Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?
Each week is a learning opportunity, we learn from incidents, we learn from vulnerabilities, we learn from others, and we learn while sharing. Yet, all claiming to have the silver bullet, and in reality, it’s just widely inapplicable to the reality of businesses.
The tech world is echoing so strongly its own stuff, that it doesn’t hear the market and businesses anymore. All sailing in a digital storm in a weak boat, trying to stay afloat, while pirates, whoever their sponsor are, are riding on jet-skis with extreme agility.
The cloud is like a big ship, offering for smaller ones (SMBs etc) to host their critical assets, but the cloud, is also a huge marketplace, and you have no idea about what happen to your assets in these big ships, but one thing is sure, the space is expensive, and loading or unloading your assets is very expensive and dangerous, not forgetting the pirates on their jet-skis jumping on any chunk they can catch or poison.
Can I stop here without thinking about phishing ? Nah, there is big phishing going on as well, this is an ocean after all ! Are you credentials (be them password, biometric, certificates or whatever serves as key, doesn’t matter, all the same) going to be served on the next dark web sushis plate ? (sorry if you are allergic to phish :P )
This week in 49 points :
1 – Why do you continue to connect your private life to dangerous technology ? Something I don’t get ! Serious RCE Vulnerabilities Found In Motorola Halo+ Baby Monitor
2 – When you build your cyber security posture, it’s also to protect yourself from organized crime, especially transnational criminal organizations like these. You are a target. Europol links Italian Mafia to million-dollar phishing scheme
3 – Don’t fall for the scam ! (again) – A New Wave of Malware Attack Targeting Organizations in South America
4 – An interesting event ahead, about API security lifecycle – Taking charge of the API security lifecycle
5 – Don’t fall into the expired certificate trap ! Hacked sites push TeamViewer using fake expired certificate alert
6 – And the cloud continues to ruin millions of lives, this is unbelievable – Payment API Bungling Exposes Millions of Users’ Payment Data
7 – Are you the next in line ? Or will you take care of the key security controls to enhance your posture and reduce risk and imlact ! US farmer cooperative hit by $5.9M BlackMatter ransomware attack (When I posted did one, I did not know a second farmer cooperative would fall just a few days after as well… sad)
8 – Outlook have trouble supporting hardware MFA – Microsoft investigates Outlook issues with security keys, search
9 – A feeling of déjà-vu ? Republican Governors Association email server breached by state hackers
10 – And the cloud leaks and leaks and leaks (I’m sorry, these are just the news, but they confirm cloud=leak, non stop) – EventBuilder misconfiguration exposes Microsoft event registrant data
11 – My podcast recording with Debbie Reynolds about data and privacy – On episode 46 of The Data Diva Talks Privacy, Debbie Reynolds talks to Alexandre BLANC Cyber Security
12 – WordPress as any other online system must be kept up to date and you must enable MFA on it, there are tons of free 2FA/MFA solutions for it – New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin
13 – Encrypted by ransomware in the cloud – Marketron marketing services hit by Blackmatter ransomware
14 – This is exactly where working with specialists like VARS, who does the heavy lifting for you – 77% of execs concerned about security tools gaps in their company
15 – There are so many surveillance out there that you can’t pee without being noticed – Amazon Driver-Surveillance Cameras Roll Out, Sparking Debate
16 – What to do when your cloud based phone provider is down by DDoS attack ? VoIP.ms phone services disrupted by DDoS extortion attack
17 – A well done whitepaper on managing your assets in an hybrid environment (which means cloud and on prem) – 6 best practices to stay secure in the hybrid cloud
18 – it’s VMware Vcenter patch time due to critical vulnerability – VMware warns of critical bug in default vCenter Server installs
19 – A reminder that state sponsored actors are playing on the same network as the one you connect everyday ! Turla APT Plants Novel Backdoor In Wake of Afghan Unrest
20 – Mac OS is as vulnerable as other systems, sadly, critical vulnerabilities appear on a regular basis – Unpatched High-Severity Vulnerability Affects Apple macOS Computers
21 – Cut the money, that should change things. Making attack useless, force threat actor to take risky workaround, hopefully this will help – US sanctions cryptocurrency exchange used by ransomware gangs
22 – Less effort also means less control – Is Low Code development the biggest cyber threat?
23 – it’s netgear patch time again ! Netgear fixes dangerous code execution bug in multiple routers
24 – OpenOffice patch time, but patch is not yet in binary :) only in source code so far – A malicious document could lead to RCE in Apache OpenOffice (CVE-2021-33035)
25 – Watch for nagios updates ! New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures
26 – For having been using Cynet for months, and providing it as part of managed solution, I can tell you this is the real deal – How Cynet’s Response Automation Helps Organizations Mitigate Cyber Threats
27 – Big tech summarized ! Creepy data collection and sharing remain common on popular apps
28 – The new world order – Whole cloud spending to surpass $1.3 trillion by 2025
29 – If you work in cyber security, you obviously manage risk all the time, speaking about risk posture, vulnerabilities, exploits etc – What Is Cyber Risk Quantification
30 – Do not wait to build your security posture ! NO ONE WILL DO IT FOR YOU IF YOU DON’T trigger the change ! FBI, CISA, and NSA warn of escalating Conti ransomware attacks
31 – And you think you can negotiate with criminals ? Nope – How REvil May Have Ripped Off Its Own Affiliates
32 – Apple trying to bring TLS security – Apple will disable insecure TLS in future iOS, macOS releases
33 – Another ransomware victim in the farming industry – Second farming cooperative shut down by ransomware this week
34 – Microsoft exchange seems pretty neglected lately, or heavily targeted – Microsoft Exchange Autodiscover bugs leak 100K Windows credentials
35 – Disgusting state of the art ! Introducing vulnerability, not fixing it, and pretending that only using manufacturer privacy invasive security tool can fix the issue ! A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit
36 – Turn off wireless when you don’t use it, or get hacked ! Wireless is weak ! Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others
37 – Don’t fall for the scam, don’t click, never apply an update from a site that was not supposed to manage your system (ie any site) – New Android Malware Targeting US, Canadian Users with COVID-19 Lures
38 – Another HUGE #clowd win ! Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers
39 – How well do you know your attack surface ? Do you have a live inventory of all your digital assets and full deep visibility on all your cloud workloads, audit capabilities ? Cring Ransomware Gang Exploits 11 Years Old Adobe Bug & Take Over ColdFusion Server Remotely
40 – Big tech abuses and lies start to have massive effect ! 76% of individual are legitimately scared of technology, knowing they are at greater risk of having their identity stolen – Consumers taking action to protect themselves online, though confidence is low
41 – Amazon really want my pictures ! They send me this non stop ! I think $12 is cheap to know my whole life whereabouts ! Yes, it’s about data collection, and not about backing up your picture
42 – Great detailed analysis of the extend of how threat actors will exploit a vulnerability, and achieve lateral move, while capitalizing on all the available information found during the operation – FamousSparrow: A suspicious hotel guest
43 – Interesting take, and so true. In rush to the dangerous cloud, trying to catch up with digital transformation and feeding their FOMO, organizations totally drops their responsibilities on the Confidentiality and Integrity part of their data management – 76% of IT Teams Are Prioritizing Business Continuity Over Security. Why Not Have Both?
44 – As you can’t embed security solutions, neither easily patch IoT devices, you must adjust your security architecture accordingly – 100M IoT Devices Exposed By Zero-Day Bug
45 – Once again, Apple patch time ! Apple fixes another zero-day used to deploy NSO iPhone spyware
46 – And the cloud leaks, it’s all about stealing data after all – Apple’s New iCloud Private Relay Service Leaks Users’ Real IP Addresses
47 – it’s CISCO patch time again – Cisco fixes highly critical vulnerabilities in IOS XE Software
48 – It’s sonicwall patch time again – SonicWall fixes critical bug allowing SMA 100 device takeover
49 – They do something, but it’s funny – Microsoft rushes to register Autodiscover domains leaking credentials
And this is closing a loaded week, as I’ve been (actually almost about to be in my second panel today at the Titaniam Red summit) and other speaking engagement such as the XDR MSS summit, I can’t wait for the weekend to rest quite a bit :P
Seeing you all next week, most likely for a new weekly !
Enjoy !
Ajouter un commentaire
Links
Recherche
Derniers articles
Tresronours Twitter
Keywords cloud topic
Membre de la FSF
Liens qui vont bien
Mots clés vrac – keyword cloud
License du contenu – CC By NC SA
Archives
- Resumed posting and expanding on X
- Linkedin Access to your account has been restricted – Final debrief and resilience plan
- I’m thankful for the support I get in rough time
- Cyber security news of the day – 2024 May 31
- Alexandre Blanc Cyber Kicked out from Linkedin
- You’ll most likely find me on LinkedIn
- The Russian roulette landing page !
- RTSP, Debian, VLC, not playing, IP Camera
- 5G network hosted in the cloud, no internet, no phone ! So smart ! And I ended on TV, This week in cyber
- They lock the door for privacy… but they keep a copy of the key, and couple of backdoors
- Worst is yet to come, but they all warned you
- Migrating an old WordPress and handling character set, UTF8, latin1, latin1_swedish_ci
- From a broken TLS CA, to Facebook, to FIN12 hit and run
- Yes we can fix this mess, but do we want to ? That’s another story
- Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?
- Riding cloud can be tricky, don’t fall from it, in the weekly cyber !
- The threat landscape is very dynamic – Cyber news this week
- Cybersecurity is not obvious even for this newsletter !
- Install Slack desktop app on Kali rolling fixing libappindicator3-1 missing dependency
- How to delete all resources in azure to avoid charges after trial on your forced credit card registration
- Proxmox – ZFS – Dead drive on active VM, recover from replicated disk
- Restrict access to proxmox web admin interface
- Migrate your ESXI VMs to proxmox ZFS
- Install your VPN server with pi-hole on OVH VPS in 30 min
- Using raspberry pi 3 as wifi bridge and repeater and firewall
- Raspberry 3 – create a wifi repeater with USB wifi dongle
- raspberry 3 – routeur pare feu point d’acces wifi avec filtrage pub et tracking – router firewall access point with ads and tracking filtering
- Dell XPS 13 touchpad – corriger la sensibilité
- Utiliser Zazeen set top box depuis une connexion videotron
- Fermeture de mon compte facebook – la dernière goutte
- Choisir un kernel par defaut au demarrage de Centos 7.2 – configuration grub2
- Openvpn access server 2.0.25 et android
- Régler la luminosité du laptop par ligne de commande
- chromium outlook web app version complete sous linux
- Nexus 7 2012 – android 5 lollipop solution au probleme de lenteur
- HDD led sur Xubuntu – xfce
- xubuntu 14.04 verrouiller ecran de veille et desactiver mise en veille a la fermeture de l’ecran
- Authentification avec Radmin en utilisant Wine sur Gentoo
- Patcher bash sur une distribution plus supportee comme fedora 11
- Zimbra desktop sous xubuntu 14.04 64bit – fix
- xubuntu 12.10 probleme de son avec VLC – pulse audio – alsa – toshiba L855D – solution
- Evolution sous xubuntu 12.10 – bug affichage a la configuration – solution temporaire
- Booster son acces internet en changeant de DNS pour opendns
- Serveur DLNA sous ubuntu – minidlna
- sshfs sous windows – dokan sshfs
- xubuntu 11.10 Installer le plugin java pour firefox
- Installer Google Earth sur Xubuntu 11.10
- Installer nagios sur Fedora 11 depuis les sources
- Configurer varnish-cache avec des virtualhosts, apache, fedora, redhat, centos
- Installer Varnish depuis les sources sur Fedora 11