Security News Feed
824
Total Articles

Security News

Latest cybersecurity news from CISA, Krebs on Security, and other trusted sources

824
CVE Mentions
4
Sources
sans Jan 09, 2026 at 08:11

Malicious Process Environment Block Manipulation, (Fri, Jan 9th)

Reverse engineers must have a good understanding of the environment where malware are executed (read: the operating system). In a previous diary, I talked about malicious code that could be executed when loading a DLL[1]. Today, I&#x27ll show you how a malware can hide suspicious information related to created processes.

sans Jan 08, 2026 at 00:13

Analysis using Gephi with DShield Sensor Data, (Wed, Jan 7th)

I&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;m always looking for new ways of manipulating the data captured by my DShield sensor [1]. This time I used Gephi [2] and Graphiz [3] a popular and powerful tool for visualizing and exploring relationships between nodes, to examine the relationship between the source IP, filename and which sensor got a copy of the file. I queried the past 30 days of data stored in my ELK [4] database in Kibana using ES|QL [5][6] to query and export the data and import the result into Gephi. 

sans Jan 06, 2026 at 14:23

Tool Review: Tailsnitch, (Tue, Jan 6th)

In yesterday&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;s podcast, I mentioned "tailsnitch", a new tool to audit Tailscale configurations. Tailscale is an easy-to-use overlay to Wireguard. It is probably best compared to STUN servers in VoIP in that it allows devices behind NAT to connect directly to each other. Tailscale just helps negotiate the setup, and once the connection is established, data will flow directly between the connected devices. I personally use it to provide remote assistance to family members, and it has worked great for this purpose. Tailscale uses a "Freemium" model. For my use case, I do not need to pay, but if you have multiple users or a large number of devices, you may need to pay a monthly fee. There are also a few features that are only available to paid accounts.

sans Jan 05, 2026 at 17:33

Risks of OOB Access via IP KVM Devices, (Mon, Jan 5th)

Recently, a new "breed" of IP-based KVM devices has been released. In the past, IP-based KVM devices required dedicated "server-grade" hardware using IPMI. They often cost several $100 per server, and are only available for specific systems that support the respective add-on cards. These cards are usually used to provide "Lights Out" access to servers, allowing a complete reboot and interaction with the pre-boot environment via simple web-based tools. In some cases, these IPMI tools can also be used via various enterprise/data center management tools.

sans Jan 02, 2026 at 15:43

Debugging DNS response times with tshark, (Fri, Jan 2nd)

One of my holiday projects was to redo and optimize part of my home network. One of my homelab servers failed in November. I had only thrown&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xc2&#x3b;&&#x23&#x3b;x26&#x3b;&#x23&#x3b;xa0&#x3b;the replacement in the rack to get going, but some cleanup was needed. In addition, a lot of other "layer 1" issues had to be fixed by re-crimping some network drops and doing general network hygiene. The dust buny kind hygiene, not so much the critical controls type. After all, I don&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;t want things to overheat, and it is nice to see all network links syncing properly.

sans Dec 18, 2025 at 08:27

Positive trends related to public IP ranges from the year 2025, (Thu, Dec 18th)

Since the end of the year is quickly approaching, it is undoubtedly a good time to look back at what the past twelve months have brought to us… And given that the entire cyber security profession is about protecting various systems from “bad things” (and we&#x27ve all correspondingly seen more than our share of the “bad”), I thought that it might be pleasant to look at a few positive background trends that have accompanied us throughout the year, without us necessarily noticing…

About Security News

This feed aggregates the latest cybersecurity news from trusted sources to help you stay informed about emerging threats, vulnerabilities, and security trends.

Our Sources

  • CISA Alerts - Official US Gov
  • Krebs on Security
  • BleepingComputer
  • The Hacker News
  • Dark Reading
  • SANS ISC