What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.png 2019-05-17 16:20:04 Grumpy Cat\'s Death Marks the End of the Joyful Internet (lien direct)

Tardar Sauce was an avatar of the days of the goofy web.

bleepingcomputer.png 2019-05-17 16:10:00 Windows May Hang for Sophos Users After Installing May Updates (lien direct)

Sophos is reporting that if their business products are installed on Windows 7, installing the May 2019 Patch Tuesday updates may cause Windows to hang on the update screen showing "Configuring 30%". [...]

DarkReading.png 2019-05-17 16:00:00 Artist Uses Malware in Installation (lien direct)

A piece of \'art\' currently up for auction features six separate types of malware running on a vulnerable computer.

MalwarebytesLabs.png 2019-05-17 15:59:03 4 Lessons to be learned from the DOE\'s DDoS attack (lien direct) Read more...)

The post 4 Lessons to be learned from the DOE’s DDoS attack appeared first on Malwarebytes Labs.

SecurityWeek.png 2019-05-17 15:46:02 Hacktivist Attacks Declined 95 Percent Since 2015: IBM (lien direct)

The number of hacktivist attacks that resulted in quantifiable damage to the victim has declined by 95 percent since 2015, according to IBM.

read more

no_ico.png 2019-05-17 15:45:05 GozNym Cyber-Crime Gang Which Stole Millions Busted (lien direct)

Following the news that an international crime gang which used the GozNym banking malware to steal $100m (£77m) from more than 40,000 victims has been dismantled, Roy Rashti, cybersecurity expert, BitDam commented below. Roy Rashti, Cybersecurity Expert at BitDam: “The “Goz” in GozNym stands for the notorious Gozi banker malware which, although not new, was very successfully co-opted and …

The ISBuzz Post: This Post GozNym Cyber-Crime Gang Which Stole Millions Busted appeared first on Information Security Buzz.

Kaspersky.png 2019-05-17 15:44:03 How Decoding Network Traffic Can Save Your Data Bacon (lien direct)

The importance of reading the network tealeaves of a company\'s network traffic to head off an attack.

TechRepublic.png 2019-05-17 15:23:00 One in five US employees would move anywhere to work for an exciting company (lien direct)

The majority (85%) of US employees care about the growth of their organization, according to a recent Kimble report.

securityintelligence.png 2019-05-17 15:20:02 Hunt With Intention: Why You Should Adopt Threat Hunting and How to Get Started (lien direct)

>Hackers today are more sophisticated and coordinated than the dark, hooded figures often portrayed in movies. Threat hunting is critical to spot threats before they cause damage on the network.

The post Hunt With Intention: Why You Should Adopt Threat Hunting and How to Get Started appeared first on Security Intelligence.

bleepingcomputer.png 2019-05-17 15:19:03 Windows 10 Won\'t Boot When Using System Restore After Updating (lien direct)

Microsoft says that a known issue will block Windows 10 from booting after trying to restore the system to a restore point created before installing a Windows 10 update. [...]

TechRepublic.png 2019-05-17 15:16:00 Meditations on First ThinkPad: How Lenovo adapts to changes in the PC industry (lien direct)

ThinkPad users are some of the most vociferously opinionated PC users out there, and Lenovo has the challenge of trying to please all of them.

WiredThreatLevel.png 2019-05-17 15:00:00 Now Ocean Plastics Could Be Killing Oxygen-Making Bacteria (lien direct)

The toxins that plastics leach into seawater severely affect the bacteria that provides perhaps 20 percent of Earth\'s oxygen. That\'s when things get complicated...

SecurityWeek.png 2019-05-17 14:47:03 Slack Flaw Allows Hackers to Steal, Manipulate Downloads (lien direct)

A recently patched vulnerability in the Slack desktop application for Windows can be exploited by malicious actors to steal and manipulate a targeted user\'s downloaded files.

read more

no_ico.png 2019-05-17 14:45:00 GDPR One Year Later – Cybersecurity Industry Comments (lien direct)

With the upcoming 1-year anniversary of GDPR, here are collected insights from 13 industry experts:  Great turnout for this mornings “GDPR one year on” event do-hosted with @HayesSolicitors Laura Fanning giving a great overview of practical applications of #GDPR and busting some myths around marketing. — BrianHonan (@BrianHonan) May 16, 2019 Experts Comments:   Colin …

The ISBuzz Post: This Post GDPR One Year Later – Cybersecurity Industry Comments appeared first on Information Security Buzz.

Blog.png 2019-05-17 14:33:03 Development: Vulnhub Walkthrough (lien direct)

Today we are going to take on another challenge known as “DEVELOPMENT”. This is designed for OSCP practice, and the original version of the machine was used for a CTF. It is now revived and made slightly more nefarious than the original. The author of this VM machine is “Donavan”. Our goal is to get... Continue reading

The post Development: Vulnhub Walkthrough appeared first on Hacking Articles.

TechRepublic.png 2019-05-17 14:27:00 The largest cybersecurity breaches of the past three years, and their effects on companies (lien direct)

There have been some major security breaches in recent years, according to a recent Bitglass report, and those breaches have cost companies billions of dollars along the way.

SecurityAffairs.png 2019-05-17 14:18:04 Cisco addressed a critical flaw in networks management tool Prime Infrastructure (lien direct)

Cisco had issued security updates to address 57 security flaw, including three flaws in networks management tool Prime Infrastructure. One of the flaws addressed by Cisco in the Prime Infrastructure management tool could be exploited by an unauthenticated attacker to execute arbitrary code with root privileges on PI devices. “Multiple vulnerabilities in the web-based management […]

The post Cisco addressed a critical flaw in networks management tool Prime Infrastructure appeared first on Security Affairs.

bleepingcomputer.png 2019-05-17 14:02:04 TeamViewer Confirms Undisclosed Breach From 2016 (lien direct)

TeamViewer confirmed today that it has been the victim of a cyber attack which was discovered during the autumn of 2016, but was never disclosed. This attack is thought to be of Chinese origins and utilized the Winnti backdoor. [...]

WiredThreatLevel.png 2019-05-17 14:00:00 You Can Now Play \'Fortnite\' as John Wick (lien direct)

Ahead of the release of \'John Wick: Chapter 3-Parabellum\' this weekend, players in the battle royale game can now play as the cinematic assassin.

TechRepublic.png 2019-05-17 13:57:00 Why nearly 60% of grads think they\'ll get hired within 2 months of graduating (lien direct)

Adults between the ages of 18 and 20 years old are the most optimistic about job prospects, according to a Monster report.

SecurityWeek.png 2019-05-17 13:29:01 Tenable Updates Free Vulnerability Assessment Solution (lien direct)

Tenable this week announced Nessus Essentials, an expanded version of its free vulnerability assessment solution previously known as Nessus Home. 

read more

Blog.png 2019-05-17 13:27:02 Researchers Hack Aircraft Landing System with $600 Radios (lien direct)

Airplane radio navigation systems are vulnerable to manipulation using software defined radio, researchers have shown.

The post Researchers Hack Aircraft Landing System with $600 Radios appeared first on The Security Ledger.

-->
TechRepublic.png 2019-05-17 13:11:05 TechRepublic wins gold at the national 2019 Azbee awards (lien direct)

TechRepublic took home multiple awards at the national 2019 Azbee Awards of Excellence, including two gold awards and honorable mention for Website of the Year.

WiredThreatLevel.png 2019-05-17 13:01:00 Minecraft Earth Wants to Be the Next Pokémon Go-But Bigger (lien direct)

Ten years after the original Minecraft swept the planet, Microsoft unveils an ambitious, global, augmented-reality version.

WiredThreatLevel.png 2019-05-17 13:00:00 \'Game of Thrones\': Who\'s Died So Far in Season 8 (lien direct)

A lot of blood has been shed, and surely there\'s more to come.

Logo_logpoint.jpg 2019-05-17 12:53:04 May 2019 Patch Tuesday (lien direct)

In May 2019, Patch Tuesday - Microsoft addresses 79 vulnerabilities with 22 labeled as Critical. Out of the 22 Critical vulnerabilities, 18 relates to scripting engines and browsers while 4 are Remote Code Execution in Remote Desktop, Word, GDI+, and DHCP Server. Remote Code Execution Vulnerability The Windows RDP Remote Code Execution Vulnerability aka BlueKeep [...]

The post May 2019 Patch Tuesday appeared first on LogPoint.

TechRepublic.png 2019-05-17 12:41:00 How IoT and blockchain could eliminate counterfeit goods across the supply chain (lien direct)

Businesses across industries lose money and reputation due to knock-off products and questionably sourced materials, but a solution may already exist, according to a Cisco and BCG report.

Pirate.png 2019-05-17 12:36:04 Microsoft alerte sur une faille semblable à WannaCry (lien direct)
Suite à l\'alerte, par Microsoft, d\'une nouvelle faille de sécurité semblable à WannaCry, veuillez trouver ci-dessous l\'analyse de Dagobert Levy, Vice President, France et Europe du Sud, de Tanium.
SecurityWeek.png 2019-05-17 12:34:03 Wormable Windows RDS Vulnerability Poses Serious Risk to ICS (lien direct)

A critical remote code execution vulnerability patched recently by Microsoft in Windows Remote Desktop Services (RDS) poses a serious risk to industrial environments, experts have warned.

read more

WiredThreatLevel.png 2019-05-17 12:00:00 Climate Adaptation Isn\'t Surrender. It\'s Survival (lien direct)

Yes, the world needs to reduce carbon emissions, but that\'s not enough. Technologists need to step in and start developing work-arounds of all kinds.

WiredThreatLevel.png 2019-05-17 12:00:00 In Alabama, \'The Handmaid\'s Tale\' Is a Haunting Metaphor (lien direct)

As the state passed its anti-abortion bill, protestors evoked Margaret Atwood\'s dystopian novel.

WiredThreatLevel.png 2019-05-17 12:00:00 Sony Alpha A7II Mirrorless Camera Deal: $600 Off Right Now (lien direct)

Sony\'s Alpha A7II is a mirrorless, full-frame workhorse of a camera, and a steal at less than $1,000.

Pirate.png 2019-05-17 11:59:03 Comment l\'IoT impacte le domaine de la sécurité ? (lien direct)
Si le nombre d\'IoT a enregistré une croissance exponentielle ces dernières années, on observe également une augmentation alarmante des attaques qui les ciblent. La raison tient au fait que la majorité des IoT contient peu, voire aucune mesure de sécurité pour se protéger contre ces attaques.
bleepingcomputer.png 2019-05-17 11:55:04 Some GOV.UK Sites Unreachable Due to HSTS Changes in Windows Updates (lien direct)

Windows updates released this month are causing some GOV.UK sites to become unreachable due to the GOV.UK TLD being added to Microsoft\'s HSTS preload list. This causes Microsoft Edge and Internet Explorer to only connect via HTTPS, which some of GOV.UK the sites do not support, and thus making them unreachable. [...]

Kaspersky.png 2019-05-17 11:37:04 News Wrap: WhatsApp, Microsoft, Intel and Cisco Flaws (lien direct)

From a zero day flaw in WhatsApp, to Patch Tuesday fixes, Threatpost breaks down the top vulnerabilities of this week.

ANSSI.png 2019-05-17 11:35:02 #SecNumEco de Caen : le rendez-vous pour la Sécurité économique & numérique en Normandie (lien direct)

Les entreprises de toutes tailles sont aujourd\'hui confrontées à des changements rapides et profonds : transformation numérique, évolutions réglementaires, globalisation de l\'économie, etc… Ces changements induisent aussi de nouvelles menaces avec des conséquences parfois néfastes pour l\'économie et l\'emploi de nos territoires. Ces risques peuvent être écartés, ou réduits, par l\'adoption de réflexes simples. Sécurité […]

bleepingcomputer.png 2019-05-17 11:15:00 Cisco Upgrades Remote Code Execution Flaws to Critical Severity (lien direct)

Cisco upgraded three remote code execution (RCE) vulnerabilities impacting the web management interfaces to critical severity with a CVSS base score of 9.8 after initially rating them as high with a base score of 8.8 when the advisories were first published on May 15. [...]

WiredThreatLevel.png 2019-05-17 11:00:00 5G Networks Could Throw Weather Forecasting Into Chaos (lien direct)

The FCC is clashing with scientists who argue that 5G networks could interfere with weather sensors and compromise weather predictions.

WiredThreatLevel.png 2019-05-17 11:00:00 #YouKnowMe Is Hashtag Activism at Its Most Galvanizing (lien direct)

Thousands of women have joined actress Busy Phillips in sharing abortion stories on social media, fighting stigma by force of mass testimony.

TechRepublic.png 2019-05-17 11:00:00 How to become a connected leader: 4 key factors (lien direct)

In an SAP SAPPHIRE 2019 session, Traci Maddox spoke about the benefits of being a connected leader in today\'s digitally transforming enterprise.

WiredThreatLevel.png 2019-05-17 11:00:00 What We Need From the \'Game of Thrones\' Finale (lien direct)

It\'s a lot to ask of one episode, but here\'s what should happen.

WiredThreatLevel.png 2019-05-17 11:00:00 Some US Cities Are Moving Into Real-Time Facial Surveillance (lien direct)

Chinese authorities apply facial-recognition programs to surveillance videos to identify subjects. Now, a report says Chicago and Detroit have purchased their own systems.

The_Hackers_News.png 2019-05-17 10:59:01 Report Reveals TeamViewer Was Breached By Chinese Hackers In 2016 (lien direct)

The German software company behind TeamViewer, one of the most popular software in the world that allows users to access and share their desktops remotely, was reportedly compromised in 2016, the German newspaper Der Spiegel revealed today. TeamViewer is popular remote-support software that allows you to securely share your desktop or take full control of other\'s PC over the Internet from

The_State_of_Security.png 2019-05-17 10:56:05 Stack Overflow Discloses Digital Attack against Production Systems (lien direct)

Stack Overflow, a popular question and answer site for programmers, disclosed a digital attack in which bad actors accessed its production systems. Mary Ferguson, VP of Engineering at the company, publicly revealed the incident on 16 May. In a statement posted to Stack Overflow’s website, she explained that someone had obtained production-level access to the […]… Read More

The post Stack Overflow Discloses Digital Attack against Production Systems appeared first on The State of Security.

NetworkWorld.png 2019-05-17 10:56:00 Microsoft issues fixes for non-supported versions of Windows Server (lien direct)

Microsoft took the rare step of issuing security fixes for both the server and desktop versions of Windows that are long out of support, so you know this is serious.

The vulnerability (CVE-2019-0708) is in the Remote Desktop Services component built into all versions of Windows. RDP, formerly known as Terminal Services, itself is not vulnerable. CVE-2019-0708 is pre-authentication and requires no user interaction, meaning any future malware could self-propagate from one vulnerable machine to another.

CVE-2019-0708 affects Windows XP, Windows 7, Windows Server 2003, Windows Server 2008 R2, and Windows Server 2008. It does not impact Microsoft\'s newest operating systems; Windows 8 through 10 and Windows Server 2012 through 2019 are not affected.

To read this article in full, please click here

TechRepublic.png 2019-05-17 10:07:04 Your next business computer: HoloLens 2 (lien direct)

Microsoft takes mixed reality onto the shop floor.

InfosecIsland.png 2019-05-17 09:57:03 Privilege Escalation Flaws Impact Wacom Update Helper (lien direct)

Talos\' security researchers have discovered two security flaws in the Wacom update helper that could be exploited to elevate privileges on a vulnerable system.

ESET.png 2019-05-17 09:30:02 EternalBlue reaching new heights since WannaCryptor outbreak (lien direct)

Attack attempts involving the exploit are in hundreds of thousands daily

bleepingcomputer.png 2019-05-17 08:37:01 Over 12,000 MongoDB Databases Deleted by Unistellar Attackers (lien direct)

Over 12,000 unsecured MongoDB databases have been deleted over the last three weeks, with only a message left behind asking the owners of the databases to contact the cyber-extortionists to have the data restored. [...]

Blog.png 2019-05-17 07:50:00 DC-4 Vulnhub Walkthrough (lien direct)

Today we are going to take another boot2root challenge known as “DC-4”. The credit for making this VM machine goes to “DCAU” and it is another boot2root challenge in which our goal is to get root access to complete the challenge. You can download it from here Security Level: Beginner Penetrating Methodology Scanning Discovering Targets... Continue reading

The post DC-4 Vulnhub Walkthrough appeared first on Hacking Articles.

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter