Hackers beat university cyber-defences in two hours

Computers

A test of UK university defences against cyber-attacks found that in every case hackers were able to obtain “high-value” data within two hours. Continue reading “Hackers beat university cyber-defences in two hours”

Advertisements

Hackers Conducting RDP Attacks Using New Technique to Bypass Protections

source : gbhackers

A Microsoft Windows component, RDP was designed to provide administrators, engineers, and users with remote access to systems. However, threat actors have been using the technology for nefarious purposes, and the trend continues, especially since an RDP attack is usually more difficult to detect than a backdoor.  Continue reading “Hackers Conducting RDP Attacks Using New Technique to Bypass Protections”

How hackers can exploit devices used at home

How hackers can exploit devices used at home

As Americans increasingly fill their homes with smart technology, the risk of hackers exploiting their devices is growing.

Experts say the expanding ecosystem of internet-connected devices such as smart thermostats, home security systems and electric door locks are increasingly susceptible to hackers, including those trying to leverage voice-command devices.

Source: thehill Continue reading “How hackers can exploit devices used at home”

20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

20 Critical Security Controls: Control 9 - Limitation and Control of Network Ports, Protocols, and ServicesKey Takeaways for Control 9
Reduce your attack surface. So much of control 9 is about limiting the external attack surface of a system. This is always the first step in securing an endpoint.
Duplication with other controls. Everything being done in control 9 is going to be accomplished by completing other controls elsewhere. I would probably leave this one for last as it’s the least impactful (due to duplication) out of any of the controls.

Source: tripwire

Continue reading “20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services”

HACKER PUBLISHES IOS SECURE ENCLAVE FIRMWARE DECRYPTION KEY

A hacker Thursday afternoon published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware.

The hacker, identified only as xerub, told Threatpost that the key unlocks only the SEP firmware, and that this would not impact user data.

“Everybody can look and poke at SEP now,” xerub said.

Source: threatpost

Continue reading “HACKER PUBLISHES IOS SECURE ENCLAVE FIRMWARE DECRYPTION KEY”

Blog at WordPress.com.

Up ↑