What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2019-02-26 08:57:02 (Déjà vu) Hack the Box Zipper: Walkthrough (lien direct) Today we are going to solve another CTF challenge “Zipper”. It is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Hard Task: To find user.txt and... Continue reading → Hack
The_Hackers_News.webp 2019-02-26 05:45:04 Latest WinRAR Flaw Being Exploited in the Wild to Hack Windows Computers (lien direct) It's not just the critical Drupal vulnerability that is being exploited by in the wild cybercriminals to attack vulnerable websites that have not yet applied patches already available by its developers, but hackers are also exploiting a critical WinRAR vulnerability that was also revealed last week. A few days ago, The Hacker News reported about a 19-year-old remote code execution vulnerability Hack Vulnerability
no_ico.webp 2019-02-25 14:30:01 PoS Provider Hack That Affected Customers At 130 Locations (lien direct) Point-of-Sale Solutions Provider – North County Business Products was hacked and credit-card stealing malware was put on the networks of clients across the country like Dunn Brothers Coffee, Zipps Sports Grill and Someburros outlets.  POS Firm Hacked, Malware Deployed at 130+ Outlets: Clients of North County Business Products hit by data breach https://t.co/nNCAXYZbof pic.twitter.com/y5FZkGZh8C — Shah Sheikh (@shah_sheikh) February 22, … The ISBuzz Post: This Post PoS Provider Hack That Affected Customers At 130 Locations Data Breach Malware Hack
AlienVault.webp 2019-02-25 14:00:00 Why Cybersecurity Experts Are Being Recruited Left and Right (lien direct) Once upon a time, businesses needed to take light cybersecurity precautions to ward off amateur hackers. A business owner may have recruited their tech-savvy nephew to protect their system, barely worrying about the risk. Today, the world of cybersecurity has done a 180 — it’s now a top concern for businesses. As businesses swiftly adapt to the changing digital environment, new technology means more cybersecurity concerns. Businesses are now using new tech for an assortment of needs, from the recruitment process to audience discovery and beyond. On top of that, as consumers continue to shop online and use the internet to store all sorts of personal information, hackers have only grown in their knowledge and resourcefulness to create clever, threatening ways to attack businesses. And for good reason: Uncovering financial and health information is worth a lot of money for hackers. The Demand for Cybersecurity Specialists Cybersecurity professionals are in incredibly high demand right now. Experts predict that by the year 2021, as many as 3.5 million cybersecurity positions will be unfilled. That means a lot of businesses will be exposed to potentially ruinous risk. The internet of things (IoT) has created more opportunities for employees and consumers to stay connected through an assortment of tools, from smartphones to smart home appliances. Every time another device connects to the internet, another security risk opens up. When valuable personal information is transmitted, those devices and connections become gold mines for hackers. Additionally, any business that has some type of online presence, whether it’s a customer-facing retail store or employees who use an internal, internet-connected system, needs cybersecurity services. Certain industries have even more of a pressing need than others: Finance Government agencies Media Retail Tech companies These industries deal in high levels of personal information that, if a hacker accessed it, would be detrimental to the business as well as its customers. How Do Cybersecurity Experts Protect Businesses? In 2014, Sony Pictures was the target of a major cybersecurity attack. According to Michael Lynton, chief executive, “There's no playbook for this, so you are, in essence, trying to look at the situation as it unfolds and make decisions without being able to refer to a lot of experiences you've had in the past or other people's experiences. You're on completely new ground.” This is a common sentiment, but it may be unfounded. Even five years ago, cybersecurity pros noted that Sony should have, and could have, been better prepared. When you decide to go into the field of cybersecurity, you may opt to head back to sc Spam Malware Hack Threat ★★★★★
Blog.webp 2019-02-24 16:36:04 (Déjà vu) Hack the Box: Giddy Walkthrough (lien direct) Today we are going to solve another CTF challenge “Giddy”. It is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Expert Task: To find user.txt and... Continue reading → Hack
TechRepublic.webp 2019-02-21 19:30:05 How to hack the Windows 10 Taskbar to display your last active app window (lien direct) Learn how to edit the Windows Registry to change the default behavior of the Microsoft Windows 10 Taskbar. Hack
The_Hackers_News.webp 2019-02-21 02:18:01 Another Critical Flaw in Drupal Discovered - Update Your Site ASAP! (lien direct) Developers of Drupal-a popular open-source content management system software that powers millions of websites-have released the latest version of their software to patch a critical vulnerability that could allow remote attackers to hack your site. The update came two days after the Drupal security team released an advance security notification of the upcoming patches, giving websites Hack Vulnerability
SecurityWeek.webp 2019-02-20 21:42:01 Canada Helping Australia Determine \'Full Extent\' of Hack (lien direct) Canada's electronic eavesdropping agency said Wednesday it is working with Canberra to try to determine the scale of computer hacking on Australia's parliament and political parties just months from an election. Hack ★★★★★
Blog.webp 2019-02-20 11:19:04 (Déjà vu) Hack the Box: Dab Walkthrough (lien direct) Today we are going to solve another CTF challenge “Dab”. It is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Expert Task: To find user.txt and... Continue reading → Hack
no_ico.webp 2019-02-19 18:30:05 AdventHealth Breach Of 42,000 Patients (lien direct) It was reported late last week that about 42,000 AdventHealth Medical Group patients are being notified that their personal and health data was breached for more than a year due to a hack of the Florida provider's systems. The breached data contained troves of personal and health data, including medical histories, insurance carriers, Social Security numbers, along with demographic … The ISBuzz Post: This Post AdventHealth Breach Of 42,000 Patients Hack
Blog.webp 2019-02-19 13:23:05 Podcast Episode 134: The Deep Fake Threat to Authentication and analyzing the PEAR Compromise (lien direct) Vijay Balasubramaniyan of Pindrop joins us to talk about it. And, in our second segment, Sam Bisbee the CSO of the firm ThreatStack joins us to talk about last month's hack of the PEAR open source package manager and why data deserialization attacks are a growing threat to projects that use open source components. The post Podcast Episode 134:...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/598068876/0/thesecurityledger -->» Hack Threat
The_Hackers_News.webp 2019-02-19 01:55:04 LPG Gas Company Leaked Details, Aadhaar Numbers of 6.7 Million Indian Customers (lien direct) Why would someone bother to hack a so-called "ultra-secure encrypted database that is being protected behind 13 feet high and 5 feet thick walls," when one can simply fetch a copy of the same data from other sources. French security researcher Baptiste Robert, who goes by the pseudonym "Elliot Alderson" on Twitter, with the help of an Indian researcher, who wants to remain anonymous, Hack
BBC.webp 2019-02-18 02:15:01 Australian political parties hit by \'state actor\' hack, PM says (lien direct) The "sophisticated" activity follows an attempted hack on the parliament, Scott Morrison says. Hack
The_Hackers_News.webp 2019-02-18 01:37:01 How to Hack Facebook Accounts? Just Ask Your Targets to Open a Link (lien direct) It's 2019, and just clicking on a specially crafted URL would have allowed an attacker to hack your Facebook account without any further interaction. A security researcher discovered a critical cross-site request forgery (CSRF) vulnerability in the most popular social media platform that could have been allowed attackers to hijack Facebook accounts by simply tricking the targeted users into Hack Vulnerability
Blog.webp 2019-02-16 09:20:02 (Déjà vu) Hack the Box: Ypuffy Walkthrough (lien direct) Today we are going to solve another CTF challenge “Ypuffy”. It is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Intermediate Task: To find user.txt and... Continue reading → Hack
SecurityAffairs.webp 2019-02-15 11:15:04 Coffee Meets Bagel dating app confirms data breach (lien direct) The week closes with the news of another embarrassing data breach, the Coffee Meets Bagel confirmed a hack on Valentine’s Day. The dating app Coffee Meets Bagel confirmed that hackers breached its systems on Valentine’s Day and may have obtained access to users’ account data. The company notified the incident to account holders, the intrusion […] Data Breach Hack
DarkReading.webp 2019-02-14 15:45:00 Coffee Meets Bagel Confirms Hack on Valentine\'s Day (lien direct) The dating app says users' account data may have been obtained by an unauthorized party. Hack
WiredThreatLevel.webp 2019-02-13 19:29:00 US Air Force Defector Allegedly Helped Iran Hack Americans (lien direct) In an astonishing indictment, the DoJ details how Monica Witt allegedly turned on her former counterintelligence colleagues. Hack
ZDNet.webp 2019-02-13 17:58:01 Game of Thrones hacker worked with US defector to hack Air Force employees for Iran (lien direct) Former US Air Force intelligence agent passed crucial information to Iranian state hackers after she defected to Iran in 2013. Hack
TechRepublic.webp 2019-02-13 16:24:01 5 ways project management can help you hack digital transformation (lien direct) Only 25% of digital transformation projects yield real benefits, according to the Project Management Institute. Here's how your organization can improve. Hack
Chercheur.webp 2019-02-12 13:33:03 Email Provider VFEmail Suffers \'Catastrophic\' Hack (lien direct) Email provider VFEmail has suffered what the company is calling "catastrophic destruction" at the hands of an as-yet unknown intruder who trashed all of the company's primary and backup data in the United States. The firm's founder says he now fears some 18 years' worth of customer email may be gone forever. Hack
no_ico.webp 2019-02-11 16:53:04 Australian Parliament Cyber-Hack Attempt (lien direct) Australian authorities are investigating an attempt to hack into the national parliament's computer network, two senior lawmakers said on Friday, but there was no evidence yet that any data had been accessed or stolen. China link possible in cyber attack on Australian Parliament – https://t.co/yqGgeY15bF via @Shareaholic — Petrov Dempski (@petrovdempski) February 10, 2019 Experts … The ISBuzz Post: This Post Australian Parliament Cyber-Hack Attempt Hack
DarkReading.webp 2019-02-11 15:15:00 OkCupid Denies Data Breach Amid Account Hack Complaints (lien direct) Users on the dating website report hackers breaking into their accounts, changing email addresses, and resetting passwords. Data Breach Hack
ZDNet.webp 2019-02-09 00:49:00 China\'s cybersecurity law update lets state agencies \'pen-test\' local companies (lien direct) China draws up law that makes it perfectly legal to hack any internet-related company activating in its borders. Hack
ErrataRob.webp 2019-02-08 10:08:18 How Bezo\'s dick pics might\'ve been exposed (lien direct) In the news, the National Enquirer has extorted Amazon CEO Jeff Bezos by threatening to publish the sext-messages/dick-pics he sent to his mistress. How did the National Enquirer get them? There are rumors that maybe Trump's government agents or the "deep state" were involved in this sordid mess. The more likely explanation is that it was a simple hack. Teenage hackers regularly do such hacks -- they aren't hard.This post is a description of how such hacks might've been done.To start with, from which end were they stolen? As a billionaire, I'm guessing Bezos himself has pretty good security, so I'm going to assume it was the recipient, his girlfriend, who was hacked.The hack starts by finding the email address she uses. People use the same email address for both public and private purposes. There are lots of "people finder" services on the Internet that you can use to track this information down. These services are partly scams, using "dark patterns" to get you to spend tons of money on them without realizing it, so be careful.Using one of these sites, I quickly found a couple of a email accounts she's used, one at HotMail, another at GMail. I've blocked out her address. I want to describe how easy the process is, I'm not trying to doxx her.Next, I enter those email addresses into the website http://haveibeenpwned.com to see if hackers have ever stolen her account password. When hackers break into websites, they steal the account passwords, and then exchange them on the dark web with other hackers. The above website tracks this, helping you discover if one of your accounts has been so compromised. You should take this opportunity to enter your email address in this site to see if it's been so "pwned".I find that her email addresses have been included in that recent dump of 770 million accounts called "Collection#1".The http://haveibeenpwned.com won't disclose the passwords, only the fact they've been pwned. However, I have a copy of that huge Collection#1 dump, so I can search it myself to get her password. As this output shows, I get a few hits, all with the same password.At this point, I have a password, but not necessarily the password to access any useful accounts. For all I know, this was the Hack
The_Hackers_News.webp 2019-02-08 00:02:00 Get a Lifetime Subscription to Unlimited VPN for just $59.99 (5 Devices) (lien direct) For all of the undeniable conveniences the Internet has brought us, it's becoming an increasingly dangerous place to be. Both individual hackers and entire government agencies are now able to hack into your computer or smartphone from across the globe and steal everything from your browsing history to your credit card numbers, and they're often able to do so without your knowledge. A Virtual Hack
TechWorm.webp 2019-02-07 11:26:03 Hackers can hack an Android smartphone just by looking at a PNG image (lien direct) Vulnerability in PNG file can allow hackers to hack Android smartphones Beware, while opening a harmless-looking image downloaded from the internet, emails, social media apps, or messaging apps, as it could compromise your smartphone. Google has discovered three new critical vulnerabilities that allow hackers to hack an Android smartphone just by looking at a PNG […] Hack
SecurityAffairs.webp 2019-02-07 06:28:05 Android devices could be hacked by viewing a malicious PNG Image (lien direct) Google patched a critical flaw in its Android OS that allows an attacker to send a specially crafted PNG image file to hack a target device, Opening an image file on your smartphone could allow attackers to hack into your Android device due to three critical vulnerabilities, CVE-2019-1986, CVE-2019-1987, and CVE-2019-1988. The flaws affect millions […] Hack
CSO.webp 2019-02-07 03:00:00 Power LogOn offers 2FA and networked password management for the enterprise (lien direct) Like most humans, I'm more vocal about the things I don't like and less likely to crow about the things I do like.  Since I wrote my popular 11 ways to hack 2FA article, I've been besieged by vendors eager to show me how their authentication solution defeats all the hacking issues I wrote about. Hack
The_Hackers_News.webp 2019-02-06 06:14:03 Android Phones Can Get Hacked Just by Looking at a PNG Image (lien direct) Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone-downloaded anywhere from the Internet or received through messaging or email apps. Yes, just viewing an innocuous-looking image could hack your Android smartphone-thanks to three newly-discovered critical vulnerabilities that affect millions of devices running recent versions of Hack
The_Hackers_News.webp 2019-02-05 12:05:04 Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs (lien direct) You've always been warned not to share remote access to your computer with any untrusted people for many reasons-it's basic cyber security advice, and common sense, right? But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers? Security researchers at cybersecurity firm Check Point have discovered more than two dozen Hack
no_ico.webp 2019-02-01 21:20:05 Banks\' Online Security Is Not Tough Enough To Stop Hackers (lien direct) Less than half of Britain's leading banks are doing enough to protect customers from hackers, according to a Which? investigation. Only five of the 12 investigated banks used two-factor authentication at login, a feature which makes it harder for criminals to hack into accounts. Dewald Nolte, Chief Commerical Officer at Entersekt: “The rise in popularity … The ISBuzz Post: This Post Banks' Online Security Is Not Tough Enough To Stop Hackers Hack Guideline
AlienVault.webp 2019-02-01 14:00:00 Things I Hearted This Week, 1st Feb 2019 (lien direct) Hello February! I was doing some research last night and was surprised to discover that the Target breach is over five years old! Five years! I was sure it only happened a couple of years ago - but such is the fast-paced nature of the industry, and also I guess a testament to how certain major breaches become part of infosec folklore. Like TJX, or Heartland - and no, I’m not going to look up when any of those occurred because I’ll probably end up feeling a lot older than I already do. Enough reminiscing - let’s get down to it. The Big Five There’s been a lot of things I didn’t heart this week, although for one reason or another they ended up in my list of things to talk about. So, if you’re wondering about the stories regarding Facebook and Apple, and also Google, then yes, I did see them, and no, I don’t fancy talking about them. But speaking of large companies, Kashmir Hill has undertaken what is perhaps becoming my favourite piece of tech journalism ever. WIth detailed write ups and slick videos showcasing how she cut out the big five of Amazon, Facebook, Google, Microsoft, and Apple from her life, one week at a time. Life without the tech giants | Gizmondo Week 1, Amazon | Gizmondo Week 2, Facebook | Gizmondo Week 3, Google | Gizmondo Considerations for When Your Apartment Goes “Smart” Everything is getting ‘smart’ these days. By smart, I mean connected and vulnerable. So, what should you do if you live in an apartment where everyone is getting fancy new smart locks (or terribly insecure cheap locks depending on how you look at it). Lesley Carhart recently found herself in the same position, and has written a really good post on security considerations if you ever find yourself in a similar position. Security Things to Consider When Your Apartment Goes ‘Smart’ | tisiphone Abusing Exchange: One API Call Away From Domain Admin An attacker with just the credentials of a single lowly Exchange mailbox user can gain Domain Admin privileges by using a simple tool. Very good writeup here. Abusing Exchange: One API call away from Domain Admin | dirkjanm.io Sending Love Letters The "Love Letter" malspam campaign has now changed its focus to Japanese targets and almost doubled the volume of malicious attachments it delivers. Love Letter Malspam Serves Cocktail of Malware, Heavily Targets Japan | Bleeping Computer While we’re talking about Japan, a new law in Japan allows the nation's National Institute of Information and Communications Technology (NICT) to hack into citizens' personal IoT equipment as part of a survey of vuln Data Breach Hack Yahoo
DarkReading.webp 2019-02-01 13:45:00 Nest Hack Leaves Homeowner Sleepless in Chicago (lien direct) A Chicago-area family's smart home controls were compromised in a hack that has left them feeling vulnerable in their own home. Hack
no_ico.webp 2019-01-31 21:51:04 Credit Card Info Sold On The Dark Web From City Of St. John\'s Parking System Hack (lien direct) Credit card information from about 6,000 people was sold on the dark web after The City of St. John discovered that it's parking system had been hacked with a malware that collected credit card information for the previous 18 months from those paying parking tickets. Ryan Wilk, VP of Customer Success at NuData Security: “Once … The ISBuzz Post: This Post Credit Card Info Sold On The Dark Web From City Of St. John's Parking System Hack Malware Hack
CSO.webp 2019-01-29 03:00:00 OSCP cheating allegations a reminder to verify hacking skills when hiring (lien direct) Few infosec certifications have developed the prestige in recent years of the Offensive Security Certified Professional (OSCP), an entry-level penetration testing certification with a reputation for being one of the most difficult out there.  Run by Offensive Security (OffSec), the makers of Kali Linux, whose motto is "Try harder," the OSCP features a grueling 24-hour exam that requires students to hack a variety of machines on a test network. (Full disclosure: This reporter previously paid to self-study for the OSCP but did not take the exam. He plans to #TryHarder.) Hack
ErrataRob.webp 2019-01-28 22:21:56 Passwords in a file (lien direct) My dad is on some sort of committee for his local home owners association. He asked about saving all the passwords in a file stored on Microsoft's cloud OneDrive, along with policy/procedures for the association. I assumed he called because I'm an internationally recognized cyberexpert. Or maybe he just wanted to chat with me*. Anyway, I thought I'd write up a response.The most important rule of cybersecurity is that it depends upon the risks/costs. That means if what you want to do is write down the procedures for operating a garden pump, including the passwords, then that's fine. This is because there's not much danger of hackers exploiting this. On the other hand, if the question is passwords for the association's bank account, then DON'T DO THIS. Such passwords should never be online. Instead, write them down and store the pieces of paper in a secure place.OneDrive is secure, as much as anything is. The problem is that people aren't secure. There's probably one member of the home owner's association who is constantly infecting themselves with viruses or falling victim to scams. This is the person who you are giving OneDrive access to. This is fine for the meaningless passwords, but very much not fine for bank accounts.OneDrive also has some useful backup features. Thus, when one of your members infects themselves with ransomware, which will encrypt all the OneDrive's contents, you can retrieve the old versions of the documents. I highly recommend groups like the home owner's association use OneDrive. I use it as part of my Office 365 subscription for $99/year.Just don't do this for banking passwords. In fact, not only should you not store such a password online, you should strongly consider getting "two factor authentication" setup for the account. This is a system where you need an additional hardware device/token in addition to a password (in some cases, your phone can be used as the additional device). This may not work if multiple people need to access a common account, but then, you should have multiple passwords, for each individual, in such cases. Your bank should have descriptions of how to set this up. If your bank doesn't offer two factor authentication for its websites, then you really need to switch banks.For individuals, write your passwords down on paper. For elderly parents, write down a copy and give it to your kids. It should go without saying: store that paper in a safe place, ideally a safe, not a post-it note glued to your monitor. Again, this is for your important passwords, like for bank accounts and e-mail. For your Spotify or Pandora accounts (music services), then security really doesn't matter.Lastly, the way hackers most often break into things like bank accounts is because people use the same password everywhere. When one site gets hacked, those passwords are then used to hack accounts on other websites. Thus, for important accounts, don't reuse passwords, make them unique for just that account. Since you can't remember unique passwords for every account, write them down.You can check if your password has been hacked this way by checking http://haveibeenpwned.com and entering your email address. Entering my dad's email address, I find that his accounts at Adobe, LinkedIn, and Disqus has been discovered by hackers (due to hacks of those websites) and published. I sure hope whatever these passwords were that they are not the same or similar to his passwords for GMail or his bank account.
* the lame joke at the top was my dad's, so don't blame me :-)
Hack
no_ico.webp 2019-01-28 19:15:03 Japan Will Hack Its Citizens\' IoT Devices To \'Make Them Secure\' (lien direct) It has been reported that the Japanese government has passed a new law amendment that will allow officials to hack into citizen's Internet of Things devices to compile a list of devices that are prone to hacking. Japanese government plans to hack into citizens' #IoT devicesThe Japanese government approved a law amendment on Friday that will allow government … The ISBuzz Post: This Post Japan Will Hack Its Citizens' IoT Devices To 'Make Them Secure' Hack
TechRepublic.webp 2019-01-28 18:24:00 The Japanese government plans to hack into unsecured IoT devices. Will it work? (lien direct) Ahead of the 2020 Tokyo Olympic Games, the Japanese government is planning to access unsecured Internet of Things devices to identify users and request they change their passwords. Hack
BBC.webp 2019-01-28 12:53:04 TalkTalk hacker Daniel Kelley\'s blackmail charge dropped (lien direct) Daniel Kelley has already admitted involvement in the major hack attack on the telecoms firm in 2015. Hack
ZDNet.webp 2019-01-27 14:39:00 Japanese government plans to hack into citizens\' IoT devices (lien direct) Japanese government wants to secure IoT devices before Tokyo 2020 Olympics and avoid Olympic Destroyer and VPNFilter-like attacks. Hack VPNFilter
AlienVault.webp 2019-01-24 14:00:00 The Changing Face Of Cybersecurity In The 21st Century (lien direct) 67% of small and micro businesses have experienced a cyber attack, while 58% have experienced a data breach within the last 12 months, according to a study conducted by the Ponemon Institute. Cybersecurity has become one of the major questions that plague the 21st century, with numerous businesses reporting significant losses resulting from loss of private customer data, denial of service (DoS) attacks that cripple operations and internal employee threats that pose a growing data security challenge for both small and large companies. When you consider the effects of the cyber attack in Alaska and the astounding number of businesses it crippled, it's clear that businesses owners need to understand the threats they face today. The Question of Cybersecurity A few decades ago, the thought of cyber warfare would have seemed far-fetched to say the least. But today, it has become as likely as it is terrifying, especially when you consider how many of our gadgets are connected to the internet - mobile phones, smart TVs, PCs, and IoT devices. The technical advancements in data-hacking have led to the parallel development of data-protection. While downloading an antivirus software may previously have been sufficient protection, this is now only a preliminary measure, and must be coupled with stronger controls like 2-factor authentication, access control, and raising threat awareness. The cyber-security industry grows steadily each day, and it is now possible to find adequate protection for all your gadgets: from your phone to your tablet and yes, even your new television set. Artificial Intelligence Shaping Cybersecurity If you have a basic interest in the tech world, you will have undoubtedly come across Sophia. Sophia is a humanoid robot and may be termed by many as the perfect illustration of how far AI has come. It is for this reason that AI is leading the cybersecurity field. This is through the application of the concept of synthesizing data. Basically, what this means is that two independent chunks of information can be combined to arrive at a single conclusion. In layman's terms, AI is expected to improve cybersecurity by speeding up incident response when malicious activity is detected, thwarting ransomware and automating practices. This way, companies will be able to remain a step ahead of potential cyber threats.   The Future of Cybersecurity Innovation Conventionally, data transfer has been achieved through electrical signals. However, this may change if we enter the era of data exchange through light signals. This works through the use of photons as carriers of quantum information in cyberspace. Photons are light particles which are generated simultaneously in pairs. With timing controls, this would mean that data transfer would only be possible if twin-photon particles existed for the sender and recipient. Ultimately, the only way to hack the data would be to upend the laws of physics. More innovations like deep learning, cloud technology, and hardware will revolutionalize the future of cybersecurity, making it easier for companies to prevent cyber attacks. The field of cybersecurity is shifting and improving daily to match the changing needs of today’s cyberspace. It is essential that everyone, including businesses, become familiar with the means with which to protect their data. Understanding the changing face of cybersecurity is a key step to achieving that goal. Ransomware Data Breach Hack Threat Guideline
ESET.webp 2019-01-23 12:00:05 Former employee blamed for hack of WordPress plugin maker (lien direct) >The plugin's users are recommended to change their passwords on WPML's website following havoc reportedly wrought by a disgruntled ex-employee Hack
ZDNet.webp 2019-01-23 01:38:05 Mystery still surrounds hack of PHP PEAR website (lien direct) Three days later, still no new details about how the official PHP website hosted a backdoored version of the PEAR package manager for the past six months. Hack
SecurityAffairs.webp 2019-01-22 21:00:02 Critical flaw in Linux APT package manager could allow remote hack (lien direct) Expert discovered a remote code execution vulnerability in the APT package manager used by several Linux distributions, including Debian and Ubuntu. The independent security consultant Max Justicz has discovered a remote code execution vulnerability in the APT package manager used by several Linux distributions, including Debian and Ubuntu. The flaw, tracked as CVE-2019-3462, affects package manager version 0.8.15 and later, […] Hack Vulnerability
Kaspersky.webp 2019-01-22 18:45:00 How Web Apps Can Turn Browser Extensions Into Backdoors (lien direct) Researchers show how rogue web applications can be used to attack vulnerable browser extensions in a hack that gives adversaries access to private user data. Hack
DarkReading.webp 2019-01-22 18:10:00 Hack of Plug-in Website Ruffles WordPress Community (lien direct) An intruder thought to be a former employee used a backdoor into the WPML website to skim email addresses and send a mass email blast. Hack
The_Hackers_News.webp 2019-01-22 08:50:02 Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems (lien direct) Just in time… Cybersecurity experts this week fighting over Twitter in favor of not using HTTPS and suggesting software developers to only rely on signature-based package verification just because APT on Linux also does the same. Just today, a security researcher revealed details of a critical remote code execution flaw in Linux APT, exploitation of which could have been mitigated if the Hack
ZDNet.webp 2019-01-22 01:09:04 ATLAS game taken offline twice after users hack admin account, find server exploit (lien direct) PewDiePie fans also strike again! Flood server with "Subscribe to PewDiePie" spam. Hack
Blog.webp 2019-01-21 18:13:05 (Déjà vu) Hack the Box: SecNotes Walkthrough (lien direct) Today we are going to solve another CTF challenge “Mischief”. Mischief is a retired vulnerable lab presented by Hack the Box for helping pentester's to perform online penetration testing according to their experience; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Easy Task: To find user.txt and root.txt file... Continue reading → Hack
Last update at: 2024-07-01 08:08:13
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter