clowd
Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?
Each week is a learning opportunity, we learn from incidents, we learn from vulnerabilities, we learn from others, and we learn while sharing. Yet, all claiming to have the silver bullet, and in reality, it’s just widely inapplicable to the reality of businesses.
The tech world is echoing so strongly its own stuff, that it doesn’t hear the market and businesses anymore. All sailing in a digital storm in a weak boat, trying to stay afloat, while pirates, whoever their sponsor are, are riding on jet-skis with extreme agility.
The cloud is like a big ship, offering for smaller ones (SMBs etc) to host their critical assets, but the cloud, is also a huge marketplace, and you have no idea about what happen to your assets in these big ships, but one thing is sure, the space is expensive, and loading or unloading your assets is very expensive and dangerous, not forgetting the pirates on their jet-skis jumping on any chunk they can catch or poison.
Can I stop here without thinking about phishing ? Nah, there is big phishing going on as well, this is an ocean after all ! Are you credentials (be them password, biometric, certificates or whatever serves as key, doesn’t matter, all the same) going to be served on the next dark web sushis plate ? (sorry if you are allergic to phish :P )
This week in 49 points :
1 – Why do you continue to connect your private life to dangerous technology ? Something I don’t get ! Serious RCE Vulnerabilities Found In Motorola Halo+ Baby Monitor
2 – When you build your cyber security posture, it’s also to protect yourself from organized crime, especially transnational criminal organizations like these. You are a target. Europol links Italian Mafia to million-dollar phishing scheme
3 – Don’t fall for the scam ! (again) – A New Wave of Malware Attack Targeting Organizations in South America
4 – An interesting event ahead, about API security lifecycle – Taking charge of the API security lifecycle
5 – Don’t fall into the expired certificate trap ! Hacked sites push TeamViewer using fake expired certificate alert
6 – And the cloud continues to ruin millions of lives, this is unbelievable – Payment API Bungling Exposes Millions of Users’ Payment Data
7 – Are you the next in line ? Or will you take care of the key security controls to enhance your posture and reduce risk and imlact ! US farmer cooperative hit by $5.9M BlackMatter ransomware attack (When I posted did one, I did not know a second farmer cooperative would fall just a few days after as well… sad)
8 – Outlook have trouble supporting hardware MFA – Microsoft investigates Outlook issues with security keys, search
9 – A feeling of déjà-vu ? Republican Governors Association email server breached by state hackers
10 – And the cloud leaks and leaks and leaks (I’m sorry, these are just the news, but they confirm cloud=leak, non stop) – EventBuilder misconfiguration exposes Microsoft event registrant data
11 – My podcast recording with Debbie Reynolds about data and privacy – On episode 46 of The Data Diva Talks Privacy, Debbie Reynolds talks to Alexandre BLANC Cyber Security
12 – WordPress as any other online system must be kept up to date and you must enable MFA on it, there are tons of free 2FA/MFA solutions for it – New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin
13 – Encrypted by ransomware in the cloud – Marketron marketing services hit by Blackmatter ransomware
14 – This is exactly where working with specialists like VARS, who does the heavy lifting for you – 77% of execs concerned about security tools gaps in their company
15 – There are so many surveillance out there that you can’t pee without being noticed – Amazon Driver-Surveillance Cameras Roll Out, Sparking Debate
16 – What to do when your cloud based phone provider is down by DDoS attack ? VoIP.ms phone services disrupted by DDoS extortion attack
17 – A well done whitepaper on managing your assets in an hybrid environment (which means cloud and on prem) – 6 best practices to stay secure in the hybrid cloud
18 – it’s VMware Vcenter patch time due to critical vulnerability – VMware warns of critical bug in default vCenter Server installs
19 – A reminder that state sponsored actors are playing on the same network as the one you connect everyday ! Turla APT Plants Novel Backdoor In Wake of Afghan Unrest
20 – Mac OS is as vulnerable as other systems, sadly, critical vulnerabilities appear on a regular basis – Unpatched High-Severity Vulnerability Affects Apple macOS Computers
21 – Cut the money, that should change things. Making attack useless, force threat actor to take risky workaround, hopefully this will help – US sanctions cryptocurrency exchange used by ransomware gangs
22 – Less effort also means less control – Is Low Code development the biggest cyber threat?
23 – it’s netgear patch time again ! Netgear fixes dangerous code execution bug in multiple routers
24 – OpenOffice patch time, but patch is not yet in binary :) only in source code so far – A malicious document could lead to RCE in Apache OpenOffice (CVE-2021-33035)
25 – Watch for nagios updates ! New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures
26 – For having been using Cynet for months, and providing it as part of managed solution, I can tell you this is the real deal – How Cynet’s Response Automation Helps Organizations Mitigate Cyber Threats
27 – Big tech summarized ! Creepy data collection and sharing remain common on popular apps
28 – The new world order – Whole cloud spending to surpass $1.3 trillion by 2025
29 – If you work in cyber security, you obviously manage risk all the time, speaking about risk posture, vulnerabilities, exploits etc – What Is Cyber Risk Quantification
30 – Do not wait to build your security posture ! NO ONE WILL DO IT FOR YOU IF YOU DON’T trigger the change ! FBI, CISA, and NSA warn of escalating Conti ransomware attacks
31 – And you think you can negotiate with criminals ? Nope – How REvil May Have Ripped Off Its Own Affiliates
32 – Apple trying to bring TLS security – Apple will disable insecure TLS in future iOS, macOS releases
33 – Another ransomware victim in the farming industry – Second farming cooperative shut down by ransomware this week
34 – Microsoft exchange seems pretty neglected lately, or heavily targeted – Microsoft Exchange Autodiscover bugs leak 100K Windows credentials
35 – Disgusting state of the art ! Introducing vulnerability, not fixing it, and pretending that only using manufacturer privacy invasive security tool can fix the issue ! A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit
36 – Turn off wireless when you don’t use it, or get hacked ! Wireless is weak ! Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others
37 – Don’t fall for the scam, don’t click, never apply an update from a site that was not supposed to manage your system (ie any site) – New Android Malware Targeting US, Canadian Users with COVID-19 Lures
38 – Another HUGE #clowd win ! Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers
39 – How well do you know your attack surface ? Do you have a live inventory of all your digital assets and full deep visibility on all your cloud workloads, audit capabilities ? Cring Ransomware Gang Exploits 11 Years Old Adobe Bug & Take Over ColdFusion Server Remotely
40 – Big tech abuses and lies start to have massive effect ! 76% of individual are legitimately scared of technology, knowing they are at greater risk of having their identity stolen – Consumers taking action to protect themselves online, though confidence is low
41 – Amazon really want my pictures ! They send me this non stop ! I think $12 is cheap to know my whole life whereabouts ! Yes, it’s about data collection, and not about backing up your picture
42 – Great detailed analysis of the extend of how threat actors will exploit a vulnerability, and achieve lateral move, while capitalizing on all the available information found during the operation – FamousSparrow: A suspicious hotel guest
43 – Interesting take, and so true. In rush to the dangerous cloud, trying to catch up with digital transformation and feeding their FOMO, organizations totally drops their responsibilities on the Confidentiality and Integrity part of their data management – 76% of IT Teams Are Prioritizing Business Continuity Over Security. Why Not Have Both?
44 – As you can’t embed security solutions, neither easily patch IoT devices, you must adjust your security architecture accordingly – 100M IoT Devices Exposed By Zero-Day Bug
45 – Once again, Apple patch time ! Apple fixes another zero-day used to deploy NSO iPhone spyware
46 – And the cloud leaks, it’s all about stealing data after all – Apple’s New iCloud Private Relay Service Leaks Users’ Real IP Addresses
47 – it’s CISCO patch time again – Cisco fixes highly critical vulnerabilities in IOS XE Software
48 – It’s sonicwall patch time again – SonicWall fixes critical bug allowing SMA 100 device takeover
49 – They do something, but it’s funny – Microsoft rushes to register Autodiscover domains leaking credentials
And this is closing a loaded week, as I’ve been (actually almost about to be in my second panel today at the Titaniam Red summit) and other speaking engagement such as the XDR MSS summit, I can’t wait for the weekend to rest quite a bit :P
Seeing you all next week, most likely for a new weekly !
Enjoy !
The threat landscape is very dynamic – Cyber news this week
This week again has been quite loaded, and the technology environment, which define the attack surface, is only growing. It takes a vulnerability, a threat attached to it, and we have a risk.
To know the likelihood of any threat to be targeting our organization, we go through a threat modelling exercise. Sometimes it’s formal, documented and referred in the risk register, sometimes it’s a guesstimate, a rough high level assessment. Overall, better than not considering the risk at all.
This week in 49 points, hosted on my blog, because I know I won’t have limitations etc, and for each of these, there is something to learn, a security control you may have forgotten :
1 – The financial system is fully backed by technology, and therefore, fully vulnerable – World Economic Forum (WEF) Warns of Cyberattack Leading to Systemic Collapse of the Global Financial System – Do you have some cash handy ? You are your own risk manager, what happen if you can’t use your payment card for a week ? Do you have enough food ? Gas ? Just a week, think about it.
2 – Building and learning takes time, but if you don’t, you are not the real owner – This Best-Selling TP-Link Router Ships With An Alarming Security Surprise – Do you know what runs on your network ? and what or who is watching your online activities ? (aside of the ISP who gladly sell all your activity, including your favourite recipes on youcorn, they know if you like crunchy corn, or white corn, old corn or even big or slim corn ! yes a VPN might come handy, but think twice who should know how you like to eat your corn ! )
3 – I’m proud having received the Cyber Sentinel Award 2021 in India for my work in #cybersecurity, and that’s a huge news :P – Cyber Sentinel Award 2021 – In the post you’ll find link to the panel I had a chance to participate as well, you’ll see that trends in India are very aligned with trends in US and Canada !
4 – I told you to drill that weak NFC circuit on your payment card ! Paypass is unsafe – New Vulnerability Allow Hackers to Bypass PIN Codes on Contactless Cards From Mastercard & Maestro – Wireless is weak, you know the song
5 – Let’s clear something, when authorities come with a warrant, organizations must comply – Important clarifications regarding arrest of climate activist – unlike the cloud, they did not betray confidentiality, as they are not technically supposed to be able to access your encrypted mailbox, they could just tell which IP use this mailbox. VPN maybe ? again, know which VPN you use, deciding to give all your traffic to a VPN provider is something you should look twice.
6 – Transnational criminal organization are efficient businesses – “FudCo” Spam Empire Tied to Pakistani Software Firm – Enjoy the reading, understand how it works, and be sure there are thousands like these.
7 – bypassing MFA and password reset, more on the SAML golden ticket attack, an attack close to pass the hash – Golden SAML Attack – APT Hackers Hijacking & Gaining Access To The Active Directory Server – Attacker don’t even need your credentials to be logged as you, be aware, MFA + attribute based authentication with continuous diagnosis and mitigation, yes I speak about better than ZeroTrust, I speak about CGM !
8 – Do you really know who you are working for, and what’s the purpose of your work ? TrickBot gang developer arrested when trying to leave Korea – In the not so recent past, I worked for an organization which turned to be terrorists, and this is one of the way I learned how privacy matters, how it’s heavily tight to freedom. So, always check who you work for, and make sure you are sure this is what it is. It doesn’t only happen to others. Due diligence is a good practice for your daily life too.
9 – WordPress plugin patch time ! Gutenberg Template Library Plugin Bugs Affected 1+ Million WordPress Sites – Oh myyyy penguiiiiiinnnn ! I’m currently typing on WordPress ! Oh no ! I’m doomed, nooooooo !…. oh wait, I just clicked on « update » and in 10 sec my blog was updated…. and actually there is a worst one that this one, so you full WordPress deserves an update if you did not apply it today.
10 – Netgear patch time ! Netgear fixes severe security bugs in over a dozen smart switches – Yes, patching is a non stop job, you should have someone coordinating this in your organization, because patching a switch, will turn the network off for a few seconds, even minutes. Coordination is key !
11 – IoT, or the internet of threats, is only growing (it’s supposed to mean the Internet of Things, but it’s not accurate) – IoT Attacks Skyrocket, Doubling in 6 Months – And this is only growing, the more you connect, the more you grow your attack surface, and the need for security controls, network segmentation and more, I know, at home it’s not easy !
12 – Speaking about IoT, Don’t connect all this crap ! Vulnerabilities In Victure Baby Monitor Allow Access To Camera Feeds – Really need to watch your baby with Russia and China doing so with you ? Because they will, do you know this site « Insecam » ? Enjoy.
13 – What do you do when all your stuff is in the cloud and Internet is taken down by DDoS ? New Zealand suffers a widespread Internet outage – You can look at stuff like Cloudflare solutions, issue is, you must give away all your traffic to the platform, and while they claim they never tap any connection, this is still a risk to consider. Sometimes it’s also a matter of national security, you would not want to give all your national internet traffic to another country either. Not simple.
14 – CASB LOL ! Criminal access service brokers to the cloud – Enterprising criminals are selling direct access to cloud accounts – Did you setup geo fencing in your cloud configuration ? On your firewall it’s easy, you just allow only national IPs as per need, in the cloud you’ll pay per rule or so.
15 – Micro segmentation is the very first step to protect your workload and bring governance, including the coverage of legacy systems – Micro-segmentation From Strategy to Execution
16 – A virus in the facebook application that steal your mobile data on Android – Discovered a virus in facebook app that steal data from user – You may consider using « slimsocial » on Android instead of the facebook apps, safer, better for privacy, it works well, and the key is that the app doesn’t send your private data to FB.
17 – I hope you use a password manager and multi factor everywhere – McDonald’s leaks password for Monopoly VIP database to winners – Whenever you give away your data, you must assume it will be compromised, as much as doable, provide fake data.
18 – Your private satellite network ? Review: Hands on with the Swarm Satellite Network Eval Kit
19 – Issue when you have tons of interconnected systems is that decommissioning can be a mess when not properly documented – Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server
20 – If ransomware gets in, you are done. Criminals will promise everything, but they are criminals, they will leak anyways – Ransomware gang threatens to leak data if victim contacts FBI, police – You should have proper security posture so as you never get to this point. At least, start with endpoint protection, such as Cynet XDR (yet we do provide managed offer for this product at work, customers are very happy with it, and the key point is, it works ! )
21 – There is porn, and Netflix and prime video and P2P, so most of internet is leisure and crime – 39% of all internet traffic is from bad bots – Quick hint, you are connected on this very same internet and your traffic is counted in this stat, oh oh….I know, we only watch youcorn ;)
22 – Scraping VS leaks ? Would you know the difference ? Dark Web Scraping
23 – Servers back online, seems they went dark for a while but came back – REvil ransomware’s servers mysteriously come back online – I bet the reason is summer vacations ! What is your take ? They made so much that they took a break ! :P
24 – Manual patch for O365 or get hacked – The cloud is funny – Microsoft shares temp fix for ongoing Office 365 zero-day attacks
25 – A Dash of cyber – In this episode Rod lewis, Brad Rhodes, Alexandre Blanc and Ron Craig will be talking about IoT, Great live we did, don’t miss the replay !
26 – The less apps you use, the less exposed you are. Reduce your attack surface ! Experts Uncover Mobile Spyware Attacks Targeting Kurdish Ethnic Group
27 – Popcorn time ahead, storm and pouring, data flooding as well ! Cloud computing market to reach $1,251.09 billion by 2028 – if we’d stop all cloud spending, we could pay the whole world debt immediately…. I’ll let you think about this.
28 – Backend of most cloud, HAProxy needs patching ! HAProxy Found Vulnerable to Critical HTTP Request Smuggling Attack – You should patch if you use it.
29 – Are you the next in line ? Have you prepared your organization by deploying proper security controls and limit incidents impacts ? Howard University shuts down network after ransomware attack
30 – When you need to provide remote access, but you need to restrict access to a limited amount of resources, and need efficient audit trails, Cyolo comes to mind – How to Provide Remote Users with Access to Restricted Services
31 – Zoho patch time ! Zoho patches actively exploited critical ADSelfService Plus bug – Pretty bad exploit given the nature of the product !
32 – Patching your Fortinet is critical, changing all passwords and enforcing MFA is even more needed ! Criminal Hackers leak passwords for 500,000 Fortinet VPN accounts
33 – Faking vaccine, a kamikaze approach – Spoofing Bug Highlights Cybersecurity for Digital Vaccine Passports
34 – Cloud oriented dev is quite different than traditional open source like CPAN etc – The Dark Side Of Package Repositories: Ownership Drama And Malware – an excellent reading.
35 – You think you can trust teams and that your boss trusts you ? LOL, don’t forget this is cloud based, so pure nastiness ! What Your Boss Can TRACK About YOU with Microsoft Teams
36 – Very happy to have had the opportunity to share during an interview, among amazing world wide known knowledgeable specialists – 2021 MIDDLE TN CYBER CONFERENCE », organized by The Tennessee Department of Safety & Homeland Security and TCAT Shelbyville
37 – They went after the Russians…. There might be some retaliation coming here – New Mēris botnet breaks DDoS record with 21.8 million RPS attack
38 – We spoke about IoT and IIoT security issue during our Dash of cyber live, and here is a very relevant article on the topic – Fighting the Rogue Toaster Army: Why Secure Coding in Embedded Systems is Our Defensive Edge
39 – NPM patch time again ! GitHub finds 7 code execution vulnerabilities in ‘tar’ and npm CLI
40 – Multi factor authentication renders this useless – Ukrainian extradited for selling 2,000 stolen logins per week
41 – You’ll see the take of the article, BUT, I say it depends on the vertical and your compliance requirements ! 3 IT Restrictions that are hurting your business
42 – Public cloud continuous key problem : can’t isolate data between customers – ‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise
43 – CRAZY LOL ! Microsoft, the provider of cloud and teams and online collaboration tools (SharePoint and all) just publicly admits that their cloud doesn’t allow remote worker to do their job ! Study of Microsoft employees shows how remote work puts productivity and innovation at risk
44 – A world of deception, we can do better than this – Rep. Adam Schiff rips Amazon and Facebook for ‘directly profiting’ on COVID-19 misinformation
45 – Fixed but not really, history tends to repeat itself – Windows MSHTML zero-day defenses bypassed as new info emerges – Yes again and again !
46 – Things are moving ! Great !…. well somehow moving …. Rep. Jayapal: Biden administration supports Amazon-busting ‘Ending Platform Monopolies Act’
47 – It is very simple, no 2FA (second factor authentication) is a wide open door – Stolen Credentials Led to Data Theft at United Nations
48 – Threat actors are innovating continuously – SOVA: New Android Banking Trojan Emerges With Growing Capabilities – The less apps you install, the less risk you take !
49 – When you realise that OWASP Top 10 is the EXACT definition of the cloud state !!!! OWASP Top 10 2021 Published – Broken Access Control Jumps to the Top Spot
Some coming event in which I’ll be speaking (I know, bla bla bla bla :D ) :
- Will be speaking at the upcoming RED Summit on 9/24. Ransomware and Extortion Defense for Industry and Government
- Will be speaking at InfoGov World Expo & Conference 2021
Enjoy and have a good weekend all ! Thank you for reading !
How to delete all resources in azure to avoid charges after trial on your forced credit card registration
Warning, this article aims to show you how to delete everything, so make sure you have backups of your data and anything before deleting resources !!! In my case, this was after course, and I did not want anything to remain.
I assume that if you manage azure resources, you know what you want to delete. Be careful.
So you went for an azure training, and you have been asked to either have an active account or a trial account.
You created your account and were forced to provide your credit card despite the fact that you absolutely don’t plan to give a single buck to the cloud.
But the cloud nature is to take money, a lot of money, so the very first step, before you can do anything, it to take your credit card.
I recommend you use a temporary credit card like privacy.com or lastcard.com based, or even your if your bank provide temporary credit cards.
Anyways, here we are, for some reason you had to setup stuff in azure and you don’t want to take any chance, make sure you cleanup as much as can do. It took me a while to get this, and this was not 100% clear for the trainer as well (full cleanup process, platform change often).
So here is how you can cleanup everything.
For each tenant you want to get rid of (most likely all) you’ll have to do this (in Azure portal, you can switch tenant by going to the « Azure Active Directory » tab, and use the menu « switch tenant ».
While in the tenant you want to clean up, we’ll use the « Azure Resource Explorer » as key tool in this.
This takes you to the Azure Resource Explorer blade (yes, panels or tabs are called « blades »), in which all resources are listed under « Subscriptions ».
So you’ll expand the Subscriptions tree, for each and every subscription in which you want to delete assets.
You expand all the « ResourcesGroups », and you’ll go delete assets 1 by one under « Resources » for each « ResourcesGroup »
Select a resource, and above the JSON detailed configuration, you click on « Open blade »
It will take you to the resource blade, from where you can delete the resource
It will ask for confirmation, confirm :
And then from the navigation tree, go back to Resource Explorer.
Do this for each and every items up to the Resources Group itself :
Which you confirm by typing the name.
As the cloud is slow and inefficient, you’ll face a lot of refresh issues, and you’ll have to reload the web page many times to hope to have a clear picture on what is still there and what is not.
The notifications area will pop some partial notifications, but to actually have a detailed view of what is really happening, and what is the status (deleting resources in the cloud is painfully slow and inefficient), so under the « Notifications » button (little bell, top right of the screen), click on « More events in the activity log »
From there, you’ll have a better view of what happens, but by default, it doesn’t show much, you will have to expand each and every task to actually have an idea. As the top level task may show « Succeeded », but some sub task are not done at all.
When nothing is left in the « Resource Explorer », under every Subscriptions, you know you are done, and hopefully, the cloud won’t charge you.
Oups, don’t forget to cancel the subscription ! If it’s a trial, you can’t, you’ll have to wait for expiration, but if you don’t have any resources under it, you should be fine.
Another thing to check, is under « Licenses », search in the top search bar for « Licenses », make sure that NO LICENSE are still assigned. If they are, you’ll be charged !
EDIT : Another point to check are the services you might have subscribed that may not appear under resources, such as « Azure Security center », « Azure Sentinel », and « Azure DDoS protection ». Make sure you disable all of these too ! <— Don’t forget additional services ! They are costly !
EDIT2 : Another point, when it comes to deleting a tenant that was tight to a subscription : You need to have a user created on the domain of the tenant, with Global admin privileges. Then, you have to log in office365 (absolute nonsense) to cancel your subscription :
https://businessstore.microsoft.com/en-in/manage/inventory/subscriptions
From there, you can actually delete the subscription. Then, you have to go back in azure, logout, login (you’d better do this after each and every action, this platform is slow as hell and mostly never reflect any action you take).
Delete the admin user you had to create, and leave only your default user as global admin. Grand subscription management rights to your external/default user, so as you can proceed. BUT, even after doing so, while you should not be charged, you’ll have to wait for he « grace » recovery delay for the subscription to be completely de validated. Then maybe you may be able to delete the tenant. Pure nightmare.
Not easy at all to escape from the cloud, or at least, hoping that they won’t take money on your credit card. Because they will, if you forget anything, they won’t forget you !
Links
Calendrier
L | M | M | J | V | S | D |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 | 31 |
Recherche
Derniers articles
Tresronours Twitter
Keywords cloud topic
Membre de la FSF
Liens qui vont bien
Mots clés vrac – keyword cloud
License du contenu – CC By NC SA
Archives
- Resumed posting and expanding on X
- Linkedin Access to your account has been restricted – Final debrief and resilience plan
- I’m thankful for the support I get in rough time
- Cyber security news of the day – 2024 May 31
- Alexandre Blanc Cyber Kicked out from Linkedin
- You’ll most likely find me on LinkedIn
- The Russian roulette landing page !
- RTSP, Debian, VLC, not playing, IP Camera
- 5G network hosted in the cloud, no internet, no phone ! So smart ! And I ended on TV, This week in cyber
- They lock the door for privacy… but they keep a copy of the key, and couple of backdoors
- Worst is yet to come, but they all warned you
- Migrating an old WordPress and handling character set, UTF8, latin1, latin1_swedish_ci
- From a broken TLS CA, to Facebook, to FIN12 hit and run
- Yes we can fix this mess, but do we want to ? That’s another story
- Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?
- Riding cloud can be tricky, don’t fall from it, in the weekly cyber !
- The threat landscape is very dynamic – Cyber news this week
- Cybersecurity is not obvious even for this newsletter !
- Install Slack desktop app on Kali rolling fixing libappindicator3-1 missing dependency
- How to delete all resources in azure to avoid charges after trial on your forced credit card registration
- Proxmox – ZFS – Dead drive on active VM, recover from replicated disk
- Restrict access to proxmox web admin interface
- Migrate your ESXI VMs to proxmox ZFS
- Install your VPN server with pi-hole on OVH VPS in 30 min
- Using raspberry pi 3 as wifi bridge and repeater and firewall
- Raspberry 3 – create a wifi repeater with USB wifi dongle
- raspberry 3 – routeur pare feu point d’acces wifi avec filtrage pub et tracking – router firewall access point with ads and tracking filtering
- Dell XPS 13 touchpad – corriger la sensibilité
- Utiliser Zazeen set top box depuis une connexion videotron
- Fermeture de mon compte facebook – la dernière goutte
- Choisir un kernel par defaut au demarrage de Centos 7.2 – configuration grub2
- Openvpn access server 2.0.25 et android
- Régler la luminosité du laptop par ligne de commande
- chromium outlook web app version complete sous linux
- Nexus 7 2012 – android 5 lollipop solution au probleme de lenteur
- HDD led sur Xubuntu – xfce
- xubuntu 14.04 verrouiller ecran de veille et desactiver mise en veille a la fermeture de l’ecran
- Authentification avec Radmin en utilisant Wine sur Gentoo
- Patcher bash sur une distribution plus supportee comme fedora 11
- Zimbra desktop sous xubuntu 14.04 64bit – fix
- xubuntu 12.10 probleme de son avec VLC – pulse audio – alsa – toshiba L855D – solution
- Evolution sous xubuntu 12.10 – bug affichage a la configuration – solution temporaire
- Booster son acces internet en changeant de DNS pour opendns
- Serveur DLNA sous ubuntu – minidlna
- sshfs sous windows – dokan sshfs
- xubuntu 11.10 Installer le plugin java pour firefox
- Installer Google Earth sur Xubuntu 11.10
- Installer nagios sur Fedora 11 depuis les sources
- Configurer varnish-cache avec des virtualhosts, apache, fedora, redhat, centos
- Installer Varnish depuis les sources sur Fedora 11