Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?

Alexandre Blanc CyberSecurity weekly cyber linkedin
Sept 2021, and criminals are still winning the game, despite all the cloud sparkles

Each week is a learning opportunity, we learn from incidents, we learn from vulnerabilities, we learn from others, and we learn while sharing. Yet, all claiming to have the silver bullet, and in reality, it’s just widely inapplicable to the reality of businesses.

The tech world is echoing so strongly its own stuff, that it doesn’t hear the market and businesses anymore. All sailing in a digital storm in a weak boat, trying to stay afloat, while pirates, whoever their sponsor are, are riding on jet-skis with extreme agility.

The cloud is like a big ship, offering for smaller ones (SMBs etc) to host their critical assets, but the cloud, is also a huge marketplace, and you have no idea about what happen to your assets in these big ships, but one thing is sure, the space is expensive, and loading or unloading your assets is very expensive and dangerous, not forgetting the pirates on their jet-skis jumping on any chunk they can catch or poison.

Can I stop here without thinking about phishing ? Nah, there is big phishing going on as well, this is an ocean after all ! Are you credentials (be them password, biometric, certificates or whatever serves as key, doesn’t matter, all the same) going to be served on the next dark web sushis plate ? (sorry if you are allergic to phish :P )

This week in 49 points :

1 – Why do you continue to connect your private life to dangerous technology ? Something I don’t get ! Serious RCE Vulnerabilities Found In Motorola Halo+ Baby Monitor

2 – When you build your cyber security posture, it’s also to protect yourself from organized crime, especially transnational criminal organizations like these. You are a target. Europol links Italian Mafia to million-dollar phishing scheme

3 – Don’t fall for the scam ! (again) – A New Wave of Malware Attack Targeting Organizations in South America

4 – An interesting event ahead, about API security lifecycle – Taking charge of the API security lifecycle

5 – Don’t fall into the expired certificate trap ! Hacked sites push TeamViewer using fake expired certificate alert

6 – And the cloud continues to ruin millions of lives, this is unbelievable – Payment API Bungling Exposes Millions of Users’ Payment Data

7 – Are you the next in line ? Or will you take care of the key security controls to enhance your posture and reduce risk and imlact ! US farmer cooperative hit by $5.9M BlackMatter ransomware attack (When I posted did one, I did not know a second farmer cooperative would fall just a few days after as well… sad)

8 – Outlook have trouble supporting hardware MFA – Microsoft investigates Outlook issues with security keys, search

9 – A feeling of déjà-vu ? Republican Governors Association email server breached by state hackers

10 – And the cloud leaks and leaks and leaks (I’m sorry, these are just the news, but they confirm cloud=leak, non stop) – EventBuilder misconfiguration exposes Microsoft event registrant data

11 – My podcast recording with Debbie Reynolds about data and privacy – On episode 46 of The Data Diva Talks Privacy, Debbie Reynolds talks to Alexandre BLANC Cyber Security

12 – WordPress as any other online system must be kept up to date and you must enable MFA on it, there are tons of free 2FA/MFA solutions for it – New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin

13 – Encrypted by ransomware in the cloud – Marketron marketing services hit by Blackmatter ransomware

14 – This is exactly where working with specialists like VARS, who does the heavy lifting for you – 77% of execs concerned about security tools gaps in their company

15 – There are so many surveillance out there that you can’t pee without being noticed – Amazon Driver-Surveillance Cameras Roll Out, Sparking Debate

16 – What to do when your cloud based phone provider is down by DDoS attack ? phone services disrupted by DDoS extortion attack

17 – A well done whitepaper on managing your assets in an hybrid environment (which means cloud and on prem) – 6 best practices to stay secure in the hybrid cloud

18 – it’s VMware Vcenter patch time due to critical vulnerability – VMware warns of critical bug in default vCenter Server installs

19 – A reminder that state sponsored actors are playing on the same network as the one you connect everyday ! Turla APT Plants Novel Backdoor In Wake of Afghan Unrest

20 – Mac OS is as vulnerable as other systems, sadly, critical vulnerabilities appear on a regular basis – Unpatched High-Severity Vulnerability Affects Apple macOS Computers

21 – Cut the money, that should change things. Making attack useless, force threat actor to take risky workaround, hopefully this will help – US sanctions cryptocurrency exchange used by ransomware gangs

22 – Less effort also means less control – Is Low Code development the biggest cyber threat?

23 – it’s netgear patch time again ! Netgear fixes dangerous code execution bug in multiple routers

24 – OpenOffice patch time, but patch is not yet in binary :) only in source code so far – A malicious document could lead to RCE in Apache OpenOffice (CVE-2021-33035)

25 – Watch for nagios updates ! New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures

26 – For having been using Cynet for months, and providing it as part of managed solution, I can tell you this is the real deal – How Cynet’s Response Automation Helps Organizations Mitigate Cyber Threats

27 – Big tech summarized ! Creepy data collection and sharing remain common on popular apps

28 – The new world order – Whole cloud spending to surpass $1.3 trillion by 2025

29 – If you work in cyber security, you obviously manage risk all the time, speaking about risk posture, vulnerabilities, exploits etc – What Is Cyber Risk Quantification

30 – Do not wait to build your security posture ! NO ONE WILL DO IT FOR YOU IF YOU DON’T trigger the change ! FBI, CISA, and NSA warn of escalating Conti ransomware attacks

31 – And you think you can negotiate with criminals ? Nope – How REvil May Have Ripped Off Its Own Affiliates

32 – Apple trying to bring TLS security – Apple will disable insecure TLS in future iOS, macOS releases

33 – Another ransomware victim in the farming industry – Second farming cooperative shut down by ransomware this week

34 – Microsoft exchange seems pretty neglected lately, or heavily targeted – Microsoft Exchange Autodiscover bugs leak 100K Windows credentials

35 – Disgusting state of the art ! Introducing vulnerability, not fixing it, and pretending that only using manufacturer privacy invasive security tool can fix the issue ! A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit

36 – Turn off wireless when you don’t use it, or get hacked ! Wireless is weak ! Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others

37 – Don’t fall for the scam, don’t click, never apply an update from a site that was not supposed to manage your system (ie any site) – New Android Malware Targeting US, Canadian Users with COVID-19 Lures

38 – Another HUGE #clowd win ! Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers

39 – How well do you know your attack surface ? Do you have a live inventory of all your digital assets and full deep visibility on all your cloud workloads, audit capabilities ? Cring Ransomware Gang Exploits 11 Years Old Adobe Bug & Take Over ColdFusion Server Remotely

40 – Big tech abuses and lies start to have massive effect ! 76% of individual are legitimately scared of technology, knowing they are at greater risk of having their identity stolen – Consumers taking action to protect themselves online, though confidence is low

41 – Amazon really want my pictures ! They send me this non stop ! I think $12 is cheap to know my whole life whereabouts ! Yes, it’s about data collection, and not about backing up your picture

42 – Great detailed analysis of the extend of how threat actors will exploit a vulnerability, and achieve lateral move, while capitalizing on all the available information found during the operation – FamousSparrow: A suspicious hotel guest

43 – Interesting take, and so true. In rush to the dangerous cloud, trying to catch up with digital transformation and feeding their FOMO, organizations totally drops their responsibilities on the Confidentiality and Integrity part of their data management – 76% of IT Teams Are Prioritizing Business Continuity Over Security. Why Not Have Both?

44 – As you can’t embed security solutions, neither easily patch IoT devices, you must adjust your security architecture accordingly – 100M IoT Devices Exposed By Zero-Day Bug

45 – Once again, Apple patch time ! Apple fixes another zero-day used to deploy NSO iPhone spyware

46 – And the cloud leaks, it’s all about stealing data after all – Apple’s New iCloud Private Relay Service Leaks Users’ Real IP Addresses

47 – it’s CISCO patch time again – Cisco fixes highly critical vulnerabilities in IOS XE Software

48 – It’s sonicwall patch time again – SonicWall fixes critical bug allowing SMA 100 device takeover

49 – They do something, but it’s funny – Microsoft rushes to register Autodiscover domains leaking credentials

And this is closing a loaded week, as I’ve been (actually almost about to be in my second panel today at the Titaniam Red summit) and other speaking engagement such as the XDR MSS summit, I can’t wait for the weekend to rest quite a bit :P

Seeing you all next week, most likely for a new weekly !

Enjoy !


vendredi, septembre 24th, 2021 cloud, clowd, Cyber Security, Paranoïa, Technologie

Ajouter un commentaire

Not f'd — you won't find me on Facebook
septembre 2021

Suivez moi sur twitter - follow me on twitter
Follow on LinkedIn
[FSF Associate Member]
Free Software, Free Society
Compacter une image virtualbox VDI
Bon petit tutoriel esxi
Marche d'appliances vmware
Installer ESXi sur un disque IDE
Installer ESXi 3.5 sur un disque USB
Installer proxmox avec DRBD et migration / réplication à chaud
Installer OSSEC avec VMware
Information sur le VDI
Ouvrir des ports dynamiquement iptables - knockd
Autre tres bon tuto knockd
Docs Arp poisoning - Anglais
Metasploit test de pénétration
Zone H - sites piratés en temps réel
Blog invisible things
Tips protection sécurité wordpress
Pfsense - distribution firewall opensource - adsl internet failover
Iproute 2 mini how to - linux advanced routing
ClearOS - la passerelle sécuritaire lan - wan
CDN - Accélération de la distribution de données
drbd iscsi ocfs2 dm multipath tutoriel
Load balancing LVS
Load balancing opensource list
HA-Proxy :
HAproxy - http load balancer
Simple tutoriel HAproxy
HAproxy - debian tutoriel
Centos - Ip failover
Configuratoin DM-Multipath Redhat
VMware Doubletake - continuité
Quelques liens sur la réplication MySQL : Manuel MySQL, chapitre sur la réplication
Manuel MySQL, Tutoriel clair sur la mise en place
Autre tuto sur la mise en place de la réplication MySQL
Références pour optimisation du serveur MySQL
Utilisation de EXPLAIN mysql pour optimiser vos bases
optimiser vos bases - requetes et index
Un outil de clonage disque en reseau
Internet NAS 250Go 250 accès VPN
Server ISCSI avec Ubuntu tuto
ISCSI centos redhat tutoriel
Gérer et étendre un LVM
Créer sa piratebox ! trop cool
Deaddrops, les clés USB dans les murs, aussi cool !
Télécharger Xenu
Comment utiliser Xenu
optimisation hébergement wordpress
Super howto wordpress (En)
Test de charge serveur web - Load impact
Zeroshell - le mini-routeur wifi tout en un
Retroshare, votre réseau d'échange crypté!
Openvpn sur centos redhat
Intégrer Linux dans active directory
Routage inter-vlan avec Linux
Routage avec OSPF
Network Weathermap
Boutons twitter
Analyser les tendances des recherches Google
Protocole sitemap - robots.txt
Creer des animations CSS3
Code php pour interagir avec twitter
E reputation
TRUCS ET ASTUCES GNU/LINUX : - Actus et tips linux
Configurer GRUB2 et grub2 ici
Panoet - en anglais - tips & tricks
Readylines tips and trick pertinents
Squid Clamav - proxy antivirus
Apprendre Unix en 10 minutes
13 tips sur les expressions régulières
IE Sous linux IES
LDAP 2.4 Quickstart guide
Tutoriel LDAP
Installation annuaire LDAP
Serveur Mail Postfix - Dovecot - LDAP - MDS
Créer un linux personnalisé en ligne - custom linux
Super site sur linux - en
Capistrano - déploiement automatisé
Nagios tutoriel et doc
Nagios plugin NRPE tuto
Nagios plugin NRPE autre tuto
Nagios plugin NRPE officiel
Zabbix - fonctionnalités
Zabbix - installation
Guide MRTGsys - grapher la charge locale
MRTGsys - ajouter des graphs
MRTGsys - interpréter les données
Shinken - Monitoring
Thruk Monitoring webinterface
Shinken - Tutoriel
Shinken - Référence chez Nicolargo
RemixJobs IT jobs
USB Multiboot
Reset mot de passe windows
Java python et autres tips, intéressant !
Forum inforeseau
Open Clipart
Excellent comic en ligne