Aggregator
5G Reality Check: Standalone Is Not Really Standalone
【0808】重保演习每日情报汇总
【0808】重保演习每日情报汇总
Scoperta una seconda vulnerabilità zero-day in Apache OFBiz
Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
Zr.Ms. Karel Doorman zet koers naar Den Helder na succesvolle bijdrage aan EU-operatie Aspides
Exfiltration Tools
Black Hat: Optimizing SecOps with Integrated Toolsets and Advanced AI
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on August 8, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-221-01 Dorsett Controls InfoScan
CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.
Best Practices for Cisco Device Configuration
In recent incidents, CISA has seen malicious cyber actors acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart Install feature. CISA recommends organizations disable Smart Install and review NSA’s Smart Install Protocol Misuse advisory and Network Infrastructure Security Guide for configuration guidance.
CISA also continues to see weak password types used on Cisco network devices. A Cisco password type is the type of algorithm used to secure a Cisco device’s password within a system configuration file. The use of weak password types enables password cracking attacks. Once access is gained a threat actor would be able to access system configuration files easily. Access to these configuration files and system passwords can enable malicious cyber actors to compromise victim networks. Organizations must ensure all passwords on network devices are stored using a sufficient level of protection.
CISA recommends type 8 password protection for all Cisco devices to protect passwords within configuration files. Type 8 password protection is more secure than other password types and approved by NIST. CISA urges organizations to review NSA’s Cisco Password Types: Best Practices guide for more information and follow the best practices for securing administrator accounts and passwords:
- Properly store passwords with a strong hashing algorithm.
- Do not reuse passwords across systems.
- Assign passwords that are strong and complex.
- Do not use group accounts that do not provide accountability.
North Korea Kimsuky Launch Phishing Attacks on Universities
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
Армия США представила робособак с карабином для охоты на дронов
Rust 1.80: следующий уровень производительности с LazyLock и LazyCell
Researchers Detailed the Evolution of Cybercriminal Underworld
Cybersecurity Researchers have unveiled the complicated evolution of the cybercriminal underworld. This transformation, spanning decades, has seen hackers evolve from isolated individuals seeking notoriety to organized syndicates driven by profit. The findings provide crucial insights into the operational dynamics of modern cybercriminal organizations, offering valuable knowledge for cybersecurity professionals striving to protect against these threats. […]
The post Researchers Detailed the Evolution of Cybercriminal Underworld appeared first on Cyber Security News.
渗透测试之啥也不是
Уязвимости июля: миллиарды устройств на грани взлома
Заражение, слежка, потеря данных: что еще скрывается за лёгкими способами ускорить YouTube?
AI Model Achieve 98% Accuracy in Collecting Threat Intelligence From Dark Web Forums
In a recent study, researchers from the Université de Montréal and Flare Systems have demonstrated that large language models (LLMs) can accurately extract critical cyber threat intelligence (CTI) from cybercrime forums with an impressive 98% accuracy. The findings, published in a white paper, highlight the immense potential of AI in bolstering cybersecurity efforts. The research […]
The post AI Model Achieve 98% Accuracy in Collecting Threat Intelligence From Dark Web Forums appeared first on Cyber Security News.