Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

FBI, Europol, and NCA Take Down 8Base Ransomware Data Leak and Negotiation Sites

The Hacker News - 11 Únor, 2025 - 08:03
Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Over 12,000 KerioControl firewalls exposed to exploited RCE flaw

Bleeping Computer - 11 Únor, 2025 - 00:58
Over twelve thousand GFI KerioControl firewall instances are exposed to a critical remote code execution vulnerability tracked as CVE-2024-52875. [...]
Kategorie: Hacking & Security

Sky ECC encrypted service distributors arrested in Spain, Netherlands

Bleeping Computer - 10 Únor, 2025 - 21:01
Four distributors of the encrypted communications service Sky ECC, used extensively by criminals, were arrested in Spain and the Netherlands. [...]
Kategorie: Hacking & Security

Google’s latest genAI shift is a reminder to IT leaders — never trust vendor policy

Computerworld.com [Hacking News] - 10 Únor, 2025 - 20:18

Every enterprise CIO knows they cannot — and should not — ever trust a vendor’s policy position. Whether that’s because a vendor might not strictly adhere to its policies or can change policies anytime  without notice, it doesn’t matter.

Google’s move last week to back away from assurances  it would not help make weapons or engage in surveillance was utterly unsurprising. Companies are motivated by revenue, profits and market share and if corporate leaders can improve any of those financial metrics by helping to make weapons of mass destruction — or helping a government poison its people — that’s what can happen.

But enterprise CIOs are the customers— customers with big budgets that give them major clout. If companies want your dollars, they must agree to whatever you have in your RFP and your contract.

Why would these massive vendors agree? Because they fear that one of their competitors will do so if they don’t. That could cost them market share and revenue. 

Suddenly, you have their C-suite’s rapt attention.

As for Google in this case, what was the original language the company felt it needed to avoid? Last year’s statement gave a list of “AI applications we will not pursue.” 

This is part of that list: “Technologies that cause or are likely to cause overall harm. Where there is a material risk of harm, we will proceed only where we believe that the benefits substantially outweigh the risks, and will incorporate appropriate safety constraints. Weapons or other technologies whose principal purpose or implementation is to cause or directly facilitate injury to people. Technologies that gather or use information for surveillance violating internationally accepted norms. Technologies whose purpose contravenes widely accepted principles of international law and human rights.”

Then, in an eerily predictive point, it added: “As our experience in this space deepens, this list may evolve.” 

It did evolve. It got a lot shorter.

If a lot of money can be made doing those things, Google now says, in effect, “Human suffering and death and maiming can be trumped by higher profits and marketshare. Ethics, morality and humanity don’t keep the lights on, buddy!”

You’ll also notice that the company has bagged its “Don’t be evil” tagline; Google apparently ditched it 10 years ago. Maybe they could update it now to something like this: “Google. Where we never let avoiding evil stand in the way of making a profit.”

I was recently discussing this issue with two executives at Phoenix Technologies, a Swiss cloud provider. They made the argument that enterprise CIOs shouldn’t rely on vendor promises, especially for large language model (LLM) making, including how they’re trained and used.

“If you are reliant on the model makers and their terms and conditions state that they can service anybody, you have to be willing to deal with the fallout,” said Peter DeMeo, the Phoenix group chief product officer. “You really can’t trust the model makers,” especially when they need revenue from government contracts.

His colleague, Phoenix group CTO Nunez Mencias, applauded Google for removing the restriction, given that it was unlikely it could ever be relied on. “The model makers “can always change their policies, their rules.”

But there’s a big difference between being unable to rely on a vendor’s self-stated rules and being powerless to discourage AI use in areas your company might not be comfortable with.

Just remember: Entities out there doing things you don’t like are always going to be able to get generative AI (genAI) services and tools from somebody. You think large terrorist cells can’t use their money to pay somebody to craft LLMs for them? 

Even the most powerful enterprises can’t stop it from happening. But, that may not be the point. Walmart, ExxonMobil, Amazon, Chase, Hilton, Pfizer and Toyota and the rest of those heavy-hitters merely want to pick and choose where their monies are spent. 

Big enterprises can’t stop AI from being used to do things they don’t like, but they can make sure none of it is being funded with their money. 

If they add a clause to every RFP that they will only work with model-makers that agree to not do X, Y, or Z, that will get a lot of attention. The contract would have to be realistic, though. It might say, for instance, “If the model-maker later chooses to accept payments for the above-described prohibited acts, they must reimburse all of the dollars we have already paid and must also give us 18 months notice so that we can replace the vendor with a company that will respect the terms of our contracts.”

From the perspective of Google, along with Microsoft, OpenAI, IBM, AWS and others, the idea is to take enterprise dollars on top of government contracts. If they were to believe that’s suddenly an either/or scenario, they might suddenly reconsider. 

Given that Google has decided that revenue is more important than morality, the answer is not to appeal to their morality. If money is all they care about, speak that language. 

Fortunately for enterprises, there are plenty of large companies willing to handle your genAI needs. Perhaps now is the time to use your buying power to influence who else they work with and limit what they do.

Kategorie: Hacking & Security

Apple fixes zero-day exploited in 'extremely sophisticated' attacks

Bleeping Computer - 10 Únor, 2025 - 20:08
Apple has released emergency security updates to patch a zero-day vulnerability that the company says was exploited in targeted and "extremely sophisticated" attacks. [...]
Kategorie: Hacking & Security

Hacker pleads guilty to SIM swap attack on US SEC X account

Bleeping Computer - 10 Únor, 2025 - 19:46
Today, an Alabama man pleaded guilty to hijacking the U.S. Securities and Exchange Commission (SEC) account on X in a January 2024 SIM swapping attack. [...]
Kategorie: Hacking & Security

Musk furious as judge shuts down DOGE access to Treasury payment system

Computerworld.com [Hacking News] - 10 Únor, 2025 - 19:19

The US Treasury Department’s payment servers hold the tax returns, social security data and bank account numbers of every adult citizen of the United States.

They are, one would assume, among the most highly secured servers on earth and yet it seems that all the employees of Elon Musk’s Department of Government Efficiency (DOGE) needed to do to access these systems after January 20 was to walk into Treasury Department offices and demand access to the servers’ credentials.

We learn of these extraordinary if still hazy and unconfirmed events by reading between the lines of a weekend ruling by US District Judge Paul Engelmayer in response to a suit brought by 19 states against the actions of the DOGE team.

In the ruling, Engelmayer blocked access by DOGE staff to the Treasury’s payment servers for the time being and ordered that any data downloaded to date by team members should immediately be deleted.

Allowing DOGE access in its current form violated the Administrative Procedure Act (APA), a statutory requirement, as well as the doctrine of the separation of powers and the Take Care Clause of the US Constitution, he ruled.

Further access for unauthorized DOGE staff risked “irreparable damage,” a technical term for serious consequences which can’t be easily remedied through subsequent legal action.

“That is both because of the risk that the new policy presents of the disclosure of sensitive and confidential information and the heightened risk that the systems in question will be more vulnerable than before to hacking,” the ruling continued.

In short, allowing unauthorized personnel to access these servers without monitoring risked data disclosure, also known as a data breach.

“Utterly insane”

The ruling traces the outline of an unexpected fault line that has appeared since President Trump’s inauguration: how far should Presidential appointees be allowed to go when executing executive orders if that risks breaking existing laws and rules around security?

Engelmayer’s answer, for now at least, is not far at all: only staff within the Treasury with the correct security clearance should be granted access to servers containing sensitive citizen and personal data.

Not surprisingly, as it continues its campaign to refashion and downsize the federal workforce, the White House was derisive of the ruling and the legal suit that precipitated it.

“Grandstanding government efficiency speaks volumes about those who’d rather delay much-needed change with legal shenanigans than work with the Trump Administration of ridding the government of waste, fraud, and abuse,” White House spokesperson Harrison Fields said in a statement released to media outlets.

Musk, meanwhile, took to his personal mouthpiece, X, to condemn at length the financial waste he claimed the DOGE access had uncovered within the system.

 “Yesterday, I was told that there are currently over $100B/year of entitlement payments to individuals with no SSN or even a temporary ID number. If accurate, this is extremely suspicious,” he tweeted. “This is utterly insane and must be addressed immediately.”

The counter-argument to this is that it’s not the intention behind the access that’s at issue so much as the principle that security clearance should still apply to people tasked with investigating alleged waste.

Fact vacuum

As is often the case, the ruling doesn’t reveal the full context of what occurred. According to Michel Chamberland, founder of IT services and consulting company IntegSec, this made it hard to judge how far security was bent for the sake of convenience.

“We do not have exact details of what systems were accessed, what specific data they have access to and what level of access they were provided. I think when we hear people’s social security numbers may have been compromised by the DOGE team, it is complete speculation,” he told Computerworld.

One remedy would be for DOGE to explain the nature of their access more clearly:

“I think the first thing they could do is provide more transparency as to what exactly they access, how they do it and the level of access provided,” said Chamberland.

“We also need to hear about the classification of these systems. Not all systems within a government agency will be highly classified. It is possible DOGE was able to do most or all their work without accessing systems that do require a security clearance,” he said.

However, Chamberland agreed that background checks for staff were essential.

“DOGE sharing this information with the public could go a long way to reduce security concerns.”

This is not the first time Musk’s DOGE has upset people enough to provoke legal action. Two weeks ago, a private class action alleged that his team sent emails to the federal workforce from the Office of Personnel Management (OPM) in a way that broke the E-Government Act of 2002 and was insecure.

Kategorie: Hacking & Security

Police arrests 2 Phobos ransomware suspects, seizes 8Base sites

Bleeping Computer - 10 Únor, 2025 - 17:51
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of two suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide. [...]
Kategorie: Hacking & Security

Police arrests 4 Phobos ransomware suspects, seizes 8Base sites

Bleeping Computer - 10 Únor, 2025 - 17:51
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide. [...]
Kategorie: Hacking & Security

Cyberattack disrupts Lee newspapers' operations across the US

Bleeping Computer - 10 Únor, 2025 - 17:44
Lee Enterprises, one of the largest newspaper groups in the United States, says a cyberattack that hit its systems caused an outage last week and impacted its operations. [...]
Kategorie: Hacking & Security

Apple’s upcoming iPhone SE 4 likely to offer major improvements

Computerworld.com [Hacking News] - 10 Únor, 2025 - 17:39

IT purchasers might be interested to learn that Apple is preparing to introduce a new entry-level and more affordable next edition iPhone SE. What sets this iteration apart is that it should be powerful enough to run Apple Intelligence.

That means you can expect a good quantity of storage, as Apple Intelligence presently requires around 7GB of space. You also get a much faster and more powerful processor and a good chunk of memory, which together mean all the apps you already in use on your existing device should work much better. 

This will make the device suitable for deployment in a wider range of scenarios than in the past. It should also help the company stimulate interest among price-conscious consumers who, while they might aspire to purchase Apple’s best iPhones, remain price-sensitive.

What we know about the upcoming iPhone SE

Much of the speculation pertaining to this device has been reported on before. Additional information is coming from Bloomberg and seemingly leaked by case manufacturer Spigen. 

Based on what we think we know currently, it will have:

  • An A18 (possibly an A17) chip. The current iPhone 16 range also runs on an A18 processor.
  • An Apple-designed 5G modem — the first deployment of this important component.
  • A notch, which suggests support for Face ID. The current SE uses Touch ID. Dynamic Island may not be a feature in this device.
  • A single-lens 48MP camera with flash and auto-focus. 
  • Possibly a 2x optical zoom.
  • An Action button on the left-hand side.
  • A 6.1-in. OLED display, up from the 4.7-in. on the current model.
  • A USB-C port.
  • Pricing under $500, though likely more expensive than the current $429 for the outgoing model.

Summing up these improvements, there is no doubt that this is a significant improvement compared to the last generation SE. If you are upgrading from a previous SE, you can bank on much longer battery life and a device that is far better at handling intensive tasks. 

This will also be the first significant mass test of Apple’s first 5G modem. Apple has spent years of research and billions of dollars developing this part, which will eventually replace Qualcomm’s 5G chips across all Apple’s products.  

Apple’s intelligence on Apple Intelligence

Apple’s decision to introduce another iPhone also means it will have all the excuse it needs to aggressively re-promote Apple Intelligence, which is now available in most major English-speaking nations and should be available in  Chinese, English (India), English (Singapore), French, German, Italian, Japanese, Korean, Portuguese, Spanish, Vietnamese and other languages this year.

While we don’t yet know who Apple will partner with for Apple Intelligence in China, the inclusion of localized English support in India could be a big boost. IDC recently told us that Apple has seen 35% growth in India, which has become its fourth-largest market for sales. Expanding Apple Intelligence availability with a lower-cost device in that market could stimulate additional growth — and it’s also likely that a large number of these devices will actually be Made In India (though designed in Cupertino). 

Protecting Apple’s story

Elsewhere, with consumers in other nations feeling the pinch, the new model is likely to put a little wind in Apple’s sails as it navigates what is traditionally one of its slower quarters. Apple management surely feels the company needs to boost momentum somehow, given the battering its stock has suffered because of regulatory problems in some markets.

There also continue to be pervasive reports claiming Apple plans a new and thinner device, a so-called “iPhone 17 Air,” this year.

You can follow me on social media! Join me on BlueSky,  LinkedInMastodon, and MeWe

Kategorie: Hacking & Security

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

The Hacker News - 10 Únor, 2025 - 16:16
Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent
Kategorie: Hacking & Security

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

The Hacker News - 10 Únor, 2025 - 16:16
Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Microsoft raises rewards for Copilot AI bug bounty program

Bleeping Computer - 10 Únor, 2025 - 16:00
​Microsoft announced over the weekend that it has expanded its Microsoft Copilot (AI) bug bounty program and increased payouts for moderate severity vulnerabilities. [...]
Kategorie: Hacking & Security

Microsoft Teams is becoming more like Facebook

Computerworld.com [Hacking News] - 10 Únor, 2025 - 13:45

Microsoft Teams users can expect a slew of new features in an upcoming update that is currently in full testing, including Storyline, a Facebook-like feed where users can share messages, news, or congratulations. Users can also follow people via Storyline, much as they would on Facebook

According to The Verge, Storyline is considered a successor to Viva Engage.

Users will also get several Copilot-related novelties, such as the ability to summarize the most important parts of a Word document or a PowerPoint presentation.

Kategorie: Hacking & Security

Your ‘new’ Seagate data center hard drive is likely a used one

Computerworld.com [Hacking News] - 10 Únor, 2025 - 13:36

A growing number of buyers have reported purchasing supposedly new Seagate data center-grade hard drives, only to discover that they had been previously used for thousands of hours.

A recent investigation by German news portal Heise has uncovered that used Seagate data center-grade hard drives, originating from cryptocurrency mining farms, are being sold as new.

Kategorie: Hacking & Security

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

The Hacker News - 10 Únor, 2025 - 13:13
In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack. This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted. The question
Kategorie: Hacking & Security

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

The Hacker News - 10 Únor, 2025 - 13:13
In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack. This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted. The question Ravie Lakshmananhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Don't Overlook These 6 Critical Okta Security Configurations

The Hacker News - 10 Únor, 2025 - 12:00
Given Okta's role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture. With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for
Kategorie: Hacking & Security

Don't Overlook These 6 Critical Okta Security Configurations

The Hacker News - 10 Únor, 2025 - 12:00
Given Okta's role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture. With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for [email protected]
Kategorie: Hacking & Security
Syndikovat obsah