governments May Spy on You by Requesting Push Notifications from Apple and Google

The Hacker News - 7 Prosinec, 2023 - 11:24
Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of interest, according to U.S. Senator Ron Wyden. "Push notifications are alerts sent by phone apps to users' smartphones," Wyden said. "These alerts pass through a digital post office run by the phone operating system provider -- overwhelmingly Apple or Google. Because of The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comPrivacy / Data Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand

The Hacker News - 7 Prosinec, 2023 - 07:15
A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand by threat actors to main covert access to victim networks at lease since 2021. Named after a nocturnal female spirit of Southeast Asian folklore, the malware is "able to conceal its own presence during the initialization phase," Group-IB said in a report The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comMalware / Security Breach37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand

The Hacker News - 7 Prosinec, 2023 - 07:15
A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand by threat actors to main covert access to victim networks at lease since 2021. Named after a nocturnal female spirit of Southeast Asian folklore, the malware is "able to conceal its own presence during the initialization phase," Group-IB said in a report
Kategorie: Hacking & Security
Syndikovat obsah