Exclusive: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts – sources

Source: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts
InfoSec and Compliance – With 20 years of blogging experience, DISC InfoSec blog is dedicated to providing trusted insights and practical solutions for professionals and organizations navigating the evolving cybersecurity landscape. From cutting-edge threats to compliance strategies, this blog is your reliable resource for staying informed and secure. Dive into the content, connect with the community, and elevate your InfoSec expertise!
Jun 27 2019
Source: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts
Jun 25 2019
Over 2,000 devices have been bricked in the span of a few hours. Attacks still ongoing.
Source: New Silex malware is bricking IoT devices, has scary plans | ZDNet
How dangerous are IOT devices? | Yuval Elovici | TEDxBGU
Jun 24 2019
OpenSSH introduces a new feature to prevent Side-Channel attacks, latest release encrypts secret keys in memory as temporary solution.
Source: OpenSSH introduces a security feature to prevent Side-Channel Attacks
Jun 20 2019
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials.
Source: Seth : Perform A MitM Attack From RDP Connections
Jun 19 2019
Researchers discovered a new JavaScript-based and modular downloader Trojan camouflaged and distributed to targets in the form of game cheats via websites owned by its developers.
Source: Hackers Disguise New JavaScript-Based Trojan as Game Cheat
Worst JavaScript Flaws That Hackers Love To Abuse
Jun 17 2019
The Cybersecurity and Infrastructure Security Agency (CISA) published an alert for Windows users to patch the critical severity Remote Desktop Services (RDS) RCE security flaw dubbed BlueKeep.
Source: U.S. Govt Achieves BlueKeep Remote Code Execution, Issues Alert
How to check if a target is vulnerable to the new RDP vulnerability (BlueKeep).
Jun 15 2019
In the report, the cybersecurity company Symantec claims that a Chinese hacker group associated with Chinese government intelligence conducted a hacking campaign using a tool that at the time was only known to be the property of the NSA.
Source: Chinese spies stole NSA hacking tools, report finds
Jun 12 2019
Researchers discovered two vulnerabilities in Alaris Gateway Workstations that are used to deliver fluid medication. One of them is critical and an attacker could leverage it to take full control of the medical devices connecting to it.
Source: Critical Bug in Infusion System Allows Changing Drug Dose in Medical Pumps
Healthcare privacy and security
Jun 11 2019
Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords.
Source: Zydra : Password Recovery Tool & Linux Shadow File Cracker
Jun 10 2019
Security Awareness writer Keil Hubert describes a mysterious email message that could well have been an insidiously clever spear phishing attack.
Source: A guide to phishing emails and how they work -TEISS® : Cracking Cyber Security
This is what happens when you reply to spam email
Jun 09 2019
Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here’s a detailed analysis by Bitdefender of an attack on one bank.
Source: From phish to network compromise in two hours: How Carbanak operates
Jun 02 2019
Microsoft allows you to download the latest Windows 10 ISOs from their site, but only if you are using a non-Windows browser user agent. This article will explain how to change your user agent in Chrome and Edge so you can download an ISO instead of using the Windows 10 Media Creation Tool.
Source: How to Download a Windows 10 ISO By Impersonating Other Devices
Jun 01 2019

ESET researchers show how, in a bid to evade detection, the Turla group leverages PowerShell scripts to inject malware directly into memory.
Source: A dive into Turla PowerShell usage | WeLiveSecurity
Jun 01 2019
The Russian army seems to be in the process of replacing the Windows system with the Debian-based Linux distribution Astra Linux.
Source: Russian military plans to replace Windows with Astra Linux
Look @ Astra Linux ® 2.12 – Russian Debian – Fly Desktop
May 31 2019
This course is about helping you to survive an identity theft, attempt to educate you on how to prevent a direct identity theft attempt, know what to look for and how not be the one who helped the thief take your personal information. With your new found knowledge take it to your family so they can avoid years of headaches.
Source: Watch Cyber Security Is It Your Time For Identity theft, Yet? | Prime Video
May 31 2019
May 29 2019
Extent of the hack is unknown, but Flipboard said hackers had access to its systems for almost nine months.
Source: Flipboard says hackers stole user details | ZDNet
Flipboard confirms database hack, resets all user passwords
May 27 2019
Cyberattacks against hospitals increased over 1000% last year : cybersecurity IICS Delhi Ethical Hacking Digital Forensics services
Source: Cyberattacks against hospitals increased over 1000% last year
What happens when hackers attack a hospital?
|
|
|
May 26 2019
Azure Security Center, Microsoft’s cloud-based cyber solution helps customers safeguard their cloud workloads as well as protect them from these threats.
Source: Uncovering Linux based cyberattack using Azure Security Center
May 24 2019
Perceptics confirms intrusion and theft, stays quiet on details
Digital License Plates: Convenience or Privacy Risk?