Zeek 8.0 is nearly here, offering more flexibility along with a range of updates.
The release candidate is out now, take a closer look and see what's happening: https://community.zeek.org/t/zeek-feature-pre-release-8-0-0-rc1/7852

Zeek 8.0 is nearly here, offering more flexibility along with a range of updates.
The release candidate is out now, take a closer look and see what's happening: https://community.zeek.org/t/zeek-feature-pre-release-8-0-0-rc1/7852
Data & Programming Workshop: Core Concepts, Design, and Security
Server exposing only what I trust through carefully crafted NAT rules. It's not paranoia if you're actually in control of your digital realm, right?
As well, when I realised I can have my own VPN, honestly it was a game changer! I feel at home everywhere now
What is O-RAN, really?
O-RAN isn't just a buzzword — it's a structural shift in how we build radio access networks.
By moving away from proprietary, locked-in systems and toward open, cloud-native architectures, operators gain flexibility… but also inherit new risks.
At the beginning of this analysis, we lay the groundwork — defining what O-RAN is before unpacking the security implications throughout the session.
Watch the full webinar for the complete breakdown: https://app.getcontrast.io/register/p1-security-open-ran
https://www.europesays.com/2239840/ New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs #AI #ArtificialIntelligence #ComputerSecurity #CyberAttacks #CyberNews #CyberSecurityNews #CyberSecurityNewsToday #CyberSecurityUpdates #CyberUpdates #DataBreach #HackerNews #HackingNews #HowToHack #InformationSecurity #NetworkSecurity #RansomwareMalware #SoftwareVulnerability #TheHackerNews
https://www.europesays.com/us/60150/ New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs #ai #ArtificialIntelligence #ComputerSecurity #CyberAttacks #CyberNews #CyberSecurityNews #CyberSecurityNewsToday #CyberSecurityUpdates #CyberUpdates #DataBreach #HackerNews #HackingNews #HowToHack #InformationSecurity #NetworkSecurity #RansomwareMalware #SoftwareVulnerability #Technology #TheHackerNews #UnitedStates #UnitedStates #US
https://www.europesays.com/2216591/ Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission #ComputerSecurity #CyberAttacks #CyberNews #CyberSecurityNews #CyberSecurityNewsToday #CyberSecurityUpdates #CyberUpdates #Data #DataBreach #HackerNews #HackingNews #HowToHack #InformationSecurity #NetworkSecurity #RansomwareMalware #SoftwareVulnerability #TheHackerNews
@VXShare @StarkRG @jay @vildis @vxunderground OFC, if their corporate firewall didn't blocklist your domain, most #MITM-based "#NetworkSecurity" solutions and "#EndpointProtection" will checksum files and instantly yeet them into the shadow realm.
And lets be honest: Like with chemistry and medicine, one wants to have a supplier that isn't shady af but actually transparent.
https://www.europesays.com/2214207/ Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets #ComputerSecurity #crypto #cryptocurrency #CyberAttacks #CyberNews #CyberSecurityNews #CyberSecurityNewsToday #CyberSecurityUpdates #CyberUpdates #DataBreach #HackerNews #HackingNews #HowToHack #InformationSecurity #NetworkSecurity #RansomwareMalware #SoftwareVulnerability #TheHackerNews
Over the past few days I've installed some blocklists into the PowerDNS Recursor instances on our home network. This is similar to what a Pi-Hole does, but without needing a second hop for all the DNS queries to pass through.
Today, with some guidance from the lovely community in the PowerDNS IRC channel, I set up logging so I'll be able to see which queries were blocked (the requesting address and the QNAME). I've been watching it a bit for about an hour, and it's rather shocking. Opening the Slack app on my phone, which does not display any advertisements, triggered a flurry of DNS queries for various ad-related services.
It will be interesting watching this over the next week or two, partially to see if anything we regularly use is actually broken or even changed at all, and to see what the volume is.
Hey #InfoSec and #Cybersecurity folks. My company's conference, LogicON 2025, is coming up in Dublin, OH.
It's a solid event with practical tracks on compliance, automation, & security ops. Also, you can earn up to 16 CPE credits toward your ISC2 certification renewal.
No marketing fluff, just good info from fellow engineers & IT leaders. It's a great opportunity to learn something new.
Check out the agenda and register here: https://whova.com/portal/registration/f5t5MEwEspy9yLISAyVx/?source=s0mr5tpg
Coming soon: the 2025 Zeek Community Survey
We want to hear how you're using Zeek, what's working, and where we can improve. Your input will help guide how we support and grow the community. Survey launches June 23.
My new #DDoS book "DDoS: Understanding Real-Life Attacks and Mitigation Strategies" is now also available as an eBook!
Check it out here: https://ddos-book.com/
I’ve packed in everything I’ve learned from defending major German government sites against groups like Anonymous, Killnet, and NoName057(16).
It covers mitigations against #AI #crawlers and many other defenses for all network layers.
If you find it useful, I’d love it if you could boost and share to help more people defend themselves.
Thank you!
Are there any papers or blogs on security testing/evaluation of network cards and their drivers? I couldn't find anything with a quick search.
RDP turned against you
UNC5837 used PyRDP to turn native Windows features into attack tools: Phishing → .RDP file
PyRDP → session hijack + creds
RemoteApp → remote commands, local disguise
Drive mapping → silent data theft
Full kill chain + defense tips in comments.
#MDR
#Cybersecurity
#InfoSec
#NetworkSecurity
#DataProtection
Sunday, June 1, 2025
UK identifies Russia as an ‘immediate and pressing’ threat in new defense review — Ukraine’s enduring cyber defense: Assessing resilience and impact of shifting international support — European leaders shift focus to defending Ukraine without US support — Pompeo urges Trump not to legitimize Russia’s land grabs in Ukraine … and more
https://activitypub.writeworks.uk/2025/06/sunday-june-1-2025/
https://www.europesays.com/2120517/ ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach #ComputerSecurity #CyberAttacks #CyberNews #CyberSecurityNews #CyberSecurityNewsToday #CyberSecurityUpdates #CyberUpdates #Data #DataBreach #HackerNews #HackingNews #HowToHack #InformationSecurity #NetworkSecurity #RansomwareMalware #SoftwareVulnerability #TheHackerNews
I love the new zone management of the Unifi firewall. I feel more comfortable now being more granular in my rules. Before, I was using Cloudflare DNS proxy to only allow three countries to connect to my public services.
Now, I’m no longer using the DNS proxy, and my rule is done with Unifi. Other improvement, my public services are in an isolated VLAN and are available on IPv4 and IPv6.
Types of DNS Attacks You Should Know
The Domain Name System (DNS) is a core part of how the internet works — and it’s also a prime target for attackers. Understanding DNS attack types is essential for defending network infrastructure.
Common DNS Attack Types:
1. DNS Spoofing / Cache Poisoning
→ Injects false DNS data into a resolver's cache to redirect users to malicious sites.
2. DNS Tunneling
→ Encodes data into DNS queries/responses to exfiltrate data or establish covert C2 channels.
3. DNS Amplification (DDoS)
→ Exploits open DNS resolvers to flood a target with amplified traffic.
4. NXDOMAIN Attack
→ Overloads DNS servers with queries for nonexistent domains, degrading performance.
5. Domain Hijacking
→ Unauthorized changes to DNS records or domain ownership to take control of web traffic.
6. Typosquatting / Homograph Attacks
→ Uses lookalike domains to trick users into visiting malicious sites.
7. Subdomain Takeover
→ Targets misconfigured DNS entries pointing to expired resources (e.g., GitHub Pages, AWS buckets).
Why it matters:
DNS is often overlooked in security strategies, but it’s a critical attack surface. Proper monitoring, DNSSEC, and logging can reduce risk.
Disclaimer: This content is for educational and awareness purposes only.
Wireless Security Protocols Explained: WEP, WPA, WPA2 & WPA3
Understanding wireless security protocols is essential for protecting your network from unauthorized access and ensuring data confidentiality.
Key Protocols & Their Characteristics:
1. WEP (Wired Equivalent Privacy)
• Introduced in 1997
• Weak encryption (RC4), easily cracked
• Deprecated and insecure
2. WPA (Wi-Fi Protected Access)
• Interim solution after WEP
• Improved encryption with TKIP
• Still vulnerable to certain attacks
3. WPA2
• Widely used today
• Uses AES-based CCMP encryption
• Supports enterprise (RADIUS) and personal (PSK) modes
4. WPA3
• Latest standard with stronger security
• Resistant to brute-force attacks
• Supports SAE (Simultaneous Authentication of Equals)
• Enhanced encryption and forward secrecy
Why it matters:
Choosing the right wireless protocol significantly affects your network’s resilience against common attack vectors such as packet sniffing, replay attacks, and credential theft.
Disclaimer: This post is for educational and awareness purposes only. Always secure your wireless networks using the latest standards.