Day: August 26, 2021

Microsoft Issues ProxyShell Advisory After Attacks Begin

Microsoft this week issued an advisory about three vulnerabilities referred to collectively as ProxyShell days after security researchers at a federal government cybersecurity agency warned that cybercriminals were actively trying to exploit them. The ProxyShell vulnerabilities that affect Microsoft Exchange servers were put on full display at this month’s Black Hat 2021 conference when Devcore …

Microsoft Issues ProxyShell Advisory After Attacks Begin Read More »

Boox tablets are welcome options in the growing oversize e-reader niche

When it comes to e-paper devices, the Kindle is of course the first brand people think of, though I’ve done my best to spread the Kobo and reMarkable gospel as well. Chinese e-reader maker Boox is a relatively new entrant to the space, and its devices are experimental but useful options in the niche market …

Boox tablets are welcome options in the growing oversize e-reader niche Read More »

New pipeline visualizes STEP and QIF data using augmented reality

Teodor Vernica examines product data virtually overlayed on a machined part using a NIST-developed pipeline for visualizing manufacturing and quality information using standard data formats. Credit: Teodor Vernica Imagine a manufacturer picking up a machined part and being able to see data on that part’s geometry, how it’s assembled, and its product manufacturing information (PMI). …

New pipeline visualizes STEP and QIF data using augmented reality Read More »

Big tech firms pledge more than $31 billion and 250,000 jobs to strengthen cybersecurity

The biggest tech companies in the US met at the White House Wednesday to discuss cybersecurity. Apple, Microsoft, Amazon, Google, and IBM all made pledges to strengthen the nation’s cybersecurity. The firms pledged more than $31 billion total, including 250,000 new jobs and various trainings. LoadingSomething is loading. CEO’s from the biggest tech companies in the US met …

Big tech firms pledge more than $31 billion and 250,000 jobs to strengthen cybersecurity Read More »

Elastic acquires Cmd to bring comprehensive cloud runtime security to customers

Elastic announced it has entered into a definitive agreement to acquire Cmd to give customers deep visibility into cloud workloads and perform expert detection and prevention on cloud-native data. Together with Elastic’s recent announcement to acquire build.security, Cmd will add runtime security capabilities to Elastic Limitless XDR, unifying security information and event management (SIEM), endpoint, …

Elastic acquires Cmd to bring comprehensive cloud runtime security to customers Read More »

If an employee is using Steelseries mouse or headphones, then hackers con take control of your network

A couple of days ago it was reported that the mice and keyboards of the technology company Razer could allow threat actors to access Windows 10 systems because their installer runs with SYSTEM privileges. As if that weren’t enough, it was confirmed that a SteelSeries bug could remove Windows 10 administrator rights by simply connecting …

If an employee is using Steelseries mouse or headphones, then hackers con take control of your network Read More »

Ragnarok ransomware operation shuts down and releases free decrypter

The Ragnarok (or Asnarök) ransomware gang shut down their operation today and released a free decryption utility to help victims recover their files. The free decrypter, hardcoded with a master decryption key, was released today on the gang’s dark web portal, where the group previously used to publish files from victims who refused to pay. …

Ragnarok ransomware operation shuts down and releases free decrypter Read More »

Botnets: What are They and Why do They Matter?

A botnet is a mashup of “robot” and “network.” Botnets are large-scale networks of infected computers controlled by one cyber attacker. Deploying malware, a hacker can harness remote control of thousands, even millions of individual devices, using their collective computing power to orchestrate a mass cyberattack from a centralized server.  An infected computer – or …

Botnets: What are They and Why do They Matter? Read More »

Comcast Business acquires Masergy to accelerate growth among global enterprise clients

Comcast Business announced it has signed an agreement to acquire Masergy – a Plano, Texas-based pioneer in software-defined networking (SDN) and cloud platforms for global enterprises. The acquisition accelerates Comcast Business’s increasing growth serving large and mid-size companies, particularly U.S.-based organizations with multi-site global operations. With over twenty years’ experience and innovation in managed network, …

Comcast Business acquires Masergy to accelerate growth among global enterprise clients Read More »

How to Identify an Email Hoax & What to do if You Fall Victim

Email hoaxes demand money by threatening recipients in various ways. The sender may claim that they will unleash a distributed denial of service (DDoS) attack on an organization, or reveal sensitive or embarrassing information about an individual. They may even threaten to physically harm someone. While the theme of the hoaxes may change, the threat …

How to Identify an Email Hoax & What to do if You Fall Victim Read More »

Trend Micro strengthens its market presence across AMEA with WeDiscover program

With a focus to strengthen its market presence across Asia Pacific, Middle East, and Africa (AMEA), Trend Micro announced its Channel Partner Demand Generation Program, WeDiscover. The evolved demand generation initiative provides a well-designed framework for channel partners to identify unexplored markets, investigate newer revenue streams and accelerate sales. The newly announced WeDiscover program is …

Trend Micro strengthens its market presence across AMEA with WeDiscover program Read More »

CISA publishes malware analysis reports on samples targeting Pulse Secure devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five malware analysis reports (MARs) related to samples found on compromised Pulse Secure devices. The U.S. CISA published five malware analysis reports (MARs) related to samples found on compromised Pulse Secure devices. “As part of CISA’s ongoing response to Pulse Secure compromises, CISA has analyzed five malware samples …

CISA publishes malware analysis reports on samples targeting Pulse Secure devices Read More »

(ISC)² changes its Security Congress event from hybrid to entirely virtual

(ISC)² announced the decision to change its Security Congress event from a hybrid experience to entirely virtual on the same dates, October 18-20, 2021. “The health and safety of all attendees, speakers, staff, volunteers and sponsors is our top priority,” said Clar Rosso, CEO, (ISC)². “With the continued prevalence of COVID-19, we knew this pivot …

(ISC)² changes its Security Congress event from hybrid to entirely virtual Read More »

Experts have revealed the cost of hacking accounts in social networks

 The most popular social networks and messengers for hacking attempts are VKontakte (VK), Instagram, Telegram and WhatsApp, while the price can vary from $10 to $2,300. This is stated in a study conducted by Bi.Zone. “We analyzed ads on the darknet from May 2020 to August 2021. In different months, the cost of hacking varied …

Experts have revealed the cost of hacking accounts in social networks Read More »

UK Cyber Security Council accepts membership applications from organizations

The UK Cyber Security Council announced that it has begun accepting applications from organizations for membership. Any organization with an interest in promoting, supporting and developing the cyber security profession is encouraged to apply. Member organizations will be able to nominate representatives with the relevant skills and experience to the Council’s committees, which are the …

UK Cyber Security Council accepts membership applications from organizations Read More »

Whitelisting vs. Blacklisting: Which Is Better?

Cyberattacks are becoming more sophisticated all the time. From phishing scams to ransomware and botnets, it’s hard to keep up with the latest methods that cybercriminals use.  It’s not just about stopping unwanted intruders from getting into a system, however. It’s also about protecting data that an intruder might be able to access if they …

Whitelisting vs. Blacklisting: Which Is Better? Read More »

BeaconEye – Hunts Out CobaltStrike Beacons And Logs Operator Command Output

BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each process for C2 activity. How it works BeaconEye will scan live processes or MiniDump files for suspected CobaltStrike beacons. In live process mode, BeaconEye optionally attaches itself as a debugger and will begin monitoring beacon …

BeaconEye – Hunts Out CobaltStrike Beacons And Logs Operator Command Output Read More »

Big gaming company leaks 365 million records from 1 million gamers’ phones

Researchers Noam Rotem and Ran Locar from security firm vpnMentor revealed the detection of a massive data breach belonging to EskyFun, a Chinese company dedicated to the development of mobile video games with iOS and Android systems. Apparently, the information was leaked due to the use of an insecure server to store these logs, not …

Big gaming company leaks 365 million records from 1 million gamers’ phones Read More »