FORT MEADE, Md. – The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released a Cybersecurity Technical Report, “Kubernetes Hardening Guidance,” today. This...
Year: 2021
theregister – Beijing lashes USA’s China Telecom ban – but quite gently
Rolls out usual lines about national security being pretext for competitive action, more strident voices keep quiet The Register China’s Ministry of Industry and Information Technology...
nakedsecurity – Banking scam uses Docusign phish to thieve 2FA codes
naked security by SOPHOS Two weeks ago was Cybersecurity Awareness Month’s “Fight the Phish” week, a theme that the #Cybermonth organisers chose because this age-old cybercrime...
thehackernews – Mekotio Banking Trojan Resurfaces with New Attacking and Stealth Techniques
The Hacker News The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar...
theregister – Your data is wider and deeper than ever – and so are the threats
Looking for answers on how to protect your backups from attack? Join us and we’ll share all we know The Register Modern cybercriminals know that choking...
theregister – Data-breached Guntrader website calls in liquidators, is reborn as Guntrader 2 Ltd
Viscount still helms new firm – while since-deleted posts on firm’s Facebook page enrage users The Register A British firearms sales website’s owner has called in...
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors. DARKReading Virtual private networks...
unaaldia – Múltiples fraudes en certificación de la vacunación de la COVID-19 del Servicio Nacional de Salud de Ucrania
Recientemente, el Servicio de Seguridad de Ucrania (SSU) ha arrestado a un grupo de ciberdelincuentes por acceder de manera ilícita a la base de datos del Servicio Nacional de la...
ciso2ciso video series – simplilearn – What Is Kali Linux? | What Is Kali Linux And How To Use It? | Kali Linux Tutorial | Simplilearn
In this video on what is kali linux and how to use it, we learn about this linux distribution catered specifically to penetration testers and ethical...
cybersecuritynews – Destapan la campaña de estafa global de SMS Premium «UltimaSMS», presente en Google Play Store
Más de 150 apps forman parte de una campaña de estafa anunciada por Tik Tok e Instagram, destinada a engañar a los usuarios para que se...
bitglass – On the Dark Web, Hackers Eager to Share Tactics
BITGLASS In Project Cumulus, our latest investigative report, the Bitglass research team scoured the Dark Web for sites where hackers traffic in identities and cloud application user credentials....
CISO2CISO VIDEO SERIES – SIMPLILEARN – FREE Cyber Security Full Course – Learn Cyber Security In 12 Hours | Cyber Security Training WITH CERTIFICATION
This Cyber Security full course helps you learn cybersecurity in 12 Hours. In this cybersecurity tutorial for beginners, you will learn the importance of cybersecurity, cybersecurity...
av-test – 19 soluciones para empresas puestas a prueba con Windows
AVTEST Las empresas deberían apostar por una buena solución de seguridad para asegurar su propio futuro. El laboratorio de AV-TEST ha examinado 19 soluciones de seguridad...
ciso2ciso toolbox series – cybersecuritynews – Top 10 Best Free Penetration Testing Tools 2021 –
10 Best Penetration Testing Tools 2021 Source: https://cybersecuritynews.com/penetration-testing-tools/ Metasploit NMAP Wireshark Aircrack Nessus Social Engineering Toolkit W3AF Burp Suite BeEF SQLmap When we talk about the...
darkreading – Password Reuse Problems Persist Despite Known Risks
The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds. DARKReading While people...
darkreading – The New Security Basics: 10 Most Common Defensive Actions
DARKReading Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as...
securityaffairs – Google sent over 50,000 warnings of state-sponsored attacks, +33% from same period in 2020
Google revealed to have sent roughly 50,000 alerts of state-sponsored phishing or hacking attempts to customers since January. Security Affairs Google announced to have sent roughly...
theregister – Ethereum dev admits helping North Korea mine crypto-bucks, faces 20 years jail
Also advised on how smart contracts could help DPRK in US nuke talks The Register A US citizen has admitted to helping the Democratic People’s Republic...
darkreading – Windows 11 Available: What Security Pros Should Know
Microsoft discusses the security requirements and changes coming to the newest version of its Windows operating system. DARKReading Microsoft today announced the official release of Windows...
CISO2CISO EVENTS – WE ARE 50000 MEMBERS IN LINKEDIN CISO2CISO GROUP
We want to thank you !!!Today we are pleased to announce that we are more than 50,000 cybersecurity enthusiasts, constituting one of the largest communities in...
securityaffairs – WhatsApp made available end-to-end encrypted chat backups
WhatsApp made available end-to-end encrypted chat backups on iOS and Android to prevent anyone from accessing user chats. Security Affairs WhatsApp is rolling out end-to-end encrypted chat...
darkreading – Aerospace, Telecommunications Companies Victims of Stealthy Iranian Cyber-Espionage Campaign
Since at least 2018, “MalKamak” group has targeted firms in the Middle East, Russia, and other areas to steal sensitive data, security vendor says. DARKReading A...
theregister – ASUS patches ROG Armoury Crate app after researcher spots all-too-common flaw
It tries to load a file from a location any old user can write to The Register A flaw in ASUS’s ROG Armoury Crate hardware management...
securityaffairs – Boffins devise a new side-channel attack affecting all AMD CPUs
A group of researchers from the Graz University of Technology and CISPA Helmholtz Center for Information Security devised a new side-channel attack that affects AMD CPUs....
thehackernews – Apple now requires all apps to make it easy for users to delete their accounts
The Hacker News All third-party iOS, iPadOS, and macOS apps that allow users to create an account should also provide a method for terminating their accounts...
darkreading – Microsoft: 58% of Nation-State Cyberattacks Come From Russia
DARKReading A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and supply chain, IoT, and OT security. Russia is the source of...
darkreading – North American Orgs Hit With an Average of 497 Cyberattacks per Week
A new analysis confirms a surge in global cyberattacks since the COVID-19 pandemic began. DARKReading New data released this week confirms what numerous others have reported...
theregister – Anonymous: We’ve leaked disk images stolen from far-right-friendly web host Epik
Latest data dump also apparently contains ‘a wide range of passwords and API tokens’ The Register Entities using the name and iconography of Anonymous (EUTNAIOA) claim...
threatpost – Facebook Blames Outage on Faulty Router Configuration
THREATPOST One easily disproved conspiracy theory linked the ~six-hour outage to a supposed data breach tied to a Sept. 22 hacker forum ad for 1.5B Facebook...
theregister – Attacks against Remote Desktop Protocol endpoints have exploded this year, warns ESET’s latest Threat Report
Security firm points to a ‘stalkerware’ epidemic, new Nobelium group activity The Register Security specialist ESET’s latest Threat Report warns of a massive increase in attacks...