Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for The true cost of gam ...

 Special Projects

Once a niche pastime, the gaming industry (approaching its 50th anniversary) is now bigger than both Hollywood and the music industry — combined! To put this into perspective, so far this year more than 7000 titles have been released, eagerly awaited by around three billion gamers worldwide. You might spend only a   show more ...

couple of hours per week gaming and do it just for fun, but if youre serious about winning and want to invest time, money and effort, there are some well-established avenues to quickly improving your… game. If you want to learn from others, take a look at some insights weve collected while working with more than 10,000 global gamers to get their thoughts on everything from the performance of their computers to the ethics of winning and losing. Our research revealed pro gamers are like professional sports stars. Key to a winning performance is obviously computer power. And gamers prefer to build their own desktop PCs rather than heading to a big box store. What impressed us is the attention to detail as everyone carefully specifies hardware for the games they play to improve performance, with 66% purchasing a graphics card, memory, SSD, whole PC, or monitor that specifically meets their needs. Two of the most important hardware considerations are processing power (49%) and bandwidth (40%) as they offer advantages over rivals with slower data connections. Almost three-in-four are also very specific about the right accessories. The priorities go in this order: keyboards (38%), mice (37%), headsets or microphones (37%), and chairs (32%). (function(d,s,id,u){ if (d.getElementById(id)) return; var js, sjs = d.getElementsByTagName(s)[0], t = Math.floor(new Date().getTime() / 1000000); js=d.createElement(s); js.id=id; js.async=1; js.src=u+'?'+t; sjs.parentNode.insertBefore(js, sjs); }(document, 'script', 'os-widget-jssdk', 'https://www.opinionstage.com/assets/loader.js')); For people participating in e-sports tournaments or even friendly competitions, maintaining good mental health is essential to help you react under pressure, so 76% of active gamers work on this aspect too. Obviously, practice is very important, but, surprisingly, only 41% put it as a winning factor. The vast majority of serious gamers are ready to use every possible method or trick to win — 85% said that theyd use inside knowledge to beat an opponent. The global community agrees on one thing — using dishonest methods to achieve your goal only highlights a lack of skill. We talked to gamers from Europe to South America and Asia-Pacific, and they all said the same — their biggest beef with game makers is that their accounts have been hacked at some point in the last two years. And while the industry invests millions into graphics and game development, its a long way to go in terms of user account security — 63% of respondents agree their accounts are not properly protected. So, how do all these factors rank at the end of the day? Using every trick in the book plus inside knowledge to win (no cheating!) 85% Mental health, perform under pressure 76% Custom accessories (keyboards, mice, etc.) 75% Custom selected hardware components 66% Better security 63% Powerful hardware (CPU, GPU, memory) 49% Much practice 41% Lots of bandwidth 40% We can contribute to a substantial improvement of game security, so heres some advice for gamers wanting to maintain a high-level of performance and security: Its safer to buy games only from official sites/stores and wait for sales on those sites. Sales happen quite often and its a much safer way to save money than buying from illegal stores or downloading pirated software. The probability of account loss and direct financial theft is much higher with pirated software as its regularly used by cybercrooks to find new victims. Beware of phishing campaigns that might take the form of fake notification emails from gaming services or direct messages from unfamiliar gamers. Criminals use these tactics to lure you to fake websites and steal your Steam, Discord or other credentials. They might also distribute malware disguised as a game mod or other attractive items. So, triple check the websites address and avoid unfamiliar sites, and remember that offers that sound too good to be true — arent. Make sure your computer is always protected by cybersecurity software. There is exactly zero need to disable your antivirus/internet security/firewall to play. Modern security solutions, like Kaspersky Plus, have a special gaming mode, which allows you to play without FPS reduction or any distractions. If any game mod or utility requires you to disable your security, its a huge red flag.

image for Everything You Need  ...

 Feed

While the ransomware-for-hire group works to create ever more efficient exploits, companies can protect themselves with structured vulnerability management processes. Prioritize threats based on severity and risk.

 Malware and Vulnerabilities

A phishing email impersonating the Hungarian government was discovered dropping Warzone RAT on Windows systems. Threat actors lure users into opening an attachment by telling them that their credentials have changed and the new ones have arrived in the attachment. The attached ZIP executable extracts the Warzone RAT and loads it into the memory.

 Trends, Reports, Analysis

Ransomware attacks against U.K. hospitals and schools remained the biggest cybersecurity threat facing the country in 2022, the country’s cybersecurity agency warns, adding that these attacks are likely to surge in the coming months.

 Govt., Critical Infrastructure

The Office of the National Cyber Director hosted a forum last week with government leaders and private companies, including both automakers and EV charging manufacturers, to discuss the cybersecurity issues facing EVs and the tech they operate on.

 Expert Blogs and Opinion

It is difficult to determine how serious countries are when they threaten “kinetic” responses to digital attacks. Yet, the ambiguity over if cyberattacks should be answered with military force only increases the risk of things going terribly wrong.

 Malware and Vulnerabilities

In July 2022, after several months of the shutdown, a Raccoon Stealer V2 went viral. Last week, the Department of Justice's press release stated that the malware collected 50 million credentials.

 Breaches and Incidents

The exposed database contained 215 million records of pseudonymized viewing data. This includes the name of the movie or show being streamed, the streaming device, and similar internal data such as subscription information and network quality.

 Feed

All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to remote command injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. This module uses the vulnerability to upload and execute payloads gaining root privileges.

 Feed

In Webmin version 1.984, any authenticated low privilege user without access rights to the File Manager module could interact with file manager functionalities such as downloading files from remote URLs and changing file permissions. It is possible to achieve remote code execution via a crafted .cgi file by chaining those functionalities in the file manager.

 Feed

Ubuntu Security Notice 5711-1 - Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated certain NTFS metadata. A local attacker could possibly use this issue to gain privileges.

 Feed

Red Hat Security Advisory 2022-7272-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This   show more ...

release of Red Hat JBoss Web Server 5.7.0 serves as a replacement for Red Hat JBoss Web Server 5.6.1. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a privilege escalation vulnerability.

 Feed

Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.

 Feed

Red Hat Security Advisory 2022-7211-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.39. Issues addressed include a code execution vulnerability.

 Feed

Red Hat Security Advisory 2022-7273-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This   show more ...

release of Red Hat JBoss Web Server 5.7.0 serves as a replacement for Red Hat JBoss Web Server 5.6.1. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include denial of service and privilege escalation vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7288-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full strength general purpose cryptography library. Issues addressed include a buffer overflow vulnerability.

 Feed

Red Hat Security Advisory 2022-7276-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private   show more ...

cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include denial of service, server-side request forgery, and remote SQL injection vulnerabilities.

 Feed

Debian Linux Security Advisory 5268-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.

 Feed

Red Hat Security Advisory 2022-7280-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7283-01 - KSBA is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Issues addressed include code execution and integer overflow vulnerabilities.

 Feed

Red Hat Security Advisory 2022-7279-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.

 Feed

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

 Feed

A previously undocumented Android spyware campaign has been found striking Persian-speaking individuals by masquerading as a seemingly harmless VPN application. Russian cybersecurity firm Kaspersky is tracking the campaign under the moniker SandStrike. It has not been attributed to any particular threat group. "SandStrike is distributed as a means to access resources about the Bahá'í religion 

 Feed

File hosting service Dropbox on Tuesday disclosed that it was the victim of a phishing campaign that allowed unidentified threat actors to gain unauthorized access to 130 of its source code repositories on GitHub. "These repositories included our own copies of third-party libraries slightly modified for use by Dropbox, internal prototypes, and some tools and configuration files used by the

 Feed

Multiple vulnerabilities have been disclosed in Checkmk IT Infrastructure monitoring software that could be chained together by an unauthenticated, remote attacker to fully take over affected servers.  "These vulnerabilities can be chained together by an unauthenticated, remote attacker to gain code execution on the server running Checkmk version 2.1.0p10 and lower," SonarSource researcher

 Feed

A set of four Android apps released by the same developer has been discovered directing victims to malicious websites as part of an adware and information-stealing campaign. The apps, published by a developer named Mobile apps Group and currently available on the Play Store, have been collectively downloaded over one million times. According to Malwarebytes, the websites are designed to generate

 Feed

Raccoon Stealer is back on the news again. US officials arrested Mark Sokolovsky, one of the malware actors behind this program. In July 2022, after several months of the shutdown, a Raccoon Stealer V2 went viral. Last week, the Department of Justice's press release stated that the malware collected 50 million credentials. This article will give a quick guide to the latest info stealer's version

2022-11
Aggregator history
Wednesday, November 02
TUE
WED
THU
FRI
SAT
SUN
MON
NovemberDecemberJanuary