Jun 20 2019

Seth : Perform A MitM Attack From RDP Connections

Category: MitM AttackDISC @ 10:04 pm

Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials.

Source: Seth : Perform A MitM Attack From RDP Connections



Enter your email address:

Delivered by FeedBurner

Tags: MitM Attack, RDP connection


Jun 19 2019

Hackers Disguise New JavaScript-Based Trojan as Game Cheat

Category: TrojanDISC @ 10:06 am

Researchers discovered a new JavaScript-based and modular downloader Trojan camouflaged and distributed to targets in the form of game cheats via websites owned by its developers.

Source: Hackers Disguise New JavaScript-Based Trojan as Game Cheat

Worst JavaScript Flaws That Hackers Love To Abuse


Jun 17 2019

U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert

Category: Malware,Security IncidentDISC @ 8:57 am

The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep.

Source: U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert

 
How to check if a target is vulnerable to the new RDP vulnerability (BlueKeep).


Enter your email address:

Delivered by FeedBurner

Tags: BlueKeep, RDP vulnerability, Remote Code Execution


Jun 15 2019

Chinese spies stole NSA hacking tools, report finds

Category: Hacking,Security ToolsDISC @ 4:01 pm

In the report, the cybersecurity company Symantec claims that a Chinese hacker group associated with Chinese government intelligence conducted a hacking campaign using a tool that at the time was only known to be the property of the NSA.

Source: Chinese spies stole NSA hacking tools, report finds


Enter your email address:

Delivered by FeedBurner


Jun 12 2019

Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps

Category: hipaa,Security BreachDISC @ 1:52 pm

Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it.

Source: Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps



Healthcare privacy and security


Enter your email address:

Delivered by FeedBurner

Tags: Healthcare privacy and security, medical device breaches, medical device threats, medical device vulnerabilities


Jun 11 2019

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Category: Security ToolsDISC @ 2:03 pm

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords.

Source: Zydra : Password Recovery Tool & Linux Shadow File Cracker




 Subscribe in a reader

Tags: password recovery, zydra


Jun 10 2019

A guide to phishing emails and how they work -TEISS® : Cracking Cyber Security

Category: PhishingDISC @ 6:32 pm

Security Awareness writer Keil Hubert describes a mysterious email message that could well have been an insidiously clever spear phishing attack.

Source: A guide to phishing emails and how they work -TEISS® : Cracking Cyber Security



This is what happens when you reply to spam email


 Subscribe in a reader


Jun 09 2019

From phish to network compromise in two hours: How Carbanak operates

Category: Hacking,Phishing,Security BreachDISC @ 2:21 pm

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here’s a detailed analysis by Bitdefender of an attack on one bank.

Source: From phish to network compromise in two hours: How Carbanak operates




Jun 02 2019

How to Download a Windows 10 ISO By Impersonating Other Devices

Category: Windows SecurityDISC @ 3:50 pm

Microsoft allows you to download the latest Windows 10 ISOs from their site, but only if you are using a non-Windows browser user agent. This article will explain how to change your user agent in Chrome and Edge so you can download an ISO instead of using the Windows 10 Media Creation Tool.

Source: How to Download a Windows 10 ISO By Impersonating Other Devices








 Subscribe in a reader

Tags: Microsoft Windows Security, Windows 10 ISO


Jun 01 2019

A dive into Turla PowerShell usage | WeLiveSecurity

Category: MalwareDISC @ 3:37 pm

ESET researchers show how, in a bid to evade detection, the Turla group leverages PowerShell scripts to inject malware directly into memory.

Source: A dive into Turla PowerShell usage | WeLiveSecurity








 Subscribe in a reader


Jun 01 2019

Russian military plans to replace Windows with Astra Linux

Category: Linux Security,Windows SecurityDISC @ 10:09 am

The Russian army seems to be in the process of replacing the Windows system with the Debian-based Linux distribution Astra Linux.

Source: Russian military plans to replace Windows with Astra Linux



Look @ Astra Linux ® 2.12 – Russian Debian – Fly Desktop




 Subscribe in a reader

Tags: Astra Linux, Russian army


May 31 2019

Watch Cyber Security Is It Your Time For Identity theft, Yet?

Category: Identity TheftDISC @ 6:05 am

This course is about helping you to survive an identity theft, attempt to educate you on how to prevent a direct identity theft attempt, know what to look for and how not be the one who helped the thief take your personal information. With your new found knowledge take it to your family so they can avoid years of headaches.

Source: Watch Cyber Security Is It Your Time For Identity theft, Yet? | Prime Video


 Subscribe in a reader

Tags: identity fraud, Identity Theft, identity theft and data security breaches, Identity Theft Countermeasures, Stopping Identity Theft


May 31 2019

Secure, Share & Edit All Your Files From Anywhere | Box

Category: Cloud computing,File Security,Information PrivacyDISC @ 5:07 am

Secure File Sharing – 256-bit AES encryption

Secure File Sharing: Easily and securely share files—even sensitive or confidential ones—without worry.

Source: Secure, Share & Edit All Your Files From Anywhere | Box




 Subscribe in a reader


May 29 2019

Flipboard says hackers stole user details | ZDNet

Category: Cyber Attack,Hacking,Security BreachDISC @ 12:16 pm

Extent of the hack is unknown, but Flipboard said hackers had access to its systems for almost nine months.

Source: Flipboard says hackers stole user details | ZDNet

Flipboard confirms database hack, resets all user passwords

  • InfoSec Breaches

  •  Subscribe in a reader


    May 27 2019

    Cyberattacks against hospitals increased over 1000% last year

    Category: hipaa,Information PrivacyDISC @ 4:02 pm

    Cyberattacks against hospitals increased over 1000% last year : cybersecurity IICS Delhi Ethical Hacking Digital Forensics services

    Source: Cyberattacks against hospitals increased over 1000% last year



    What happens when hackers attack a hospital?



     Subscribe in a reader

    Tags: healthcare privacy, healthcare security, ISMS for healthcare


    May 26 2019

    Uncovering Linux based cyberattack using Azure Security Center

    Category: Cyber Attack,Linux SecurityDISC @ 3:55 pm

    Azure Security Center, Microsoft’s cloud-based cyber solution helps customers safeguard their cloud workloads as well as protect them from these threats.

    Source: Uncovering Linux based cyberattack using Azure Security Center







     Subscribe in a reader

    Tags: cyber attack


    May 24 2019

    Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

    Category: Information Privacy,Security BreachDISC @ 7:08 pm

    Perceptics confirms intrusion and theft, stays quiet on details

    Source: Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

  • Car Security
  • Security Breach
  •  
    Digital License Plates: Convenience or Privacy Risk?


     Subscribe in a reader

    Tags: digital privacy, license-plate security


    May 22 2019

    China, Leverage, and Values

    Category: Cyber Espionage,Cyber War,Digital cold warDISC @ 5:12 pm

    If there is a new tech cold war, it is one with shots fired over a decade ago, largely by China. The questions going forward are about both leverage and values.

    Source: China, Leverage, and Values

    5G is a war the US is about to lose warns DoD

    more on Cyber War

     

    Image result for Digital Cold War

    Jack Goldsmith: “The United States is Losing the Digital Cold War” | Talks at Google


    Tags: digital cold war, Tech cold war


    May 21 2019

    Microsoft wants a US privacy law that puts the burden on tech companies

    Category: Information PrivacyDISC @ 8:56 am

    On the first anniversary of #GDPR, Microsoft calls for a similar privacy law in the US that puts the burden on the companies that collect and use sensitive data.

    Europe’s privacy law went into effect nearly a year ago. It’s time for the US to catch up, the tech giant says.

    Source: Microsoft wants a US privacy law that puts the burden on tech companies

     

     

     Subscribe in a reader

    Tags: California Consumer Privacy Act, data privacy, GDPR Privacy


    May 20 2019

    Millions of Instagram influencers had their private contact data scraped and exposed

    Category: data security,Security BreachDISC @ 4:04 pm

    Millions of Instagram influencers had their private contact data scraped and exposed

    A massive database containing contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The database, hosted by Amazon Web Services, was left exposed and without a password allowing anyone to look inside. At the time of writing, the database had over 49 million records — but was growing by […]

    Source: Millions of Instagram influencers had their private contact data scraped and exposed – TechCrunch


     Subscribe in a reader


    « Previous PageNext Page »