Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Sep 02, 2023

=> August Edition of PCLinuxOS KDE available (UPDATED) | KDE: Snaps and KRunner Updates

Spyware Vendor Hacked

=> ↺ Spyware Vendor Hacked

A Brazilian spyware app vendor was hacked by activists:

=> ↺ hacked

=> ↺ hacked

In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs

=> ↺ In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs

Weekly cybersecurity news roundup providing a summary of noteworthy stories that might have slipped under the radar.

Exploit Code Published for Critical-Severity VMware Security Defect

=> ↺ Exploit Code Published for Critical-Severity VMware Security Defect

Exploit code and root-cause analysis released by SinSinology documents the problem as a case where VMWare “forgot to regenerate” SSH keys.

What is the origin of passwords submitted to honeypots?, (Sat, Sep 2nd)

=> ↺ What is the origin of passwords submitted to honeypots?, (Sat, Sep 2nd)

DShield honeypots collect a variety of data, including passwords, that are submitted from SSH and telnet attacks.

Free Decryptor Available for ‘Key Group’ Ransomware

=> ↺ Free Decryptor Available for ‘Key Group’ Ransomware

EclecticIQ has released a free decryption tool to help victims of the Key Group ransomware recover their data without paying a ransom.

Industry Reactions to Qakbot Botnet Disruption: Feedback Friday

=> ↺ Industry Reactions to Qakbot Botnet Disruption: Feedback Friday

Industry professionals comment on the law enforcement operation targeting the Qakbot botnet and its implications.

Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer

=> ↺ Threat Actors Adopt, Modify Open Source ‘SapphireStealer’ Information Stealer

Cisco has observed multiple threat actors adopting the SapphireStealer information stealer after its source code was released on GitHub.

UK’s NCSC Warns Against Cybersecurity Attacks on AI

=> ↺ UK’s NCSC Warns Against Cybersecurity Attacks on AI

The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can mitigate the risks.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/09/02/Security_Leftovers.2.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
142.429989 milliseconds
Gemini-to-HTML Time
1.716786 milliseconds

This content has been proxied by September (ba2dc).