Skip to main content

Search

Items tagged with: cybersecurity


 
#cia #cybersecurity #security #spy #spying #espionage #unitedstates #usa #iran #china


 
Bild/Foto✯ CyberguerrillⒶ ✯ wrote the following post Thu, 18 Apr 2019 00:01:26 +0200

Drupal Releases Core CMS Updates to Patch Several Vulnerabilities https://thehackernews.com/2019/04/drupal-security-update.html

#CgAn
#ICC
#cybersecurity
#Drupal
#Drupalhacking


 

OilRig (APT34) hacking tools and victim data leaked


Few weeks ago a group of Iranian hackers called "Lab Dookhtegan" started leaking information about the operations of APT34 / #OilRig / #HelixKitten which supposedly would be the Iranian Ministry of Intelligence. The leaks started on March 26 when #Dookhtegan started dropping archive containing source code on Telegram. The initial leak has recieved low coverrage so far and the Telegram group where the leak first appeard only has about 30 members.




Several cyber-security experts have already confirmed the authenticity of these tools.

Besides source code for the above tools, Dookhtegan also leaked on the Telegram channel data taken from victims that had been collected in some of APT34's backend command-and-control (C&C) servers.

Quick overview the leak and some IOC in Misterofch0c blog.

Pieces of code are available on Github.

#APT34, #Iran, #dataleak, #cybersec, #cybersecurity


 
Internet Security Days 2019: Countdown für den Call for Papers läuft #CyberSecurity #ISD #InternetSecurityDays #Sicherheit


 
EU-Parlament: Weg frei für Kompetenzzentrum Cybersicherheit #Cybersecurity #EU


 
Matrix.org publishes timeline after security breach:

https://matrix.org/blog/2019/04/11/security-incident/

– the attacker exploited vulnerabilities in Jenkins
– the attacker had full database access, including access to unencrypted content like private messages, passwords hashes, access tokens
– Matrix.org recommends changing your password (including NickServ password)

#matrix #breach #infosec #cybersecurity #security


 
Automatic Certificate Management Environment (ACME) is officially RFC 8555 now:

https://tools.ietf.org/html/rfc8555

"This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation."

#acme #certificate #ca #letsencrypt #infosec #cybersecurity #security #https #rfc8555


 
Bild/Foto
forest-flower.com/university/note.php?timestamp=2019-04-01+05%3A23%3A00

#cybersecurity


 
Untersuchung: Mangelhafte IT-Sicherheit bei Ärzten und Apotheken #Arztpraxen #Cybersecurity #Darknet #Gesundheitswesen #Passwörter #Sicherheit


 
Facebook–security team spots 146GB dataset containing 540 million records of Facebook users:

https://www.upguard.com/breaches/facebook-user-data-leak

– dataset includes comments, likes, reactions, account names, Facebook IDs, and more
– origin of the leak is the Mexico-based media company Cultura Colectiva that develops third-party apps
– a second dataset contains 22,000 cleartext passwords from 2014

#facebook #leak #culturacolectiva #privacy #infosec #cybersecurity #security


 

Chinese woman attempted to infiltrate Trump's Palm Beach residence to speak with member of the family


Despite my rather confusing headline, and regarding the items she brought with her, I would rather say that was told to install spyware in his residence to wiretap him. Remember what he was speaking about shortly after the inauguration?, that Obama was wiretapping him? I guess he confused Obama for the Chinese. 😁
On second thought, maybe they didn't want to try to wiretap him, but steal data either for ransom or to take revenge on what they did to their economy by pulling pressure on Huawei. I don't know, to be honest, we will have to see how this proceeds, now that they (fortunately) caught her in the act.

Watch the video here:
#US #USA #MarALago #Trump #DonaldTrump #Infiltration #Burglary #Malware #Espionage #China #Chinese #Florida #Huawei #CyberSecurity #Hacking


 
"We fully [grin]trust our registrars, so we don't have a registry lock." #IETF104 #cybersecurity


 
#cybersecurity #computer #security #dataleak


 
https://www.teiss.co.uk/news/european-union-cybersecurity-act/

#cybersecurity #EU #GDPR #ENISA #IoT #privacy #encryption #technology
European Union’s new Cybersecurity Act: All you need to know


 
#cybersecurity #computer #security

A tool to verify if your #password was leaked -- without leaking it!

YouTube: Have You Been Pwned? - Computerphile (Computerphile)


 
How #BlackBerry transformed from a ‘basket of parts’ into a money-making #cybersecurity company | Financial Post


 
WordPress 5.1–critical exploit chain that enables an unauthenticated attacker to gain remote code execution on any WordPress installation:

https://blog.ripstech.com/2019/wordpress-csrf-to-rce/

– exploit is possible due to a CSRF vulnerability in comment forms
– fixed in WordPress 5.1.1

#wordpress #rce #csrf #wordpress5 #infosec #cybersecurity #security


 
WordPress 5.1–critical exploit chain that enables an unauthenticated attacker to gain remote code execution on any WordPress installation:

https://blog.ripstech.com/2019/wordpress-csrf-to-rce/

– exploit is possible due to a CSRF vulnerability in comment forms
– fixed in WordPress 5.1.1

#wordpress #rce #csrf #wordpress5 #infosec #cybersecurity #security


 
#dataleak #computer #security #cybersecurity #privacy #spam
800+ Million Emails Leaked Online by Email Verification Service


 
These #Ethical #Hacking #Courses #Teach the #White #Hat #Skills #Employers Need
- #FutureSociety #cybersecurity #databreach #hackers #onlinesecurity #whitehathacker
Bild/Foto
Information has always been a valuable commodity. As such, human beings have always tried to steal it. But while information theft is nothing new, modern technology has changed the game. Not only has the digital revolution made the collection and storage of mass quantities of data possible, but it’s also made these vast stores of information easier for hackers to plunder.
https://futurism.com/ethical-hacking-courses-white-hat/


 
These #Ethical #Hacking #Courses #Teach the #White #Hat #Skills #Employers Need
- #FutureSociety #cybersecurity #databreach #hackers #onlinesecurity #whitehathacker
Bild/Foto
Information has always been a valuable commodity. As such, human beings have always tried to steal it. But while information theft is nothing new, modern technology has changed the game. Not only has the digital revolution made the collection and storage of mass quantities of data possible, but it’s also made these vast stores of information easier for hackers to plunder.
https://futurism.com/ethical-hacking-courses-white-hat/


 
They say they want your phone number for an added layer of "security" but they fucking lie to you and end up selling your phone number and other data to 3rd parties.
This is what I've been saying since forever. And he provides more details. Once you provide your phone number to FaceBook, FaceBook will use your ph
... show more


 
#BlackBerry #Cylance Wins #Cybersecurity Excellence #Awards in Five Categories

Best #Cybersecurity Company, Most Innovative Cybersecurity Company, Endpoint Detection and Response, Endpoint Security, and Best Cybersecurity Podcast.


 
Ex Moassad Mi6 NSA employees forming private spy agencies out of control

With “out of control” people mean – not serving the public interest/society – not servings justice but whoever pays more – maybe not even conducting a crime but maybe preparing a crime like the Khashoggi killing.

It’s funny – how Israeli spies always assume the whole world hates Israel and try to frame their opponents like this – one spy now got caught.

... show more


 
2. IT-Sicherheitstag in Darmstadt: Schutz ohne Ablaufdatum #Cybersecurity #IT-Sicherheit #IT-Sicherheitstag


 

Why IoT devices pose a bigger cybersecurity risk than most realize


#bigger #cybersecurity #devices #iot #most #pose #realize #risk #why


 

Once hailed as unhackable, blockchains are now getting hacked


Early last month, the security team at Coinbase noticed something strange going on in Ethereum Classic, one of the cryptocurrencies people can buy and sell using Coinbase’s popular exchange platform. Its blockchain, the history of all its transactions, was under attack.

An attacker had somehow gained control of more than half of the network’s computing power and was using it to rewrite the transaction history. That made it possible to spend the same cryptocurrency more than once—known as “double spends.” The attacker was spotted pulling this off to the tune of $1.1 million.

Blockchains are particularly attractive to thieves because fraudulent transactions can’t be reversed as they often can be in the traditional financial system. Besides that, we’ve long known that just as blockchains have unique security features, they have unique vulnerabilities. Marketing slogans and headlines that called the technology “unhackable” were dead wrong.

But the more complex a blockchain system is, the more ways there are to mak... show more


 
Once hailed as unhackable, blockchains are now getting hacked

http://flip.it/GU9cg1 #Bitcoin #Ethereum #cybersecurity #blockchain #smartcontracts #cryptocurrency


 
Well, that was the POINT of them, wasn't it?!
#InternetStuff
Once hailed as unhackable, blockchains are now getting hacked

http://flip.it/GU9cg1 #Bitcoin #Ethereum #cybersecurity #blockchain #smartcontracts #cryptocurrency


 
Bonjour tout le monde, je suis #nouveauici. Mes centres d'intérêt sont #anti-propagande, #consumérisme-minimaliste, #cyberactivism, #cybersecurity, #cyberwarfare, #france, #fraternité, #gilet-jaune, #giletjaune, #hack, #liberté, #revolution et #égalité.

Ici suite au censure de plus en plus présente que nous rencontrons sur Facebook et autre réseaux sociaux mainstream, ne nous laissons pas faire ! Nous avons le pouvoir de faire changer les choses. Même si c'est un petit changement, chacun participe à son niveau c'est ce qui est important. Pour une France juste ! Au plaisir,


 
Bonjour tout le monde, je suis #nouveauici. Mes centres d'intérêt sont #anti-propagande, #consumérisme-minimaliste, #cyberactivism, #cybersecurity, #cyberwarfare, #france, #fraternité, #gilet-jaune, #giletjaune, #hack, #liberté, #revolution et #égalité.

Ici suite au censure de plus en plus présente que nous rencontrons sur Facebook et autre réseaux sociaux mainstream, ne nous laissons pas faire ! Nous avons le pouvoir de faire changer les choses. Même si c'est un petit changement, chacun participe à son niveau c'est ce qui est important. Pour une France juste ! Au plaisir,