Security News > 2021

What the Rise in Cyber-Recon Means for Your Security Strategy
2021-12-30 18:01

Cybercriminals understand spending more time in pre-attack reconnaissance means a greater chance of success when they launch their attack campaigns. In many situations, they can reuse the same techniques in their recon phase against multiple organizations, so although they're putting more effort upfront, they increase their chance of success and make their attacks more modular.

How to install the Pritunl VPN server on AlmaLinux
2021-12-30 17:18

Pritunl is an open source VPN server you can easily install on your Linux servers to virtualize your private networks. I've walked you through the process of installing Pritunl on Ubuntu Server 20.04 and now I want to do the same with AlmaLinux 8.5.

APT ‘Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools
2021-12-30 16:16

Cyber criminals, under the moniker Aquatic Panda, are the latest advanced persistent threat group to exploit the Log4Shell vulnerability. Researchers from CrowdStrike Falcon OverWatch recently disrupted the threat actors using Log4Shell exploit tools on a vulnerable VMware installation during an attack that involved of a large undisclosed academic institution, according to research released Wednesday.

University loses 77TB of research data due to backup error
2021-12-30 16:02

The Kyoto University in Japan has lost about 77TB of research data due to an error in the backup system of its Hewlett-Packard supercomputer. The incident occurred between December 14 and 16, 2021, and resulted in 34 million files from 14 research groups being wiped from the system and the backup file.

Firmware attack can drop persistent malware in hidden SSD area
2021-12-30 14:55

The attack models are for drives with flex capacity features and target a hidden area on the device called over-provisioning, which is widely used by SSD makers these days for performance optimization on NAND flash-based storage systems. One attack modeled by researchers at Korea University in Seoul targets an invalid data area with non-erased information that sits between the usable SSD space and the over-provisioning area, and whose size depends on the two.

Hiding malware inside the flex capacity space on modern SSDs
2021-12-30 14:55

The attack models are for drives with flex capacity features and target a hidden area on the device called over-provisioning, which is widely used by SSD makers these days for performance optimization on NAND flash-based storage systems. Flex capacity is a feature in SSDs from Micron Technology that enables storage devices to automatically adjust the sizes of raw and user-allocated space to achieve better performance by absorbing write workload volumes.

Instagram copyright infringment scams – don’t get sucked in!
2021-12-30 14:40

At the same time, you'll also know how easy it is to get accused of copyright wrongdoing yourself, even if you're always careful only to use third-party material in accordance with the original creator's licensing guidelines. Because of the frequent argy-bargy that surrounds online copyright issues, social networks have established formal procedures for making complaints and appealing against takedowns.

Twitter account of FBI's fake chat app, ANOM seen trolling today
2021-12-30 12:20

The Twitter account previously associated with the ANOM chat app is posting frivolous tweets this week. ANOM was a fake encrypted messaging platform created as part of a global sting operation led by the U.S. FBI, Australian Federal Police, and other law enforcement agencies to catch criminals.

Learn highly marketable ethical hacking skills for less than $45
2021-12-30 11:00

Even if you have no tech experience, you can develop valuable skills with the online training offered by The Super-Sized Ethical Hacking Bundle. Even if you have no tech experience whatsoever, you can learn highly marketable skills in this field with The Super-Sized Ethical Hacking Bundle, currently available for only $43. Beginners looking for a fast start should be aware that Google and Facebook each paid several million dollars to independent hackers who contributed to their bug bounty programs.

It’s time for a unified approach to securing data, applications, and the edge
2021-12-30 05:30

Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. Increasingly, sophisticated attacks start at the edge or application layers and move laterally to the data layer without detection.