The end-to-end cybersecurity 5G testing lab will help identify and prevent cyberattacks on 5G networks.
from Dark Reading https://ift.tt/ogIDcur
via IFTTT
The end-to-end cybersecurity 5G testing lab will help identify and prevent cyberattacks on 5G networks.
from Dark Reading https://ift.tt/ogIDcur
via IFTTT
This week, we discuss all the news from Google I/O, including Android 13, translation glasses, and that fancy new wearable.
from Gear Latest https://ift.tt/EhJINjq
via IFTTT
This 4G router taps open source firmware to showcase advanced features at a budget price.
from Gear Latest https://ift.tt/Dd4POJo
via IFTTT
Motocross teens go for big air as they try to beat their rivals, bring out the best in each other and win it all in this high-speed series.
from New On Netflix USA https://ift.tt/1QYiZT9
via IFTTT
Seeking revenge for her tragic past, a mysterious woman embeds herself in a powerful family who possess a global beauty empire — and dark secrets.
from New On Netflix USA https://ift.tt/GVKC8E4
via IFTTT
This year’s Black Hat Asia is hybrid, with some sessions broadcast on the virtual platform and others live on stage in Singapore. News Desk is available on-demand with prerecorded interviews.
from Dark Reading https://ift.tt/kfbIn3D
via IFTTT
The U.S. Drug Enforcement Administration (DEA) says it is investigating reports that hackers gained unauthorized access to an agency portal that taps into 16 different federal law enforcement databases. KrebsOnSecurity has learned the alleged compromise is tied to a cybercrime and online harassment community that routinely impersonates police and government officials to harvest personal information on their targets.
Unidentified hackers shared this screenshot of alleged access to the Drug Enforcement Administration’s intelligence sharing portal.
On May 8, KrebsOnSecurity received a tip that hackers obtained a username and password for an authorized user of esp.usdoj.gov, which is the Law Enforcement Inquiry and Alerts (LEIA) system managed by the DEA.
KrebsOnSecurity shared information about the allegedly hijacked account with the DEA, the Federal Bureau of Investigation (FBI), and the Department of Justice, which houses both agencies. The DEA declined to comment on the validity of the claims, and issued only the briefest of statements about the matter in response to being notified.
“DEA takes cyber security and information of intrusions seriously and investigates all such reports to the fullest extent,” the agency said in a statement shared via email.
According to this page at the Justice Department website, LEIA “provides federated search capabilities for both EPIC and external database repositories,” including data classified as “law enforcement sensitive” and “mission sensitive” to the DEA.
A document published by the Obama administration in May 2016 (PDF) says the DEA’s El Paso Intelligence Center (EPIC) systems in Texas are available for use by federal, state, local and tribal law enforcement, as well as the Department of Defense and intelligence community.
EPIC and LEIA also have access to the DEA’s National Seizure System (NSS), which the DEA uses to identify property thought to have been purchased with the proceeds of criminal activity (think fancy cars, boats and homes seized from drug kingpins).
“The EPIC System Portal (ESP) enables vetted users to remotely and securely share intelligence, access the National Seizure System, conduct data analytics, and obtain information in support of criminal investigations or law enforcement operations,” the 2016 White House document reads. “Law Enforcement Inquiry and Alerts (LEIA) allows for a federated search of 16 Federal law enforcement databases.”
The screenshots shared with this author indicate the hackers could use EPIC to look up a variety of records, including those for motor vehicles, boats, firearms, aircraft, and even drones.
Claims about the purloined DEA access were shared with this author by “KT,” the current administrator of the Doxbin — a highly toxic online community that provides a forum for digging up personal information on people and posting it publicly.
[SIDE NOTE: Nearly two dozen domain names used by Doxbin were very recently included on the “Domain Block List” (DBL) maintained by Spamhaus, an anti-abuse group that many Internet service providers work with to block spam and malicious activity online. As a result, the Doxbin is currently unreachable on the open Internet].
As KrebsOnSecurity reported earlier this year, the previous owner of the Doxbin has been identified as the leader of LAPSUS$, a data extortion group that hacked into some of the world’s largest tech companies this year — including Microsoft, NVIDIA, Okta, Samsung and T-Mobile.
That reporting also showed how the core members of LAPSUS$ were involved in selling a service offering fraudulent Emergency Data Requests (EDRs), wherein the hackers use compromised police and government email accounts to file warrantless data requests with social media firms, mobile telephony providers and other technology firms, attesting that the information being requested can’t wait for a warrant because it relates to an urgent matter of life and death.
From the standpoint of individuals involved in filing these phony EDRs, access to databases and user accounts within the Department of Justice would be a major coup. But the data in EPIC would probably be far more valuable to organized crime rings or drug cartels, said Nicholas Weaver, a researcher for the International Computer Science Institute at University of California, Berkeley.
Weaver said it’s clear from the screenshots shared by the hackers that they could use their access not only to view sensitive information, but also submit false records to law enforcement and intelligence agency databases.
“I don’t think these [people] realize what they got, how much money the cartels would pay for access to this,” Weaver said. “Especially because as a cartel you don’t search for yourself you search for your enemies, so that even if it’s discovered there is no loss to you of putting things ONTO the DEA’s radar.”
The DEA’s EPIC portal login page.
The login page for esp.usdoj.gov (above) suggests that authorized users can access the site using a “Personal Identity Verification” or PIV card, which is a fairly strong form of authentication used government-wide to control access to federal facilities and information systems at each user’s appropriate security level.
However, the EPIC portal also appears to accept just a username and password, which would seem to radically diminish the security value of requiring users to present (or prove possession of) an authorized PIV card. Indeed, KT said the hacker who obtained this illicit access was able to log in using the stolen credentials alone, and that at no time did the portal prompt for a second authentication factor.
It’s not clear why there are still sensitive government databases being protected by nothing more than a username and password, but I’m willing to bet big money that this DEA portal is not only offender here. The DEA portal esp.usdoj.gov is listed on Page 87 of a Justice Department “data inventory,” which catalogs all of the data repositories that correspond to DOJ agencies.
There are 3,330 results. Granted, only some of those results are login portals, but that’s just within the Department of Justice.
If we assume for the moment that state-sponsored foreign hacking groups can gain access to sensitive government intelligence in the same way as teenage hacker groups like LAPSUS$, then it is long past time for the U.S. federal government to perform a top-to-bottom review of authentication requirements tied to any government portals that traffic in sensitive or privileged information.
I’ll say it because it needs to be said: The United States government is in urgent need of leadership on cybersecurity at the executive branch level — preferably someone who has the authority and political will to eventually disconnect any federal government agency data portals that fail to enforce strong, multi-factor authentication.
I realize this may be far more complex than it sounds, particularly when it comes to authenticating law enforcement personnel who access these systems without the benefit of a PIV card or government-issued device (state and local authorities, for example). It’s not going to be as simple as just turning on multi-factor authentication for every user, thanks in part to a broad diversity of technologies being used across the law enforcement landscape.
But when hackers can plunder 16 law enforcement databases, arbitrarily send out law enforcement alerts for specific people or vehicles, or potentially disrupt ongoing law enforcement operations — all because someone stole, found or bought a username and password — it’s time for drastic measures.
from Krebs on Security https://ift.tt/cNCakuH
via IFTTT
En Veracruz hoy la condición actual es Mostly Cloudy y una temperatura de 26C.

La máxima temperatura será de 29C y la mínima de 24C.
Durante el día la condición se pronostica como Partly Cloudy

Sunrise May 12, 2022 at 06:51AM
Sunset May 12, 2022 at 07:50PM
Viento con dirección North y velocidad de 5 Km/h
With a high of 85F and a low of 76F.
via IFTTT
Before you pull out your camera and post to social media, here’s how to protect yourself and others.
from Gear Latest https://ift.tt/cLa1MDY
via IFTTT

(adsbygoogle = window.adsbygoogle || []).push({});
Los desarrolladores del videojuego Dying Light, del que ya hemos comentado en LxA en otras ocasiones, ahora se han portado muy bien con sus fans y les han recompensado con una nueva actualización (Enhanced Edition), y un parche que ya está disponible y que traerá algunas cosas positivas para este título de videojuego. Así que, si ya lo tienes, puedes disfrutar en plenitud de la expansión The Following, así como el parche final. Todo gracias al esfuerzo que Techland, el estudio que ha creado este título, ha estado llevando a cabo en los últimos meses.
Todos los propietarios de Dying Light, al menos los de la plataforma Steam, podrán obtener la expansión The Following, Bozak Horde, Cuisine y Cargo, el paquete Ultimate Survivor, y el paquete de Crash Test. Prueba de que Techland sigue dando soporte a Dying Light y lo seguirá haciendo por muchos años, según parece.
(adsbygoogle = window.adsbygoogle || []).push({});
Por otro lado, lo que comentaba del parche es que Techland también ha lanzado un nuevo parche con bastantes mejoras. Es uno de esos parches de gran tamaño que incluyen muchos cambios y novedades para el DLC Hellraid de Dying Light. En este parche se incluyen una nueva arma, un arsenal re-elaborado por completo, nuevos consumibles, nuevas recompensas, y otras adiciones menores. En definitiva, todo lo necesario para contentar a los jugadores y que obtengan una experiencia mucho más satisfactoria.
El parche también va más allá de eso, y agrega nuevos tutoriales para varias partes del juego, lo que es de agradecer cuando te quedas atascado en algún lugar. También nuevos planos para crear, una revisión del modo Be The Zombie PvP, un gran número de errores corregidos, y más. También vas a encontrar un nuevo evento con los ingenieros gemelos locos Tolga y Fatin que tienen 2 nuevas recompensas disponibles y 3 King Mods como recompensas.
¡Y no olvides que hoy es el último día en el que va a estar de oferta este título! Si te das prisa te lo podrás llevar por un 60% menos del precio habitual…
(adsbygoogle = window.adsbygoogle || []).push({});
Más información y compra – Dying Light en Steam
from Linux Adictos https://ift.tt/gbBGxd7
via IFTTT