At Least 100 Million Devices Affected by “NAME:WRECK” DNS Flaws in TCP/IP Stacks

At Least 100 Million Devices Affected by “NAME:WRECK” DNS Flaws in TCP/IP Stacks

Popular TCP/IP stacks are affected by a series of Domain Name System (DNS) vulnerabilities that could be exploited to take control of impacted devices, researchers with IoT security firm Forescout reveal. Collectively called NAME:WRECK and identified in the DNS implementations of FreeBSD, Nucleus NET, IPnet, and NetX, the flaws could also be abused to perform…

NSA Alerted Microsoft to New Exchange Server …

NSA Alerted Microsoft to New Exchange Server …

Microsoft today patched 114 CVEs to address the Exchange Server flaws, more than 50 remote code execution vulnerabilities, and one zero-day. Microsoft today issued fixes for 114 vulnerabilities as part of its monthly security update release, which this month addressed 19 critical flaws, four critical Microsoft Exchange Server bugs found by the National Security Agency (NSA),…

IAEA: We will assist Japan over Fukushima water plan

IAEA: We will assist Japan over Fukushima water plan

The International Atomic Energy Agency (IAEA) has said it will work with Japan “before, during and after” the country’s plan to release one million tonnes of contaminated water from the destroyed Fukushima nuclear plant into the sea. The director general Rafael Mariano Grossi told BBC World News that whatever option was taken it was about…

McAfee Sees COVID-19-Themed Threats and Powershell Malware Continue to Surge

McAfee Sees COVID-19-Themed Threats and Powershell Malware Continue to Surge

Key Findings McAfee sees COVID-19-themed cyber-attack detections increase by 114% in Q4 2020 Powershell threats grow 208% driven by Donoff malware New malware samples grow 10%; averaging 648 new threats per minute New ransomware increases 69%; Mobile malware grows 118% McAfee observes 3.1 million external attacks on cloud user accounts The Eternal Blue exploit was…

What Does It Take To Be a Cybersecurity Researcher? – KK Hack Labs

What Does It Take To Be a Cybersecurity Researcher? – KK Hack Labs

Behind the strategies and solutions needed to counter today’s cyber threats are—dedicated cybersecurity researchers. They spend their lives dissecting code and analyzing incident reports to discover how to stop the bad guys. But what drives these specialists? To understand the motivations for why these cybersecurity pros do what they do, we decided to talk with cybersecurity…

How can world’s wealthy change polluting behaviour?

How can world’s wealthy change polluting behaviour?

The world’s wealthiest need to reduce their carbon emissions to help tackle climate change, a report by the Cambridge Sustainability Commission has said. Highest global earners caused a 37% increase in global emissions over 25 years, the document said. For the majority of people making changes is about shifting infrastructure so we can get about…