Security News

Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain
2023-01-05 14:55

A financially motivated threat actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate infection chain as part of its attacks targeting organizations in Colombia and Ecuador. Also tracked under the name APT-C-36, Blind Eagle is notable for its narrow geographical focus and launching indiscriminate attacks against South American nations since at least 2018.

UK lawmakers look to enforce blocking tools for legal but harmful content
2022-12-09 13:30

The UK government is putting forward changes to the law which would require social media platforms to give users the option to avoid seeing and engaging with harmful - but legal - content. Presenting the amended Online Safety Bill to Parliament this week, Michelle Donelan, the minister for digital, culture, media and sport pledged to create a "Third shield" to protect users from harmful content.

Kali Linux 2022.4 adds 6 new tools, Azure images, and desktop updates
2022-12-06 21:43

Kali Linux images for Azure, QEMU. Kali Linux is now available in the Azure Marketplace, allowing you to deploy the image and perform penetration testing from the cloud. In reality, Kali Linux 2022.3 made it to Azure first, with the team tweeting its addition on August 30th, after 2022.3 was already released.

Kali Linux 2022.4 released: Kali NetHunter Pro, desktop updates and new tools
2022-12-06 20:43

Offensive Security has released Kali Linux 2022.4, the latest version of its popular penetration testing and digital forensics platform. Aside from updates to existing tools, a new Kali version always delivers new tools.

Top 10 free MITRE ATT&CK tools and resources
2022-12-05 05:30

MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. Below you can find a collection of MITRE ATT&CK tools and resources available for free.

How to run better meetings with new Microsoft Teams tools
2022-12-01 20:09

There are also more security options for what Teams product marketing director Caroline Stanford called "Cone of silence" meetings at the recent Microsoft Ignite conference; those are the digital version of board meetings, financial planning meetings or reviews of unannounced products in the office "With the blinds closed and the door locked." Plus, you can use Microsoft Purview Information Protection sensitivity labels to apply the right settings for specific kinds of meetings.

Week in review: 5 Kali Linux tools, Spotify’s Backstage vulnerability, Cybertech NYC 2022
2022-11-20 09:00

5 Kali Linux tools you should learn how to useKali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. Stop audience hijacking and defend against redirection to malicious websitesIn this Help Net Security video, Patrick Sullivan, CTO of Security Strategy at Akamai, talks about the threat of audience hijacking and offers protection tips.

5 Kali Linux tools you should learn how to use
2022-11-14 04:30

Kali Linux is a specialized Linux distribution developed by Offensive Security, designed for experienced Linux users who need a customized platform for penetration testing. Kali Linux also comes with several hundred specialized tools for carrying out penetration testing, security research, computer forensics, reverse engineering, vulnerability management, and red team testing.

Public URL scanning tools – when security leads to insecurity
2022-11-07 19:59

Well-known cybersecurity researcher Fabian Bräunlein has featured not once but twice before on Naked Security for his work in researching the pros and cons of Apple's AirTag products. Now, Bräunlein is back with another worthwhile warning, this time about the danger of cloud-based security lookup services that give you a free opinion about cybersecurity data you may have collected.

Iran’s Digital Surveillance Tools Leaked
2022-11-01 11:24

According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where.