cybersecurity

4815 readers
40 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
801
 
 

Article published by AlternativeTo yesterday. Visiting the VirusTotal website I could not find an official sources or response, let's see how this develops.

EDIT: Source appears to be the German news outlet Der Spiegel, here is a link (no paywall)

802
 
 

Hi all,

I did a lot of research, but got the point where I wonder: Is there any real meaningful infosec certification a company could gain?

I can follow a lot of frameworks and do certifications on them (like ISO 27001, NIST CSF, ISACA COBIT, TISAX, etc.), but they all are looking at documents and processes which kind of prove the mindset, but not actual security.

I think about something like "company survived a 5-day pentest or regulary does blue team exercises", etc., which show that the company can detect and respond and not only write documents.

Does anyone know about something like that? Or does this simply don't exists yet?

Thanks for the input!

803
804
10
submitted 2 years ago* (last edited 2 years ago) by tedu@az1.azorius.net to c/cybersecurity
 
 

Fix CVE-2023-38408 - a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if the following conditions are met:

  • Exploitation requires the presence of specific libraries on the victim system.
  • Remote exploitation requires that the agent was forwarded to an attacker-controlled system.

In addition to removing the main precondition for exploitation, this release removes the ability for remote ssh-agent(1) clients to load PKCS#11 modules by default (see below).

805
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

806
807
 
 

Weekly thread to discuss industry certifications, trainings and other courses/learning. Ask questions, share your experiences and help others!

808
809
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

810
 
 

@cybersecurity hi i want to that if comptia N+ and security+ and ISACA are enough to get an entry level job in cybersecurity.

811
 
 

Storm-0558 used forged authentication tokens to access user email from approximately 25 organizations, including government agencies and related consumer accounts in the public cloud

Not very low level, but good details on some of the threat actor activities.

812
813
11
Crown Jewels Analysis (shellsharks.com)
submitted 2 years ago by shellsharks to c/cybersecurity
 
 

A primer on “Crown Jewels Analysis” (ala MITRE)

814
815
34
Infosec Engineer AMA (self.cybersecurity)
submitted 2 years ago by shellsharks to c/cybersecurity
 
 

Hello! My name is Mike and I am an infosec engineer with 10+ years experience. I've worked in GRC, Vulnerability Management, PenTesting & AppSec. I have 17 SANS certs (I have a serious problem) and I'm also an infosec community enthusiast and creator/mod for /c/cybersecurity. AMA!

816
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

817
10
submitted 2 years ago* (last edited 2 years ago) by shellsharks to c/cybersecurity
 
 

Hey everyone! My name is Mike and I write about #infosec, #tech and other things at https://shellsharks.com. I'm currently running an event this week I refer to as >Shark Week (https://shellsharks.com/sharkweek), which is essentially just me posting some sort of "content" each day for the entire week, coinciding with actual shark week (https://www.discovery.com/shark-week) on Discovery.

Appreciate a follow, boost and/or feedback on the site/posts. Thanks so much! 🦈🦈🦈

Kicking off >Shark Week, I wanted to share everywhere I am these days. I'll admit I am most active on Mastodon but like to maintain some form of presence other places. So connect with me wherever or everywhere!

Thanks again!

818
 
 

Weekly thread to discuss industry certifications, trainings and other courses/learning. Ask questions, share your experiences and help others!

819
 
 

Sorry if this was already posted, I just subscribed to this community and didn't see a related article replicated to my lemmy instance yet.

820
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

821
822
 
 

Become a cybersecurity champion

Want to train up to take on today’s biggest cybersecurity challenges? Go from zero to hero with this comprehensive bundle of courses from Packt. Focus on the fundamentals, and build up advanced skills through hands-on training. Learn how to write secure code, test your systems’ defenses, how to be an ethical hacker, and more—and help support World Wildlife Fund with your purchase!

Pay at least $25 for the entire bundle

823
 
 

(Crosspost) Summary:

Meduza Stealer is a malware that targets Windows users and organizations. It is specifically designed to steal data from browsers, including login credentials, browsing history, and cookies. It can also steal data from password managers, 2FA apps, cryptocurrency wallets, and gaming extensions The malware is distributed through a variety of channels, including cybercrime forums and Telegram channels. It is difficult to detect because it does not use obfuscation techniques. Once it is installed, the malware will connect to a remote server and upload the stolen data. The malware is specifically designed to target Windows users, but it could be adapted to target other platforms in the future. The malware is not currently very widespread, but it has the potential to become more widespread in the future. The malware is still under development, so it is possible that it will be updated with new features or capabilities. Defensive measures suggested:

Regularly install updates for your operating system, browsers, and installed applications to patch vulnerabilities that malware can exploit. Be cautious when downloading files or opening email attachments, especially from unknown sources. Scan files using security software before opening them. Employ strong and unique passwords for all your accounts, including browsers, email, and cryptocurrency wallets. Consider using a password manager to securely store and manage your passwords. Enable 2FA wherever possible to add an extra layer of security to your accounts. This helps protect against unauthorized access, even if passwords are compromised. Only install browser extensions from trusted sources. Regularly review and remove unnecessary or suspicious extensions to minimize the risk of malware interference. Keep a close eye on your financial accounts, including cryptocurrency wallets, and regularly review transaction history for any suspicious activities. Report any unauthorized transactions or security breaches immediately. There are no details about what kind of information it can steal from the Password manager extensions.

824
825
 
 

Hello, I am looking for a PDF Reader that works on Linux and does not execute Javascript or other hidden executable code even if the PDF is infected. Is there such thing?

view more: ‹ prev next ›