• Home
    • All Categories
    • Individual Categories
  • Recent
  • Tags
  • Popular
Collapse
Hostrisk Security Platform

Hostrisk

    • Light
    • Dim
    • Dark
BDS Linux LKM Ftrace-Based Rootkit
CerberusC

Ftrace-based Linux loadable kernel module rootkit for Linux kernel versions 5.x and 6.x on x86_64. It hides files, hides process, hides a bind shell and reverse shell port, provides privilege escalation, and cleans up logs and bash history during installation.

BDS Linux LKM Ftrace-Based Rootkit ≈ Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

favicon

(packetstormsecurity.com)

Tools
BDS FreeBSD KLD Rootkit
CerberusC

BDS Freebsd KLD rootkit for FreeBSD 13 that hides files, hides processes, hides ports, and has a bind shell backdoor.

BDS FreeBSD KLD Rootkit ≈ Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

favicon

(packetstormsecurity.com)

Tools
Risk management legislation introduced to House of Representatives
CerberusC

The National Risk Management Act, designed to strengthen the defense of critical infrastructure, was introduced to the U.S. House of Representatives.

Risk management legislation introduced to House of Representatives

The National Risk Management Act, designed to strengthen the defense of critical infrastructure, was introduced to the U.S. House of Representatives.

favicon

(www.securitymagazine.com)

General
S&P 500 companies find gaps in their cybersecurity leadership
CerberusC

A report found that S&P 500 organizations have gaps in their cybersecurity leadership (CISOs and/or CIOs) when it comes to risk mitigation.

https://www.securitymagazine.com/articles/99934-s-and-p-500-companies-find-gaps-in-their-cybersecurity-leadership

General
57% of LockBit victims were organizations with 200 employees or fewer
CerberusC

A Trend Micro Incorporated report found that many ransomware actors are targeting smaller organizations that have 200 or fewer employees.

57% of LockBit victims were organizations with 200 employees or fewer

A Trend Micro Incorporated report found that many ransomware actors are targeting smaller organizations that have 200 or fewer employees.

favicon

(www.securitymagazine.com)

General
Best practices for effectively securing sensitive data
CerberusC

https://www.securitymagazine.com/articles/99931-best-practices-for-effectively-securing-sensitive-data

General
97% of organizations take over a month to respond to bot attacks
CerberusC

A recent report by Netacea analyzed the affect of bot attacks and found that the average business loses 4.3%, of online revenues every year to bots.

97% of organizations take over a month to respond to bot attacks

A recent report by Netacea analyzed the affect of bot attacks and found that the average business loses 4.3%, of online revenues every year to bots.

favicon

(www.securitymagazine.com)

General
CISA holds cybersecurity exercise in preparation for Super Bowl LVIII
CerberusC

CISA, NFL, Allegiant Stadium and Super Bowl LVIII partners held a tabletop exercise this week to enhance cybersecurity response capabilities, plans and procedures.

CISA holds cybersecurity exercise in preparation for Super Bowl LVIII

CISA, NFL, Allegiant Stadium and Super Bowl LVIII partners held a tabletop exercise this week to enhance cybersecurity response capabilities, plans and procedures.

favicon

(www.securitymagazine.com)

General
19% of organizations are prioritizing data visibility and remediation
CerberusC

According to a SpyCloud ransomware report, infostealer infections were 22% of ransomware attacks for North American and European companies.

19% of organizations are prioritizing data visibility and remediation

According to a SpyCloud ransomware report, infostealer infections were 22% of ransomware attacks for North American and European companies.

favicon

(www.securitymagazine.com)

General
BDS Linux LKM Rootkit
CerberusC

The BDS LKM rootkit is a simple and stable Linux loadable kernel module rootkit for Linux kernel versions 5.x and 6.x on x86_64 that hide files, hide processes, hides a bind shell and reverse shell port, provides privilege escalation, provides rootkit persistence, and cleans up logs and bash history during installation.

BDS Linux LKM Rootkit ≈ Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

favicon

(packetstormsecurity.com)

Tools
BDS Linux Userland Rootkit
CerberusC

The BDS Userland rootkit is a Linux userland rootkit. It hides files, directories, processes, the bind shell port, the daemon port, and the reverse shell port. It also cleans up bash history and logs during installation.

BDS Linux Userland Rootkit ≈ Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

favicon

(packetstormsecurity.com)

Tools
Cloud adoption is driving up IT budgets
CerberusC

The impact of cloud adoption on IT teams was analyzed in a report, finding that cloud platforms took up significant portions of IT budgets.

Cloud adoption is driving up IT budgets

The impact of cloud adoption on IT teams was analyzed in a report, finding that cloud platforms took up significant portions of IT budgets.

favicon

(www.securitymagazine.com)

General
School security without the alarm
CerberusC

Research into safer school design indicates that most traditional security measures have pros and cons — especially in how they can influence students’ attitudes on their school’s security.

School security without the alarm

Research into safer school design indicates that most traditional security measures have pros and cons — especially in how they can influence students’ attitudes on their school’s security.

favicon

(www.securitymagazine.com)

General
Digital Forensics Round-Up, September 21 2023
CerberusC

A round-up of this week’s digital forensics news and views:

Android Now Harder To Crack Than IPhones: Forensics Detectives

A recent breakthrough in forensic technology has brought about a major shift in the constant battle between Android and iPhone security…… Read more

The post Digital Forensics Round-Up, September 21 2023 appeared first on Forensic Focus.

Just a moment...

favicon

(www.forensicfocus.com)

Forensics
Ransomware cyber insurance claims rose by 27%
CerberusC

Cyber insurance claims and trends were analyzed in a recent report finding a 12% increase in cyber claims over the first six months of the year.

Ransomware cyber insurance claims rose by 27%

Cyber insurance claims and trends were analyzed in a recent report finding a 12% increase in cyber claims over the first six months of the year.

favicon

(www.securitymagazine.com)

General
AMA: Healthcare Security Leader Edition
CerberusC

In this AMA episode, Holly Rasche, Director of Security Management Services at Northwest Community Healthcare, shares lessons from her 26-year career.

https://www.securitymagazine.com/articles/99907-ama-healthcare-security-leader-edition

General
55% of insider threats come from a negligent or mistaken insider
CerberusC

The causes and costs of insider threats were analyzed in a recent report that found that the average annual cost of an insider risk has increased 40%.

55% of insider threats come from a negligent or mistaken insider

The causes and costs of insider threats were analyzed in a recent report that found that the average annual cost of an insider risk has increased 40%.

favicon

(www.securitymagazine.com)

General
57% of small and medium enterprises experienced a cybersecurity breach
CerberusC

Small and medium enterprises were analyzed in a recent report by Guardz. According to the report, 57% of SMEs have experienced a cybersecurity breach.

57% of small and medium enterprises experienced a cybersecurity breach

Small and medium enterprises were analyzed in a recent report by Guardz. According to the report, 57% of SMEs have experienced a cybersecurity breach.

favicon

(www.securitymagazine.com)

General
How To Review Mobile Forensics Evidence With Mobile Device Investigator
CerberusC

Data analysis can quickly become overwhelming without proper organization tools. Extracting, analyzing, and reporting on this data efficiently is of paramount importance to investigators.

Mobile Device Investigator (MDI), the analysis section of Mobile Device Investigator, is an invaluable asset for… Read more

The post How To Review Mobile Forensics Evidence With Mobile Device Investigator appeared first on Forensic Focus.

Just a moment...

favicon

(www.forensicfocus.com)

Forensics
Be the threat: Case for hands-on threat simulations in cybersecurity
CerberusC

The cyber threat landscape demands that organizations equip cybersecurity teams with the necessary skills to detect, respond and defend against malicious attacks.

Be the threat: Case for hands-on threat simulations in cybersecurity

The cyber threat landscape demands that organizations equip cybersecurity teams with the necessary skills to detect, respond and defend against malicious attacks.

favicon

(www.securitymagazine.com)

General
  • Blog

    Blog posts written by phenomlab

    0 Topics
    0 Posts
    No new posts.
  • DDoS

    Discussion related to Privacy

    89 Topics
    89 Posts
    CerberusC

    Marlborough, MA – September 20, 2023: Corero Network Security (LON: CNS), the specialists in distributed denial of service (DDoS) protection solutions, and Akamai Technologies, Inc., the cloud company that powers and protects life online, have entered into a global partnership agreement with Akamai now offering Corero on-premises DDoS protection to extend Akamai Prolexic, Akamai’s own […]

    Read More… from Corero and Akamai Announce Global Partnership

    The post Corero and Akamai Announce Global Partnership appeared first on Corero.

    Corero and Akamai Announce Global Partnership - Corero

    Corero and Akamai announce a global partnership for enhanced DDoS protection with new Prolexic On-Prem (powered by Corero) & Prolexic Hybrid.

    favicon

    Corero (www.corero.com)

  • Disclosures

    Discussion related to Privacy

    0 Topics
    0 Posts
    No new posts.
  • Forensics

    Discussion related to Privacy

    610 Topics
    610 Posts
    CerberusC

    A round-up of this week’s digital forensics news and views:

    Android Now Harder To Crack Than IPhones: Forensics Detectives

    A recent breakthrough in forensic technology has brought about a major shift in the constant battle between Android and iPhone security…… Read more

    The post Digital Forensics Round-Up, September 21 2023 appeared first on Forensic Focus.

    Just a moment...

    favicon

    (www.forensicfocus.com)

  • General

    All discussions that don't fall under a specific category

    3366 Topics
    3366 Posts
    CerberusC

    The National Risk Management Act, designed to strengthen the defense of critical infrastructure, was introduced to the U.S. House of Representatives.

    Risk management legislation introduced to House of Representatives

    The National Risk Management Act, designed to strengthen the defense of critical infrastructure, was introduced to the U.S. House of Representatives.

    favicon

    (www.securitymagazine.com)

  • Malware

    Security and Technology news from various third party sources. All attribution remains the property of the original authors

    351 Topics
    351 Posts
    CerberusC

    Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

    Watering Hole Attacks Push ScanBox Keylogger

    Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

    favicon

    (threatpost.com)

  • Phishing

    Third party news from technology sources

    4 Topics
    4 Posts
    CerberusC

    47% Phishing Increase in Q1 Phishing is on the rise. PhishLabs identified 47% more phishing sites in Q1 of 2021 than there were in Q1 of 2020.  This trend is continuing as Q2 attacks are also up significantly year-over-year.

    https://info.phishlabs.com/blog/47-phishing-increase-in-q1

  • Privacy

    Discussion related to Privacy

    59 Topics
    59 Posts
    CerberusC

    Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

    Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

    Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

    favicon

    (threatpost.com)

  • Research

    Security and Technology news from various third party sources. All attribution remains the property of the original authors

    132 Topics
    132 Posts
    CerberusC

    Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still […]

    The post “Authorized” to break in: Adversaries use valid credentials to compromise cloud environments appeared first on Security Intelligence.

    Page not found - Security Intelligence

    favicon

    Security Intelligence (securityintelligence.com)

  • Risk

    Security and Technology news from various third party sources. All attribution remains the property of the original authors

    203 Topics
    203 Posts
    CerberusC

    Analysis of Latest Health Data Breaches on the HHS OCR ‘Wall of Shame’
    Ransomware incidents are becoming a major cause of health data breaches affecting millions of individuals that have been reported so far in 2021, according to the latest additions to the federal tally. What else is topping the list?

    Ransomware Incidents Among Largest Breaches on Federal Tally

    Ransomware incidents are becoming a major cause of health data breaches affecting millions of individuals that have been reported so far in 2021, according to the

    favicon

    (www.inforisktoday.co.uk)

  • Security

    Third party news from security sources

    0 Topics
    0 Posts
    No new posts.
  • Technology

    Third party news from technology sources

    0 Topics
    0 Posts
    No new posts.
  • Tools

    Third party news from technology sources

    332 Topics
    332 Posts
    CerberusC

    Ftrace-based Linux loadable kernel module rootkit for Linux kernel versions 5.x and 6.x on x86_64. It hides files, hides process, hides a bind shell and reverse shell port, provides privilege escalation, and cleans up logs and bash history during installation.

    BDS Linux LKM Ftrace-Based Rootkit ≈ Packet Storm

    Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

    favicon

    (packetstormsecurity.com)

  • Vulnerabilities

    Discussion related to Vulnerabilities

    346 Topics
    346 Posts
    CerberusC

    Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

    Ransomware Attacks are on the Rise

    Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

    favicon

    (threatpost.com)

  • Whaling

    Security and Technology news from various third party sources. All attribution remains the property of the original authors

    0 Topics
    0 Posts
    No new posts.
  • 1 / 1
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Home
    • All Categories
    • Individual Categories
  • Recent
  • Tags
  • Popular
  • Login

  • Login or register to search.