TSEC NEWS: 10.04.21 - Back again ||| cooming soon - 1. TSec-Accounts 2.comments 3. personalized feed... if i have the time

❈ Hackers Exploit Unpatched VPNs to Install Ransomware on Industrial Targets

IT Security Nachrichten feedproxy.google.com

Unpatched Fortinet VPN devices are being targeted in a series of attacks against industrial enterprises in Europe to deploy a new strain of ransomware called "Cring" inside corporate networks. At least one of the hacking incidents led to the temporary shutdown of a production site, said cybersecurity firm Kaspersky in a report published on Wednesday, without publicly naming the victim. The...


Kompletten Artikel lesen (externe Quelle: http://feedproxy.google.com/~r/TheHackersNews/~3/beu4xIOf1T8/hackers-exploit-unpatched-vpns-to.html)

Zur Team IT Security IT Sicherheit Nachrichtenportal Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector

vom 296.36 Punkte
Original release date: October 28, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

vom 248.45 Punkte
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

Error while executing "make install" for libgraph

vom 235.96 Punkte
Makefile:934: warning: overriding recipe for target 'libgraph.pc' Makefile:409: warning: ignoring old recipe for target 'libgraph.pc' make install-recursive make[1]: Entering directory '/home/fake/libgraph-1.0.2' Makefile:934: warning: overriding recipe for target 'libgr

AA20-099A: COVID-19 Exploited by Malicious Cyber Actors

vom 200.39 Punkte
Original release date: April 8, 2020SummaryThis is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). This al

AA20-099A: COVID-19 Exploited by Malicious Cyber Actors

vom 200.39 Punkte
Original release date: April 8, 2020SummaryThis is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). This al

Some-Tools - Install And Keep Up To Date Some Pentesting Tools

vom 175.71 Punkte
Some-ToolsWhyI was looking for a way to manage and keep up to date some tools that are not include in Kali-Linux. For exemple, I was looking for an easy way to manage privilege escalation scripts. One day I saw sec-tools from eugenekolo (which you can see at the bottom of the page) and it gave me the motivation to start working on mine right away.But keep in mind that is different. I built this for people that are working with Kali. Should work on others d

Neofetch- A Command-Line System Information Tool

vom 157.3 Punkte
Neofetch- A Command-Line System Information Tool. Neofetch is a command-line system information tool written in bash 3.2+. Neofetch displays information about your operating system, software and hardware in an aesthetic and visually pleasing way. The

keycloak-httpd-client-install bis 0.8 Command Line Information Disclosure

vom 149.88 Punkte
In keycloak-httpd-client-install bis 0.8 wurde eine problematische Schwachstelle gefunden. Betroffen ist eine unbekannte Funktion der Komponente Command Line. Durch Manipulieren mit einer unbekannten Eingabe kann eine Information Disclosure-Schwachstelle ausgenutzt

TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

vom 149.3 Punkte
Original release date: March 15, 2018Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bu

AutoRecon - Multi-Threaded Network Reconnaissance Tool Which Performs Automated Enumeration Of Services

vom 140.58 Punkte
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans/service detection scans. From those initial results, the tool will launch further enum

keycloak-httpd-client-install bis 0.7 Temp File Symlink erweiterte Rechte

vom 137.5 Punkte
Es wurde eine problematische Schwachstelle in keycloak-httpd-client-install bis 0.7 gefunden. Hiervon betroffen ist eine unbekannte Funktion der Komponente Temp File Handler. Durch das Manipulieren mit einer unbekannten Eingabe kann eine erweiterte Rechte-Schw

TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors

vom 136.79 Punkte
Original release date: October 20, 2017 | Last revised: October 23, 2017Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Secur

Team Security Diskussion über Hackers Exploit Unpatched VPNs to Install Ransomware on Industrial Targets