Search results

  1. Brother

    Федералы США закрыли связанный с Китаем "KV-ботнет", нацеленный на маршрутизаторы SOHO

    Правительство США в среду заявило, что предприняло шаги по нейтрализации ботнета, состоящего из сотен маршрутизаторов малого офиса и домашнего офиса в США (SOHO), захваченных связанным с Китаем государственным агентом по угрозам под названием Volt Typhoon, и ослабило воздействие хакерской...
  2. Brother

    Почему правильные показатели важны, когда дело доходит до управления уязвимостями

    Как продвигается ваша программа управления уязвимостями? Эффективна ли она? Успешна ли? Давайте будем честными, без правильных показателей или аналитики, как вы можете определить, насколько хорошо у вас идут дела, прогрессируете ли вы или получаете ли рентабельность инвестиций? Если вы не...
  3. Brother

    Уязвимые API-интерфейсы Docker подвергаются атаке в кампании криптоджекинга "Commando Cat"

    Открытые конечные точки Docker API через Интернет подвергаются атаке со стороны сложной кампании криптоджекинга под названием Commando Cat. "Кампания использует безопасный контейнер, созданный с помощью проекта Commando", - сказали исследователи безопасности Cado Нейт Билл и Мэтт Мьюир в новом...
  4. Brother

    FritzFrog возвращается с Log4Shell и PwnKit, распространяя вредоносное ПО внутри вашей сети

    Субъект угрозы, стоящий за одноранговой (P2P) ботнетом, известным как FritzFrog, вернулся с новым вариантом, который использует уязвимость Log4Shell для распространения внутри уже скомпрометированной сети. "Уязвимость используется методом грубой силы, который пытается нацелиться на как можно...
  5. Brother

    "Your hands are covered in blood": The US Senate calls Zuckerberg and other IT leaders to the carpet

    Recently, an open hearing was held, which was attended by the parents of young victims of online abuse. The US Senate Justice Committee held a hearing on combating online harassment of children. The leaders of the largest IT companies were summoned for questioning by the senators: Mark...
  6. Brother

    Microsoft asks Rust developers to rewrite core C# code

    Transition to Rust as a strategic decision in an era of technological change. Despite a two-percent reduction in the number of employees at Microsoft compared to last year, recruitment at the company, known for its Windows operating system, continues. This time, the company is forming a team of...
  7. Brother

    Vulnerability in GPT-4: rare languages force ChatGPT to give advice on theft and terrorism

    Translation into poorly understood languages allows you to bypass the security restrictions of OpenAI. A recent study by scientists from Brown University in the United States revealed that security restrictions that prevent the GPT-4 neural network from issuing malicious text from OpenAI can be...
  8. Brother

    The danger is over: American experts were able to fend off the attacks of Volt Typhoon

    However, neutralizing this cyber incident does not eliminate the risks of future intrusions into US infrastructure. The US authorities announced a successful counteraction to the Chinese state cyber operation aimed at introducing malware that could damage the country's civilian infrastructure...
  9. Brother

    Banks were offered to track the geolocation of customers to identify non-residents

    The Russian authorities are considering new powers for credit institutions in the tax sphere. The Ministry of Finance of Russia has put forward an initiative to oblige banks to constantly monitor the location of customers when they use Internet banking. If it turns out that a person mainly uses...
  10. Brother

    Import substitution of security systems: all about MaxPatrol SIEM

    On February 13, at 12:00 (Moscow time), a practical webinar on the SIEM system from Positive Technologies will be held. The event program includes: We'll show you how MaxPatrol SIEM collects data about IT assets and how the detailed inventory technology works. Let's look at how MaxPatrol SIEM...
  11. Brother

    Applications for PHDays are now open

    The event will be held in Luzhniki Stadium on May 23-26. Become a speaker at the cyber festival! The number of targeted cyber attacks continues to grow, artificial intelligence helps hackers improve their attack patterns, and leaks of sensitive data threaten almost all companies and their...
  12. Brother

    Ivanti vs hackers: patches for current threats and new 0day

    The company did not have time to fix the old problems, as new ones were immediately discovered. Ivanti has released a number of patches for vulnerable Connect Secure (ICS) and Policy Secure (IPS) gateways. However, in parallel, the company discovered two new zero-day vulnerabilities, one of...
  13. Brother

    Hacking or negligence? Binance's code and passwords have been available on GitHub for several months.

    Will the leak affect the security of clients and internal systems of the platform? An extremely sensitive array of data belonging to Binance has been located in the public GitHub repository for several months. As it became known to the publication 404 Media, the array contained codes...
  14. Brother

    No phishing: Italian hackers infect local organizations in a very old-fashioned way

    The UNC4990 group proved that even obsolete techniques are still quite effective. Cybercriminals known as UNC4990 have been active in Italy, using infected USB devices to attack various industries, including healthcare, transportation, construction and logistics. This was announced by Mandiant...
  15. Brother

    Morse Micro engineers set a new record for Wi-Fi range

    The technology was tested using a real-time video call. The American company Morse Micro, specializing in wireless technologies, has set a new record for the distance of data transmission over Wi-Fi. Using the relatively new HaLow standard (802.11 ah), the engineers managed to transmit the...
  16. Brother

    Phishing for dummies: how much does an entrance ticket to the world of cybercrime cost?

    Everyone can now run their own malicious campaign. Cybersecurity experts draw attention to the" democratization " of the phishing ecosystem due to the transformation of Telegram into the epicenter of cybercrime, which allows attackers to organize mass attacks for relatively little money...
  17. Brother

    Pawn Storm: Who is behind the group that has been hacking Global Organizations since 2004

    Trend Micro has identified new trends in the group's stealth attacks. A new report from Trend Micro reveals the actions of the Pawn Storm cybercrime group, which has been engaged in hacker attacks on important global organizations since 2004, using a variety of methods. Despite the seemingly...
  18. Brother

    End of cyber mafia: Myanmar extradites 10 ringleaders of criminal enclaves to China

    The fight against human trafficking and pig slaughter continues. Myanmar's law enforcement agencies handed over 10 members of organized cyber fraud groups to their Chinese counterparts. Among the detainees are the leaders of three well-known criminal clans. Such measures were a response to the...
  19. Brother

    Security first: CISA calls for tougher protection of routers

    The Volt Typhoon story forces the government to strengthen cybersecurity by any means necessary. The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have warned U.S. organizations of the growing threat of cyberattacks targeting small...
  20. Brother

    How to lose $27 million in a day? The cyberattack on Johnson Controls led to huge losses.

    Hackers from Dark Angels powerfully hit the wallet of an American company. The American corporation Johnson Controls, which develops industrial automation, security and air conditioning systems, confirmed that the cyber attack it suffered in September 2023 cost it $27 million in costs. In...
Top