The Linux Choice 🐧
368 subscribers
708 photos
133 videos
96 files
3.91K links
T-L-C is Channel Everything you need to know about Computer Technology and Security of latest News and Hacks. Also we work on pentesting we made this page to show the skils that we and other people could.Thanks for following us.Will be posting alot. 3301
Download Telegram
US-UK Gov Warning: SolarWinds Attackers Add Open-Source PenTest Tool to Arsenal
http://feedproxy.google.com/~r/Securityweek/~3/dDVgOs7Nb-E/us-uk-gov-warning-solarwinds-attackers-add-open-source-pentest-tool-arsenal

Agencies in the United States and the United Kingdom on Friday published a joint report providing more details on the activities of the Russian cyberspy group that is believed to be behind the attack on IT management company SolarWinds. The report reveals that the hackers started using the open-source adversary simulation framework Sliver after some of their operations were exposed.
read more (https://www.securityweek.com/us-uk-gov-warning-solarwinds-attackers-add-open-source-pentest-tool-arsenal)
Have you received an SMS with a link that says, “Register for vaccine using COVID-19 app”? Well, beware!...
The post Beware! Hackers target users with fake COVID-19 vaccine registration app (https://blogs.quickheal.com/beware-hackers-target-users-with-fake-covid-19-vaccine-registration-app/) appeared first on Quick Heal Blog | Latest computer security news, tips, and advice (https://blogs.quickheal.com/).
Deep dive into DNS zones: How to set them up and use them
https://techgenix.com/deep-dive-into-dns-zone/

Your DNS server can have many zones to better manage your network administration. Let’s take a close look at DNS zones, their types, and setups.
The post Deep dive into DNS zones: How to set them up and use them (https://techgenix.com/deep-dive-into-dns-zone/) appeared first on TechGenix (https://techgenix.com/).
Microsoft and Google cloud platforms leveraged for phishing attacks
https://techgenix.com/microsoft-and-google-cloud-phishing-attacks/

Microsoft 365 and Google cloud provide essential services. Unfortunately, cybercriminals are finding ways to use it for phishing scams.
The post Microsoft and Google cloud platforms leveraged for phishing attacks (https://techgenix.com/microsoft-and-google-cloud-phishing-attacks/) appeared first on TechGenix (https://techgenix.com/).
Lessons Learned From High-Profile Exploits
http://feedproxy.google.com/~r/securityweek/~3/9uwGHxxSgws/lessons-learned-high-profile-exploits

In 2020, malicious actors took full advantage of the expanded threat landscape created by the increase in remote work. We saw the reappearance of older malware targeting older, unpatched devices in home networks, a seven-fold increase in ransomware attacks, and one of the most significant supply chain hacks in recent years.
read more (https://www.securityweek.com/lessons-learned-high-profile-exploits)
Implementing Quality of Service Management for Hyper-V
https://techgenix.com/hyper-v-quality-of-service-management/

Microsoft Hyper-V includes a feature called Quality of Service Management that you can use to limit the amount of storage IOPS that a VM can consume.
The post Implementing Quality of Service Management for Hyper-V (https://techgenix.com/hyper-v-quality-of-service-management/) appeared first on TechGenix (https://techgenix.com/).