FreshRSS

🔒
☐ ☆ ✇ The Hacker News

Tips for Choosing a Pentesting Company

By The Hacker News — October 31st 2022 at 13:50
In today's world of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS, penetration testing is now an essential security requirement for organisations of all sizes. But what should you look for when choosing the right provider? The sheer number of providers can be daunting, and finding one which can deliver a high-quality test at a
☐ ☆ ✇ The Hacker News

British Hacker Charged for Operating "The Real Deal" Dark Web Marketplace

By Ravie Lakshmanan — October 27th 2022 at 14:36
A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web marketplace called The Real Deal that specialized in the sales of hacking tools and stolen login credentials. Daniel Kaye, who went by a litany of pseudonyms Popopret, Bestbuy, UserL0ser, and Spdrman, has been charged with five counts of access device fraud and one count of money laundering conspiracy. Kaye was
☐ ☆ ✇ The Hacker News

FBI, CISA, and NSA Reveal How Hackers Targeted a Defense Industrial Base Organization

By Ravie Lakshmanan — October 5th 2022 at 08:12
U.S. cybersecurity and intelligence agencies on Tuesday disclosed that multiple nation-state hacking groups potentially targeted a "Defense Industrial Base (DIB) Sector organization's enterprise network" as part of a cyber espionage campaign. "[Advanced persistent threat] actors used an open-source toolkit called Impacket to gain their foothold within the environment and further compromise the
☐ ☆ ✇ The Hacker News

Improve your security posture with Wazuh, a free and open source XDR

By The Hacker News — September 28th 2022 at 12:15
Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find the right tools that help achieve a good posture. In many cases, organizations work with tools that do not integrate with each other and are expensive to purchase and maintain. Security posture management is a term used to describe the process of
☐ ☆ ✇ The Hacker News

Why Vulnerability Scanning is Critical for SOC 2

By The Hacker News — September 12th 2022 at 11:04
SOC 2 may be a voluntary standard, but for today's security-conscious business, it's a minimal requirement when considering a SaaS provider. Compliance can be a long and complicated process, but a scanner like Intruder makes it easy to tick the vulnerability management box. Security is critical for all organisations, including those that outsource key business operations to third parties like
☐ ☆ ✇ The Hacker News

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security

By Ravie Lakshmanan — September 6th 2022 at 06:47
A new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the criminal underground as a means for threat actors to bypass two-factor authentication (2FA) protections employed against online services. "EvilProxy actors are using reverse proxy and cookie injection methods to bypass 2FA authentication – proxifying victim's session," Resecurity researchers said in a Monday
☐ ☆ ✇ The Hacker News

Former CIA Engineer Convicted of Leaking 'Vault 7' Hacking Secrets to WikiLeaks

By Ravie Lakshmanan — July 14th 2022 at 15:06
Joshua Schulte, a former programmer with the U.S. Central Intelligence Agency (CIA), has been found guilty of leaking a trove of classified hacking tools and exploits dubbed Vault 7 to WikiLeaks. The 33-year-old engineer had been charged in June 2018 with unauthorized disclosure of classified information and theft of classified material. Schulte also faces a separate trial on charges related to
❌