Hackers


Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Retour à Sécurité

Security Affairs
Erreur: Il y a un erreur avec ce flux.

The Hackers News

    • 9 août 2022U.S. Sanctions Virtual Currency Mixer Tornado Cash for Alleged Use in Laundering
      The U.S. Treasury Department on Monday placed sanctions against crypto mixing service Tornado Cash, citing its use by the North Korea-backed Lazarus Group in the high-profile hacks of Ethereum bridges to launder and cash out the ill-gotten money. Tornado Cash, which allows users to move cryptocurrency assets between accounts by obfuscating their origin and destination, is estimated to have been

    • 9 août 2022The Truth About False Positives in Security
      TL;DR: As weird as it might sound, seeing a few false positives reported by a security scanner is probably a good sign and certainly better than seeing none. Let’s explain why. Introduction False positives have made a somewhat unexpected appearance in our lives in recent years. I am, of course, referring to the COVID-19 pandemic, which required massive testing campaigns in order to control the

    • 9 août 202210 Credential Stealing Python Libraries Found on PyPI Repository
      In what’s yet another instance of malicious packages creeping into public code repositories, 10 modules have been removed from the Python Package Index (PyPI) for their ability to harvest critical data points such as passwords and Api tokens. The packages « install info-stealers that enable attackers to steal developer’s private data and personal credentials, » Israeli cybersecurity firm Check

    • 9 août 2022Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions
      Over a dozen military-industrial complex enterprises and public institutions in Afghanistan and Europe have come under a wave of targeted attacks since January 2022 to steal confidential data by simultaneously making use of six different backdoors. Russian cybersecurity firm Kaspersky attributed the attacks « with a high degree of confidence » to a China-linked threat actor tracked by Proofpoint  …

    • 8 août 2022New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains
      A new botnet named Orchard has been observed using Bitcoin creator Satoshi Nakamoto’s account transaction information to generate domain names to conceal its command-and-control (C2) infrastructure. « Because of the uncertainty of Bitcoin transactions, this technique is more unpredictable than using the common time-generated [domain generation algorithms], and thus more difficult to defend

    • 8 août 2022The Benefits of Building a Mature and Diverse Blue Team
      A few days ago, a friend and I were having a rather engaging conversation that sparked my excitement. We were discussing my prospects of becoming a red teamer as a natural career progression. The reason I got stirred up is not that I want to change either my job or my position, as I am a happy camper being part of Cymulate’s blue team. What upset me was that my friend could not grasp the idea

    • 9 août 2022Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore
      A sophisticated scam-as-a-service operation dubbed Classiscam has now infiltrated into Singapore, more than 1.5 years after expanding to Europe. « Scammers posing as legitimate buyers approach sellers with the request to purchase goods from their listings and the ultimate aim of stealing payment data, » Group-IB said in a report shared with The Hacker News. The cybersecurity firm called the

    • 8 août 2022Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
      Facebook parent company Meta disclosed that it took action against two espionage operations in South Asia that leveraged its social media platforms to distribute malware to potential targets. The first set of activities is what the company described as « persistent and well-resourced » and undertaken by a hacking group tracked under the moniker Bitter APT (aka APT-C-08 or T-APT-17) targeting

    • 7 août 2022New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
      A new IoT botnet malware dubbed RapperBot has been observed rapidly evolving its capabilities since it was first discovered in mid-June 2022. « This family borrows heavily from the original Mirai source code, but what separates it from other IoT malware families is its built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai, »

    • 8 août 2022Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
      Twitter on Friday revealed that a now-patched zero-day bug was used to link phone numbers and emails to user accounts on the social media platform. « As a result of the vulnerability, if someone submitted an email address or phone number to Twitter’s systems, Twitter’s systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any, »

Dark Reading

WeLiveSecurity

Threatpost

E Hacking News | Latest Hacker News and IT Security News
Erreur: Il y a un erreur avec ce flux.

TechWorm
Aucun contenu.

GBHackers On Security

    • 9 août 2022Beware of New Malware that Distributed through Compromised YouTube Accounts
      Cyble Research Labs (CRL) specifies that the stealers such as PennyWise and RedLine are increasing and spreading through YouTube campaigns. In their analysis, they have identified more than 5,000 PennyWise Stealer executable samples in the last 3 months alone. The ‘PennyWise stealer’ is an evasive info stealer leveraging YouTube to infect users. It is built […] The post Beware of New Malware …

    • 8 août 2022Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes
      Masscan – Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second.  Masscan is an Internet-scale port scanner, useful for large-scale surveys of the Internet, or of internal networks. While the default transmit rate is only 100 packets/second, it can optional go as fast as 25 million […] The post Masscan – World …

    • 8 août 2022Stegomalware Surge – Attackers Using File, Video, Image & Others To Hide Malware
      A surge in the number of Stegomalware instances using Steganography has been reported recently by the cybersecurity experts at Cyble Research Labs.  Steganography is mainly a method that entails concealing data inside of a normal message or file in a specific manner. The type of file it uses:- Text  Image Video There is no doubt […] The post Stegomalware Surge – Attackers Usi …

    • 8 août 2022Hackers Exploiting High-Severity Zimbra Flaw to Steal Email Account Credentials
      Zimbra CVE-2022-27824 has been added to the CISA’s “Known Exploited Vulnerabilities” catalog as a new vulnerability. Hackers are actively exploiting it in attack activities, which indicates it is active in the hacking community. Unauthenticated threat actors are able to steal email account credentials in clear-text by exploiting this high-severity vulnerability. Using Zimbra Coll …

    • 8 août 2022A New Remote Access Trojan Dubbed Woody Rat Delivered as Office Documents
      The Threat Intelligence team of Malwarebytes discovered a new Remote Access Trojan called ‘Woody Rat’ that targets Russian entities by using lures in archive file format and Office documents leveraging the Follina vulnerability. Malwarbytes researchers stated that the threat actors aim to target a Russian aerospace and defense entity called ‘OAK’. Remote Access Trojan – […] The post A …

Cyber Defense Magazine

blackMORE Ops

    • 11 juin 2022Ubiquiti Dream Machine (UDM) – unable to connect to NBN
      I don’t want the NBN ISP router running anymore and use Ubiquiti Dream Machine (UDM) instead. But when I try to remove ISP Router it and direct connect UDM to NBN, the connection fails. UDM is set for DHCP, only other options are PPOE (which requires credentials) and Static IP (I have a dynamic IP). … The post Ubiquiti Dream Machine (UDM) – unable to connect to NBN appeared first …

    • 14 avril 2022Quick Snap Cheat Sheet for Ubuntu
      Snaps are app packages for desktop, cloud and IoT that are easy to install, secure, cross‐platform and dependency‐free. Snaps are discoverable and installable from the Snap Store, the app store for Linux with an audience of millions. This post is a quick snap cheat sheet for Ubuntu that contains the commonly used snap commands, fixes … The post Quick Snap Cheat Sheet for Ubuntu appeared firs …

    • 27 janvier 2022Find Related Domains and Subdomains with assetfinder
      assetfinder is a Go-based tool to find related domains and subdomains that are potentially related to a given domain from a variety of sources including Facebook, ThreatCrowd, Virustotal and more. assetfinder uses a variety of sources including those in the infosec space and social networks which can give relevant info: crt.sh certspotter hackertarget threatcrowd wayback … The post Find Rela …

    • 30 novembre 2021Best ways to destroy Microsoft Windows
      I take no responsibility for these collection of best ways to destroy Microsoft Windows! The post Best ways to destroy Microsoft Windows appeared first on blackMORE Ops. …

Hacker Ritz

    • 11 janvier 2019New Wifi Hack Method, Easy and Workable on WPA/WPA2 Securities.
      Looking for how to hack WiFi password OR WiFi hacking software?Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers.Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens ‘Atom’ Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols wit …

    • 7 janvier 2019Bitcoin And Cryptocurrency Litigation : A Game Of Future
      Bitcoin and other cryptocurrencies are gaining more attention as days pass. Aside from the advantages that cryptocurrencies have like anonymity and easy international transactions, people are enticed by the fact that it can become a good investment. Apart from trading bitcoins for cash, you can also use bitcoins to buy gift cards, book flights, and hotels, buy furnitu …

    • 20 novembre 2018 Facebook Bug Could Have Exposed Your Private Information
      Another security vulnerability has been reported in Facebook that could have allowed attackers to obtain certain personal information about users and their friends, potentially putting the privacy of users of the world’s most popular social network at risk.Discovered by cybersecurity researchers from Imperva, the vulnerability resides in the way Facebook search feature displays results for entered …

    • 20 novembre 2018Instagram Bug : Passwords are in Plain Text
      Instagram has recently patched a security issue in its website that might have accidentally exposed some of its users’ passwords in plain text.The company recently started notifying affected users of a security bug that resides in a newly offered feature called « Download Your Data » that allows users to download a copy of their data shared on the social media platform, including photos, comments, p …

    • 19 mai 2018Inside one of the largest hacking conferences in Russia
      Inside one of the largest hacking conferences in RussiaABC NewsWATCHHackers put their skills on display in Moscow conferenceEmailHundreds of aspiring hackers in Moscow faced off against one another earliest this week in different challenges.The event, called Positive Hack Days, is organized by the cybersecurity firm Positive Technologies. More than 4,000 people attended the cybersecurity conferenc …