Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for WTF is an NFT? And s ...

 News

If you are a regular listener of the Kaspersky Transatlantic Cable podcast, you know that we have some strong feelings towards NFTs. While we generally have some fun at the growing pains of the newish technology, we havent done a full overview of them. For that, we decided to bring in our friend and recurring podcast   show more ...

guest Ivan Kwiatkowski to discuss what NFTs really are. While Ivan is usually on to discuss APT activity or ethics in cybersecurity, he is also a noted skeptic of the crypto space. During our conversation, we discuss: What NFTs are Ownership in the digital realm Should people care about NFT NFTs role in terrorism Ivan also has a series on digital ownership and NFT on this blog along with some videos debating the technology with a crypto enthusiast, Ivan Imhoff. Crypto, really. Part I: blockchains and cryptocurrencies Crypto, really. Part II: non-fungible tokens NFT talks: crypto enthusiast versus sceptic For the full podcast, please click below.

 Threat Intel & Info Sharing

Previously known as Eeleyanet Gostar and Net Peygard Samavat, Emennet Pasargad is an organization that often changes its name to avoid US sanctions, and which is known for providing cybersecurity services to government entities in Iran.

 Breaches and Incidents

An activist group that calls itself Black Reward and claims to be from Iran claimed that it had accessed an email server run by a company related to Iran's Atomic Energy Organization and exfiltrated 324 inboxes comprising over 100,000 messages.

 Feed

Debian Linux Security Advisory 5260-1 - Igor Ponomarev discovered that LAVA, a continuous integration system for deploying operating systems onto physical and virtual hardware for running tests, used exec() on input passed to the server component.

 Feed

MutableSecurity is a Linux CLI program for making cybersecurity solution management easier and more accessible, from deployment and configuration to monitoring. It supports multiple solutions (teler as web IDS, Fail2ban as host IPS, Let's Encrypt for generating SSL certificates, and ClamAV as antimalware), password-based and key-based SSH authentication, and parallel deployment to multiple remote hosts.

 Feed

Debian Linux Security Advisory 5257-2 - The security update announced as DSA 5257-1 caused regressions on certain systems using the amdgpu driver. Updated packages are now available to correct this issue.

 Feed

Pega Platform versions 8.1.0 through 8.7.3 suffer from a remote code execution vulnerability. If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads   show more ...

to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

 Feed

The breach of LA Unified School District (LAUSD) highlights the prevalence of password vulnerabilities, as criminal hackers continue to use breached credentials in increasingly frequent ransomware attacks on education. The Labor Day weekend breach of LAUSD brought significant districtwide disruptions to access to email, computers, and applications. It's unclear what student or employee data the

 Feed

SideWinder, a prolific nation-state actor mainly known for targeting Pakistan military entities, compromised the official website of the National Electric Power Regulatory Authority (NEPRA) to deliver a tailored malware called WarHawk. "The newly discovered WarHawk backdoor contains various malicious modules that deliver Cobalt Strike, incorporating new TTPs such as KernelCallBackTable injection

 Feed

U.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country. "The Daixin Team is a ransomware and data extortion group that has targeted the HPH Sector with ransomware and data extortion operations since at least June 2022," the agencies said. The

 Feed

Virtual Chief Information Security Officer (vCISO) services (also known as 'Fractional CISO' or 'CISO-as-a-Service') are growing in popularity, especially as growing cyber threats, tightening regulatory demands and strict cyber insurance requirements are driving small to medium-sized enterprises demand for strategic cybersecurity and compliance guidance and management. But vCISO services are

2022-10
SAT
SUN
MON
TUE
WED
THU
FRI
OctoberNovemberDecember