Cybersecurity

5931 readers
33 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
551
552
553
554
555
 
 

cross-posted from: https://lemmy.zip/post/23512381

The flaw allows a rogue user to escape their container and access entire file systems of the underlying host to perform code execution, and denial of service.

556
9
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/cybersecurity
 
 

Progress Software warned customers to patch multiple critical and high-severity vulnerabilities in its WhatsUp Gold network monitoring tool as soon as possible.

557
 
 

The AI Incident Reporting and Security Enhancement Act would allow NIST to create a process for reporting and tracking vulnerabilities found in AI systems.

558
 
 

Researchers found a flaw in a Kia web portal that let them track millions of cars, unlock doors, and start engines at will—the latest in a plague of web bugs that’s affected a dozen carmakers.

559
2
[Deleted] (arstechnica.com)
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/cybersecurity
 
 

[Deleted - Didn't see it had already been posted]

560
561
562
563
 
 

So I've got a few systems where parsec is installed and I can't uninstall it. Has anyone come across this? The only reason I know it's installed is by running a script that scans for RAT's. I can't find it anywhere else so it could be a false positive but it's a very strange one. Curious if anyone knows of bad actors using it like the other remote access software scammers use. The only difference is these are computers where no scammer has accessed via their usual phishing means.

564
565
566
567
568
569
570
19
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/cybersecurity
 
 

Arkansas City, a small city in Cowley County, Kansas, was forced to switch its water treatment facility to manual operations over the weekend to contain a cyberattack detected on Sunday morning.

571
 
 

I had this thought.

Many IOT devices, including local devices like printers, streaming boxes, cameras etc. may be outdated.

Those may use Wifi but only support WPA2, which can be easily cracked using Kali Linux, a kernel module integrated in Kali, and aircrack.

Many of these devices have an Ethernet or at least USB jack. Ethernet will always work, USB over usb-tethering should work often.

Couldnt you just use a tiny sbc, with a wifi antenna and support for WPA3, and serve the connection via Ethernet or USB to the device?

Like a small plug-in adapter.

Should be rock stable and update atomically and automatically (waiting for you, CentOS bootc, Alma bootc, Rockylinux bootc).

Do you know if this exists or have some caveats in mind?

572
573
574
575
126
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/cybersecurity
 
 

Starting Thursday, Russian cybersecurity company Kaspersky deleted its anti-malware software from customers' computers across the United States and automatically replaced it with UltraAV's antivirus solution.

view more: ‹ prev next ›