What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-09-18 05:29:22 United States government files civil lawsuit against Edward Snowden (lien direct)

The United States government sued Edward Snowden, the former CIA employee and NSA contractor, to block payment for his book, Permanent Record. The US DoJ filed a lawsuit against Edward Snowden to prevent the former CIA employee and National Security Agency contractor from receiving the payment for his book, Permanent Record. According to the civil […]

The post United States government files civil lawsuit against Edward Snowden appeared first on Security Affairs.

The_Hackers_News.png 2019-09-18 03:29:53 The Definitive RFP Templates for EDR/EPP and APT Protection (lien direct)

Advanced Persistent Threats groups were once considered a problem that concerns Fortune 100 companies only. However, the threat landscape of the recent years tells otherwise-in fact, every organization, regardless of vertical and size is at risk, whether as a direct target, supply chain or collateral damage. The vast majority of security decision-makers acknowledge they need to address the

Threat
bleepingcomputer.png 2019-09-18 02:28:29 400 Million Medical Radiological Images Exposed on the Internet (lien direct)

An analysis of medical image storage systems exposed to the public web reveals that almost 600 servers in 52 countries are completely unprotected against unauthorized access. [...]

The_Hackers_News.png 2019-09-18 02:21:57 Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions (lien direct)

A cybersecurity researcher recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin-one of the most popular applications for managing the MySQL and MariaDB databases. phpMyAdmin is a free and open source administration tool for MySQL and MariaDB that\'s widely used to manage the database for websites created with WordPress, Joomla, and many other

Tool,Vulnerability
WiredThreatLevel.png 2019-09-17 23:42:04 A Massive GM Strike, a LastPass Vulnerability, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

itsecurityguru.png 2019-09-17 22:06:57 Fortune Favours The Bold. (lien direct)

By: Lisa Ventura, CEO & Founder, UK Cyber Security Association and a finalist in the Security Leader/ Mentor in the Security Serious Unsung Heroes Awards 2019 I have been in the cyber security industry for over ten years, and my career did not go in a straightforward linear line. It has had many twists and […]

The post Fortune Favours The Bold. appeared first on IT Security Guru.

WiredThreatLevel.png 2019-09-17 21:57:51 A Password-Exposing Bug Was Purged From LastPass (lien direct)

Google Project Zero found and reported a flaw in the widely used password manager.

SecurityAffairs.png 2019-09-17 20:06:39 Australia is confident that China was behind attack on parliament, political parties (lien direct)

Australia ‘s intelligence is sure that China is behind the cyberattacks that hit its parliament and political parties, but decided to not publicly accuse it. According to the Reuters agency, Australia’s intelligence has evidence that the attacks that hit its parliament and political parties were orchestrated by China. Anyway the Australian government decided to not […]

The post Australia is confident that China was behind attack on parliament, political parties appeared first on Security Affairs.

TechRepublic.png 2019-09-17 20:04:45 How to keep a remote team engaged during meetings (lien direct)

During meetings, it can be a challenge to keep remote team members, lone contributors, and home office staff synchronized and productive. Follow these leadership tips.

TechRepublic.png 2019-09-17 19:34:35 How to join an existing Slack workspace (or create one of your own) (lien direct)

If you haven\'t already jumped on the Slack bandwagon, prepare yourself, as it is showing no signs of slowing down. Find out how to join a Slack workspace or create your own.

ZDNet.png 2019-09-17 19:19:00 US sues Edward Snowden over new book (lien direct)

US claims Snowden broke the non-disclosure agreements he signed with the NSA and CIA. The US is now seeking to keep all the profits from Snowden\'s new book, launched today.

TechRepublic.png 2019-09-17 18:58:46 How to configure the time zone on Linux (lien direct)

Having a correct time zone configured on your Linux data center servers could mean the difference between software running properly or not.

bleepingcomputer.png 2019-09-17 18:56:14 Windows 10 With Chinese IME Installed Causing High CPU Usage (lien direct)

Recent Windows 10 updates are causing the Input Method Editor (IME) for Chinese languages to become unresponsive or use a lot of CPU. [...]

TechRepublic.png 2019-09-17 18:25:30 "You can\'t moonlight" your way to CI/CD success, declares CircleCI CEO (lien direct)

There are many ways to approach software development automation--find out why CircleCI\'s CEO is confident in its approach.

TechRepublic.png 2019-09-17 18:00:17 Australian not-for-profit\'s encryption solution to privacy breaches (lien direct)

An Australian open source foundation is introducing a new approach to encryption called splintering, TechRepublic\'s Karen Roby talks with the Tide Foundation\'s co-founder.

TechRepublic.png 2019-09-17 17:54:48 Why organizations need to optimize their employees\' messaging tools for the workplace (lien direct)

If the right business apps for mobile messaging aren\'t accessible or effective, users will turn to consumer apps, which can be insecure and limit productivity, says a new report from enterprise messaging platform NetSfere.

TechRepublic.png 2019-09-17 17:43:22 DNS amplification attacks increase by 1,000% since 2018 (lien direct)

Researchers said a new defense system is fueling a wave of DNS amplification attacks.

TechRepublic.png 2019-09-17 17:40:16 How to protect yourself against web miners (lien direct)

While using your browser to mine cryptocurrencies for profit, web miners can chew up power from your computer, says a new report from Kaspersky.

TechRepublic.png 2019-09-17 17:10:29 Gartner Hype Cycle: 5 key emerging trends (lien direct)

TechRepublic\'s Karen Roby talks with a Gartner analyst about tech trends, including advanced AI analytics, sensing immobility, and more. He also discusses deepfakes and low-Earth orbit satellites.

TechRepublic.png 2019-09-17 16:57:47 Google, Netflix, and Apple remain most desirable places to work, according to survey (lien direct)

airbnb, SpaceX and hulu are at the top of the list of private companies along with two fintech firms.

bleepingcomputer.png 2019-09-17 16:21:50 Beware of Venmo Scams Targeting Users via Text Messages (lien direct)

A local police department in the U.S. are warning of a wave of phishing scams targeting users Venmo mobile payment service with text messages that direct to a fake website. [...]

ZDNet.png 2019-09-17 16:11:39 Arrest made in Ecuador\'s massive data breach (lien direct)

Ecuador police arrest director of data analytics firm that leaked the personal records of most of Ecuador\'s population.

Data Breach
TechRepublic.png 2019-09-17 16:01:29 How to avoid the dreaded Video4Linux flaw in Android (lien direct)

With Google dragging their feet on the fix for Video4Linux, you might consider revoking camera permissions for certain apps.

no_ico.png 2019-09-17 15:59:49 Police Officers Raise Concerns About \'Biased\' AI Data – Comments (lien direct)

Police officers have raised concerns about using “biased” artificial-intelligence tools, a report commissioned by one of the UK government’s advisory bodies reveals. The study warns such software may “amplify” prejudices, meaning some groups could become more likely to be stopped in the street and searched.

The ISBuzz Post: This Post Police Officers Raise Concerns About ‘Biased’ AI Data – Comments appeared first on Information Security Buzz.

Chercheur.png 2019-09-17 15:59:02 Man Who Hired Deadly Swatting Gets 15 Months (lien direct)

An Ohio teen who recruited a convicted serial swatter to fake a distress call that ended in the police shooting an innocent Kansas man in 2017 has been sentenced to 15 months in prison.

securityintelligence.png 2019-09-17 15:55:21 Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk (lien direct)

Reading Time: 4 minutes Traditional end-of-life procedures for corporate mobile devices can\'t scale to BYOD. Learn how to avoid the risks that can occur during personal device disposal.

The post Mobile Device Disposal: Best Practices for Burying BYOD Endpoints Without Risk appeared first on Security Intelligence.

ZDNet.png 2019-09-17 15:49:00 If you are a Restaurant Depot customer, don\'t open that phishing email (lien direct)

Reports suggest the potential compromise of a mailing list with malicious invoices landing in client inboxes.

TechRepublic.png 2019-09-17 15:40:28 Oracle\'s new digital assistant sounds suspiciously like Clippy (lien direct)

Oracle aims to simplify the use of their Cloud applications through digital assistants, though this plan resembles a certain loathed paperclip in function, if not form.

no_ico.png 2019-09-17 15:38:53 125 New Flaws Found In Routers And NAS Devices From Popular Brands (lien direct)

In its latest study titled “SOHOpelessly Broken 2.0,” Independent Security Evaluators (ISE) discovered a total of 125 different security vulnerabilities across 13 small office/home office (SOHO) routers and Network Attached Storage (NAS) devices, likely affecting millions, The Hacker News reported.

The ISBuzz Post: This Post 125 New Flaws Found In Routers And NAS Devices From Popular Brands appeared first on Information Security Buzz.

no_ico.png 2019-09-17 15:04:25 15,000 Webcams Exposed Online; Major Manufacturers (lien direct)

Security researcher has discovered that 15,000 private webcams around the globe are exposed and accessible by anyone with an internet connection.  They appear to have been installed by both home users and businesses in multiple countries across Europe, the Americas and Asia. They include devices from major manufacturers, including: AXIS net cameras; Cisco Linksys webcam; IP …

The ISBuzz Post: This Post 15,000 Webcams Exposed Online; Major Manufacturers appeared first on Information Security Buzz.

no_ico.png 2019-09-17 14:59:26 (Déjà vu) How To Block DDoS Attacks Using Automation (lien direct)

DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of successfully mitigating attacks. In this article, we\'ll explore the five ways, listed below, that automation can significantly improve response times during a DDoS attack, while assessing the means to block such attacks. Response time is critical for every …

The ISBuzz Post: This Post How To Block DDoS Attacks Using Automation appeared first on Information Security Buzz.

SecurityAffairs.png 2019-09-17 14:42:43 Experts warn of the exposure of thousands of Google Calendars online (lien direct)

The news is shocking, thousands of Google Calendars are leaking private information posing a severe threat to the privacy of the users. Thousands of Google Calendars are leaking private information online threatening the privacy of the users. Google Calendar has more than q billion users that can potentially expose their private affairs due to the […]

The post Experts warn of the exposure of thousands of Google Calendars online appeared first on Security Affairs.

Threat
Blog.png 2019-09-17 14:36:20 (Déjà vu) Silky-CTF: 0x02 Vulhub Walkthrough (lien direct)

Today we will be solving a boot2root lab from Vulnhub called SILKY-CTF: 0x02. This lab is a good way to keep your penetration testing skills on point while getting some variety. Download it from HERE Level: Easy-Intermediate Task: Boot to Root (flag.txt) Penetration Methodologies Scanning Netdiscover Nmap Enumeration Directory Scanning using DIRB Giving Credentials For... Continue reading

The post Silky-CTF: 0x02 Vulhub Walkthrough appeared first on Hacking Articles.

ESET.png 2019-09-17 14:33:06 Nearly all of Ecuador\'s citizens caught up in data leak (lien direct)

The humongous collection of extensive personal details about millions of people could be a gold mine for scam artists

The post Nearly all of Ecuador\'s citizens caught up in data leak appeared first on WeLiveSecurity

TechRepublic.png 2019-09-17 14:19:32 Why artificial intelligence leads to job growth (lien direct)

IT workforces should prepare for more--not less--job opportunities.

grahamcluley.png 2019-09-17 14:19:04 Medical images and details of 24.3 million patients left exposed on the internet (lien direct)

Researchers discover that confidential images of X-rays, CT and MRI scans related to millions of patients has been left unprotected on hundreds of servers used by health providers worldwide.

TechRepublic.png 2019-09-17 14:10:08 Windows Defender Application Control: The enterprise alternative to S-Mode (lien direct)

Microsoft\'s Windows management tools can lock PCs down to only use trusted software.

TechRepublic.png 2019-09-17 14:09:20 Top 5 soft skills you should know (lien direct)

Managing your time, being adaptable, and effectively communicating are just some of the ways you can succeed at work. Tom Merritt lists five important soft skills worth knowing.

WiredThreatLevel.png 2019-09-17 14:00:00 Got What It Takes to Compete in Speed Climbing? (lien direct)

Let\'s compute the power output required to sprint up a vertical wall.

itsecurityguru.png 2019-09-17 13:49:33 Cyrptojacking enabled by Skidmap malware on Linux machines. (lien direct)

Researchers have discovered a sophisticated cryptomining program that uses loadable kernel modules (LKMs) to help infiltrate Linux machines, and hides its malicious activity by displaying fake network traffic stats. Dubbed Skidmap, the malware can also grant attackers backdoor access to affected systems by setting up a secret master password that offers access to any user account […]

The post Cyrptojacking enabled by Skidmap malware on Linux machines. appeared first on IT Security Guru.

Malware
itsecurityguru.png 2019-09-17 13:48:44 Sophisticated email banking phishing scam hit NAB customers. (lien direct)

NAB customers have once again been targeting in an email phishing scam capable of emptying their accounts. The scam uses the display name “National Australia Bank” and informs recipients their account has been “restricted” due to “irregular activity”.  Victims are told to click on a provided link to “restore” their account – doing so will […]

The post Sophisticated email banking phishing scam hit NAB customers. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-17 13:47:53 German recipients targeted by Fake resume emails to spread Ordinypt Wiper. (lien direct)

Attention German HR departments: You may want to cross off a certain “Eva Richter” from your list of employment candidates. Especially because her so-called résumé actually infects recipients with the destructive Ordinypt Wiper malware, according to a new report. The fake résumé phishing campaign began on Sept. 11 and is specifically aimed at German-speaking employers, Bleeping Computer reported this […]

The post German recipients targeted by Fake resume emails to spread Ordinypt Wiper. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-17 13:47:07 (Déjà vu) The Guardian\'s Whistleblowing Site Targeted by Phishing Attacks. (lien direct)

The Guardian’s SecureDrop whistleblower submission site was targeted with a phishing page that attempted to harvest the unique “codenames” for sources who submitted information using the service. In addition, this phishing page promoted an Android app that allowed attackers to perform a variety of malicious activity on a victim’s device. SecureDrop is a service that media […]

The post The Guardian\'s Whistleblowing Site Targeted by Phishing Attacks. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-17 13:46:18 (Déjà vu) Ecuador\'s Population in Risk of Leaked Data. (lien direct)

An unsecured database containing 18GB of data exposed more than 20 million records, most of which held details about Ecuadorian citizens. Researchers have discovered a misconfigured database containing 18GB of information, including 20.8 million personal records. Most of the individuals affected are in Ecuador, which to put the leak into context, has a population of […]

The post Ecuador\'s Population in Risk of Leaked Data. appeared first on IT Security Guru.

TechRepublic.png 2019-09-17 13:41:22 33% of executives don\'t trust their organization to protect employee data (lien direct)

The volume of data processed in the enterprise is rapidly increasing, though strategies to secure data, including biometrics, are subject to technical and legal issues.

SecurityWeek.png 2019-09-17 13:37:13 AMD Radeon Driver Flaw Leads to VM Escape (lien direct)

A vulnerability in the AMD ATI Radeon ATIDXX64.DLL driver could be triggered from within a VMware guest to execute code on the host, Cisco Talos warns.

read more

Vulnerability
bleepingcomputer.png 2019-09-17 13:18:17 TFlower Ransomware - The Latest Attack Targeting Businesses (lien direct)

The latest ransomware targeting corporate environments is called TFlower and is being installed on networks after attackers hack into exposed Remote Desktop services. [...]

Ransomware,Hack
TechRepublic.png 2019-09-17 13:15:34 Millennials and boomers agree on mainframe innovation, security (lien direct)

BMC polled more than 1,000 people to get their thoughts on the mainframe and potential problem spots.

ZDNet.png 2019-09-17 13:11:43 Cyberattackers now pose as business executives to secure security certificates (lien direct)

Certificates can be used to sign-off on malicious payloads and can fetch a lucrative price on the black market.

globalsecuritymag.png 2019-09-17 13:00:38 New IRONSCALES Research Finds Microsoft ATP Takes Up to 250 Days to Create Phishing Attack Signatures (lien direct)

IRONSCALES revealed that Microsoft Office 365 Advanced Threat Protection (ATP), the primary email security filtering service for Office 365 users, can take up to 250 days to create an email phishing attack signature and make it available to enterprise technical staff. Over the course of 3 months, a representative sample size of 1000 malicous emails containing links or attachments found that ATP took between 6 and 250 days from the time an email phishing attack was first reported until the (...) - Investigations

Threat
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter