The Linux Choice 🐧
368 subscribers
708 photos
133 videos
96 files
3.91K links
T-L-C is Channel Everything you need to know about Computer Technology and Security of latest News and Hacks. Also we work on pentesting we made this page to show the skils that we and other people could.Thanks for following us.Will be posting alot. 3301
Download Telegram
NurseryCam daycare monitor suffers data breach, according to UK media
http://techgenix.com/nurserycam-data-breach/

The UK app NurseryCam appears to have suffered a data breach — after the company may have ignored previous warnings about vulnerabilities.
The post NurseryCam daycare monitor suffers data breach, according to UK media (http://techgenix.com/nurserycam-data-breach/) appeared first on TechGenix (http://techgenix.com/).
The Race to Find Profits in Securing Email
http://feedproxy.google.com/~r/Securityweek/~3/z_E9qaXcx4E/race-find-profits-securing-email

NEWS ANALYSIS --  More than 17 years after Bill Gates’s famous declaration that the spam problem was close to being solved for good, the corporate inbox continues to be a lucrative target for malicious hackers.  Now, a wave of well-funded email security startups are emerging to take another stab at securing the entry point for almost all major cyber attacks.
read more (https://www.securityweek.com/race-find-profits-securing-email)
New Kubernetes management tool GKE Autopilot unveiled
http://techgenix.com/gke-autopilot-kubernetes/

Kubernetes is the go-to tool for container orchestration. But optimizing it for your needs can be frustrating. GKE Autopilot may be the answer.
The post New Kubernetes management tool GKE Autopilot unveiled (http://techgenix.com/gke-autopilot-kubernetes/) appeared first on TechGenix (http://techgenix.com/).
Here's How North Korean Hackers Stole Data From Isolated Network Segment
http://feedproxy.google.com/~r/Securityweek/~3/W31waojQwU8/heres-how-north-korean-hackers-stole-data-isolated-network-segment

During an attack on the defense industry, the North Korea-linked threat group known as Lazarus was able to exfiltrate data from a restricted network segment by taking control of a router and setting it up as a proxy server.
read more (https://www.securityweek.com/heres-how-north-korean-hackers-stole-data-isolated-network-segment)
Vendor Quickly Patches Serious Vulnerability in NATO-Approved Firewall
http://feedproxy.google.com/~r/Securityweek/~3/F4Pj6bIs3Wo/vendor-quickly-patches-serious-vulnerability-nato-approved-firewall

A critical vulnerability discovered in a firewall appliance made by Germany-based cybersecurity company Genua could be useful to threat actors once they’ve gained access to an organization’s network, according to Austrian cybersecurity consultancy SEC Consult.
read more (https://www.securityweek.com/vendor-quickly-patches-serious-vulnerability-nato-approved-firewall)
Privilege Escalation Bugs Patched in Linux Kernel
http://feedproxy.google.com/~r/Securityweek/~3/fM4tpa43cZY/privilege-escalation-bugs-patched-linux-kernel

A total of five vulnerabilities that could lead to local privilege escalation were recently identified and fixed in the Linux kernel.
Identified by Positive Technologies security researcher Alexander Popov, the high severity bugs resided in the virtual socket implementation of the Linux kernel.
read more (https://www.securityweek.com/privilege-escalation-bugs-patched-linux-kernel)
Millions of COVID-19 test results leaked in India
http://techgenix.com/covid-19-test-results-leaked/

Sensitive COVID-19 test results have again leaked from the Indian government, a situation that could engender a swath of cybercrimes.
The post Millions of COVID-19 test results leaked in India (http://techgenix.com/covid-19-test-results-leaked/) appeared first on TechGenix (http://techgenix.com/).
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.

This will help you to decrease the time to uncover suspicious activity and the tool will make good use of the windows event logs collected and make sure to not miss critical events configured to be detected.
The target audience for APT-Hunter is threat hunters, incident response professionals or forensic investigators.
Read the rest of APT-Hunter – Threat Hunting Tool via Windows Event Log now! Only available at Darknet. (https://www.darknet.org.uk/2021/03/apt-hunter-threat-hunting-tool-via-windows-event-log/)
An absolute beginner’s guide to Microsoft Hyper-V revisited
http://techgenix.com/beginners-guide-to-hyper-v-revisited/

Want to take the plunge into virtual machines? This guide for Microsoft’s Hyper-V will get even beginners up-and-running faster than you think.
The post An absolute beginner’s guide to Microsoft Hyper-V revisited (http://techgenix.com/beginners-guide-to-hyper-v-revisited/) appeared first on TechGenix (http://techgenix.com/).