Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Google Patches the First Zero-Day in Chrome for 2022

Google has announced the release of a new version of Chrome. The new version comes with fixes for eight vulnerabilities. Once of these vulnerabilities CVE-2022-0609, which is describes as a user-after-free vulnerability is already being exploited in the wild. This has led them to advise users to updated Chrome as soon as possible to avoid compromise. The flaws were found by Google’s own Threat Analysis Group.

Details
By Sean Kalinich
Sean Kalinich
Feb 15
Hits: 1656
  • Google
  • Security
  • ZeroDay
  • Chrome
  • 0Day
  • Vulnerability
  • Bugs
  • Patching
  • threat analysis group

Read more: Google Patches the First Zero-Day in Chrome for...

No comments on “Google Patches the First Zero-Day in Chrome for 2022”
Security Talk

Network Management Software from Moxa Has Five Critical Bugs that Could Allow for an RCE Attack

Management and a monitoring software are ubiquitous in the IT operation industry. They are force multipliers that allow for what are usually small teams to manage a large number of assets. By design they need to have elevated permission to accomplish their intended tasks. The problem is that these permissions also make them targets for attackers. This means that developers of these tools need to take extra steps to ensure that they are not vulnerable to attack or become the thing that compromises a network.

Details
By Sean Kalinich
Sean Kalinich
Feb 14
Hits: 1115
  • Security
  • Vulnerabilities
  • rce
  • network monitoring
  • mxview
  • moxa
  • cves

Read more: Network Management Software from Moxa Has Five...

No comments on “Network Management Software from Moxa Has Five Critical Bugs that Could Allow for an RCE Attack”
Security Talk

Hacking Groups that Plant Fake Evidence Identified in Trukey and India, Where Else are They?

SentinelOne’s threat team has been tracking a couple of threat groups with an unusual goal. These groups are not looking to steal money or get a ransom, instead they are looking to track, monitor and incriminate specific targets. The targets that have been identified so far have been journalists and activists that oppose government practices. So far, the countries where these groups have been identified are limited to India and Trukey but if threat groups like this have been found there, it is likely they are everywhere.

Details
By Sean Kalinich
Sean Kalinich
Feb 14
Hits: 1324
  • Hacking
  • Security
  • sentinelone
  • modifiedelephant
  • digital evidence

Read more: Hacking Groups that Plant Fake Evidence...

No comments on “Hacking Groups that Plant Fake Evidence Identified in Trukey and India, Where Else are They?”
Security Talk

Russia Shutters Four Marketplaces for Stolen Credit Cards on the Dark Web

The Dark Web (whispered in Letterkenny) is a playground for all kinds of illegal activity. One well traded item is Personal Information including Credit Card numbers. Due to the state of security in most organizations (Stuart!) there is no shortage of personally identifying information and credit cards for sale. There is a lot of money that trades hands around this as well, so it has been and will continue to be a target for law enforcement in the constant battle against the financial threat actor groups.

Details
By Sean Kalinich
Sean Kalinich
Feb 11
Hits: 1313
  • Security
  • Law Enforcement
  • Credit Card Theft
  • dark web
  • dark net

Read more: Russia Shutters Four Marketplaces for Stolen...

No comments on “Russia Shutters Four Marketplaces for Stolen Credit Cards on the Dark Web”
Security Talk

Linux Attacks and Malware on the Rise as the Workforce Shifts to Remote

The shift to services like AWS, GCP and more have meant that many organizations are also making a shift away from the Microsoft Windows platform and moving to a Linux centric environment and while this is a good move for the most part, it has left many open to exploit due to improper configurations and a lack of proper security tools to protect their environments.

Details
By Sean Kalinich
Sean Kalinich
Feb 11
Hits: 1050
  • Malware
  • Linux
  • Amazon Web Services
  • AWS
  • Ransomware
  • gcp
  • google cloud
  • cryptominning

Read more: Linux Attacks and Malware on the Rise as the...

No comments on “Linux Attacks and Malware on the Rise as the Workforce Shifts to Remote”

More Articles …

  1. Web Site Data Analytics Gathering May Violate GDPR, Google Analytics Does.
  2. Strategy, Tactics, and Logistics. How They Fit into the Threat Landscape
  3. Activision is Not the Only Purchase Microsoft is Eying as Rumors Pop Up Around a Mandiant Buy
  4. UEFI Bootkits and Malware are Becoming More Common as Attackers Refine their Techniques.
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

Page 24 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech