PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Microsoft Warns of a Wide-Scale Phishing-as-a-Service Operation

mercredi 22 septembre 2021 à 14:25
Microsoft has opened the lid on a large-scale phishing-as-a-service (PHaaS) operation that's involved in selling phishing kits and email templates as well as providing hosting and automated services at a low cost, thus enabling cyber actors to purchase phishing campaigns and deploy them with minimal efforts. "With over 100 available phishing templates that mimic known brands and services, the

How Cynet's Response Automation Helps Organizations Mitigate Cyber Threats

mercredi 22 septembre 2021 à 12:38
One of the determining factors of how much damage a cyber-attack cause is how fast organizations can respond to it. Time to response is critical for security teams, and it is a major hurdle for leaner teams. To help improve this metric and enhance organizations’ ability to respond to attacks quickly, many endpoint detection and response (EDR) and extended detection and response (XDR) vendors

New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures

mercredi 22 septembre 2021 à 12:38
As many as 11 security vulnerabilities have been disclosed in Nagios network management systems, some of which could be chained to achieve pre-authenticated remote code execution with the highest privileges, as well as lead to credential theft and phishing attacks.  Industrial cybersecurity firm Claroty, which discovered the flaws, said flaws in tools such as Nagios make them an attractive

US Sanctions Cryptocurrency Exchange SUEX for Aiding Ransomware Gangs

mercredi 22 septembre 2021 à 08:16
The U.S. Treasury Department on Tuesday imposed sanctions on Russian cryptocurrency exchange Suex for helping facilitate and launder transactions from at least eight ransomware variants as part of the government's efforts to crack down on a surge in ransomware incidents and make it difficult for bad actors to profit from such attacks using digital currencies. "Virtual currency exchanges such as

The Gap in Your Zero Trust Implementation

mercredi 22 septembre 2021 à 06:18
Over the last several years, there have been numerous high-profile security breaches. These breaches have underscored the fact that traditional cyber defenses have become woefully inadequate and that stronger defenses are needed. As such, many organizations have transitioned toward a zero trust security model. A zero trust security model is based on the idea that no IT resource should be trusted