Categorie
Uncategorized

Cybersecurity. Groove gang leaks list of 500k credentials of compromised Fortinet appliances (Pierluigi Paganini, Security Affairs)

Groove gang leaked online Fortinet credentials that could be used to breach networks of organizations using the compromised devices.

Groove gang leaks list of credentials of compromised Fortinet appliancesSecurity Affairs

Categorie
Uncategorized

Cybersecurity. Russian communications watchdog Roskomnadzor blocks access to 6 VPNs (Pierluigi Paganini, Security Affairs)

Russian communications watchdog Roskomnadzor tightens control of its citizens and blocked access to six virtual private networks (VPNs), including NordVPN and ExpressVPN

Russian communications watchdog Roskomnadzor blocks 6 VPNsSecurity Affairs

Categorie
Uncategorized

Cybersecurity. Germany protests to Russia over attacks ahead of the upcoming election (Pierluigi Paganini, Security Affairs)

Germany has protested to Russia over attempts to steal data from lawmakers and use them to spread disinformation ahead of the upcoming election

Germany protests to Russia over attacks ahead of the upcoming electionSecurity Affairs

Categorie
Uncategorized

Cybersecurity. REvil ransomware gang’s servers are mysteriously online again (Pierluigi Paganini, Security Affairs)

The leak site of the popular REvil ransomware gang is it is not clear if the group resumed operations or the FBI turned on its servers

REvil ransomware gang’s servers are mysteriously online againSecurity Affairs

Categorie
Uncategorized

Cybersecurity. Researcher published PoC exploit for Ghostscript zero-day (Pierluigi Paganini, Security Affairs)

A researcher published the PoC exploit code for a Ghostscript zero-day vulnerability that could allow completely compromise a server

Researcher published PoC exploit for Ghostscript zero-daySecurity Affairs

Categorie
Uncategorized

Cybersecurity. A server of the Jenkins project hacked by exploiting a Confluence flaw (Pierluigi Paganini, Security Affairs)

The development team behind the Jenkins server disclose a security breach, threat actors deployed a cryptocurrency miner on one of its servers

A server of the Jenkins project hacked by exploiting a Confluence flawSecurity Affairs

Categorie
Uncategorized

Cybersecurity. Ragnar Locker gang threatens to leak data if victim contacts law enforcement (Pierluigi Paganini, Security Affairs)

The Ragnar Locker ransomware operators threaten to leak stolen data if the victims attempt to contact law enforcement agencies

Ragnar Locker gang threatens to leak data if victim contacts law enforcementSecurity Affairs

Categorie
Uncategorized

Cybersecurity. ProtonMail logged IP address of French activist after foreign request approved by Swiss authorities (Pierluigi Paganini, Security Affairs)

A police report revealed that the popular encrypted email service provider ProtonMail shared the IP address of a French activist with the authorities

ProtonMail logged IP address of French activist after foreign request approved by Swiss authoritiesSecurity Affairs

Categorie
Uncategorized

Cybersecurity/USA. America’s anti-hacking laws pose a risk to national security (Riana Pfefferkorn, Brookings)

FILE PHOTO: A man takes part in a hacking contest during the Def Con hacker convention in Las Vegas, Nevada, U.S. on July 29, 2017. REUTERS/Steve Marcus/File Photo

A man takes part in a hacking contest during the DEF CON hacker convention in Las Vegas, Nevada, U.S. on July 29, 2017. REUTERS/Steve Marcus/File Photo

When the Supreme Court handed down its decision in Van Buren v. United States, cybersecurity professionals nationwide breathed a sigh of relief. Asked to determine the scope of the United States’ main federal anti-hacking law, the court adopted a limited interpretation of the Computer Fraud and Abuse Act (CFAA). Had the ruling come out differently, it could have created more risk for so-called “white hat” hackers who search for flaws in software as a public service.

America’s anti-hacking laws pose a risk to national security (brookings.edu)

Page 3 of 49
1 2 3 4 5 49