Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Apr 08, 2023

=> today's howtos | This week in KDE: All about the apps

MSI confirms breach after Money Message ransomware gang hackers claim responsibility

=> ↺ MSI confirms breach after Money Message ransomware gang hackers claim responsibility

Micro-Star International Co. Ltd., the Taiwanese manufacturer of hardware for personal computers, confirmed earlier today that it suffered a breach of its systems after a new ransomware gang called “Money Message” claimed responsibility and revealed it stole source code from the company’s corporate network.

Ransomware gang releases new data stolen from the City of Oakland

=> ↺ Ransomware gang releases new data stolen from the City of Oakland

The post Ransomware gang releases new data stolen from the City of Oakland appeared first on SiliconANGLE.

=> ↺ Ransomware gang releases new data stolen from the City of Oakland | ↺ SiliconANGLE

=> ↺ Ransomware gang releases new data stolen from the City of Oakland | ↺ SiliconANGLE

Kali Linux Penetration Testing Tutorial: Step-By-Step Process

=> ↺ Kali Linux Penetration Testing Tutorial: Step-By-Step Process

Kali Linux turns 10 this year, and to celebrate, the Linux penetration testing distribution has added defensive security tools to its arsenal of open-source security tools.
It remains to be seen if Kali Purple will do for defensive open source security tools what Kali Linux has done for open source pentesting, but the addition of more than 100 open source tools for SIEM, incident response, intrusion detection and more should raise the profile of those defensive tools.
For now, Kali is primarily known for its roughly 600 open source pentesting tools, allowing pentesters to easily install a full range of offensive security tools.

New Money Message Ransomware Attacks Both Windows & Linux Users

=> ↺ New Money Message Ransomware Attacks Both Windows & Linux Users

Cyble Research and Intelligence Labs (CRIL) discovered a new ransomware group called Money Message. Both Windows and Linux operating systems are targeted by this ransomware, which can encrypt network shares. Experts believe that threat actors may use stealer logs in their operations.

Police shut down 'one of the most dangerous' cyber market dealing in stolen identities: Europol

=> ↺ Police shut down 'one of the most dangerous' cyber market dealing in stolen identities: Europol

The international police takedown the "most dangerous marketplace" which used to sell "stolen account credentials" to hackers worldwide, Europol said in a statement.
The law enforcement agency, carrying out the operation, involving 17 countries, on Tuesday, shut down the Genesis Market and its infrastructure seized.

Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days

=> ↺ Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days

The newest iOS 16.4.1 and iPadOS 16.4.1 patches a pair of code execution flaws that have already been exploited in the wild.

Apple Patching Two 0-Day Vulnerabilities in iOS and macOS, (Fri, Apr 7th)

=> ↺ Apple Patching Two 0-Day Vulnerabilities in iOS and macOS, (Fri, Apr 7th)

Apple today released updates for iOS and macOS (as well as Safari). The update fixes two vulnerabilities that are already being exploited:

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/04/08/Security_Leftovers.3.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
143.343973 milliseconds
Gemini-to-HTML Time
0.736621 milliseconds

This content has been proxied by September (ba2dc).