Technologie

Yes we can fix this mess, but do we want to ? That’s another story

Alexandre Blanc CyberSecurity weekly cyber linkedin
I wonder if I’ll end in the linkedin top voices list this year….yes, curious to know :)

Before going to the list of key #cybersecurity event we saw this week, I wanted to quickly speak about solutions. I present all these incidents and news, hoping that people who read, actually understand better the threat landscape and get better prepared.

Today, and for a while, there are technical solutions against all the incidents we see, many many options are available, allowing you to place the right security controls, at the right place, to properly mitigate risks, and mostly remove the impact of incidents.

Yes, you need to spend some money, and yes, you need just a little effort. But in the end, this is way better than being the next one in the news, feeding criminals and transnational criminal organizations with your data, your customers data, your employees data etc.

Yes, backup are absolutely needed, but no, they are not a proper strategy AGAINST ransomwares and breaches. They are just corrective controls, it means, they are in, too late. They are absolutely needed, but in case of data loss etc, can’t help against data theft.

If you know what you do, and you have a good security architecture, you know your inventory, data flows, assets, you’re good. If you don’t know all of this, then, get support from MSSP. I sure work for VARS Corporation, so, I know the tools we use, and I can honestly tell you, they work. We mitigate incidents. There are certainly others, providing similar service levels, so go, find your managed security partner, and get your stuff in order. We can obviously be the one.

We all offer, maturity audit, cyber security audit, gap analysis against a framework (NIST CSF, ISO, CMMC, you name it, mostly sharing the same goal and means anyways), but if you have to take action, for quick win, go for XDR, Email advanced security, dark web monitoring, as starting point. That good old 80 / 20 rule…. FACT, no BS, that the best bang for your bucks to begin with.

An absolute key point to me : Mix the providers, integrated solutions, but different tools, it’s almost digital suicide to rely on a single tool provider. A huge SPOF (single point of failure), you must apply the basics, which is overlapping security controls, and these, from different vendors. Because when vendor 1 backend is hacked (like solarwinds, or azure, or mostly all of them), you need to have a trigger from vendor 2 solution.

This week in 74 points, which I think is the worst (biggest) amount of news I did since I started this newsletter :

1 – NIST comes with some ransomware guidance, always good to have a baseline – NIST Issues Cybersecurity Framework for Ransomware Risk Management


2 – Not like if you haven’t been warned, real leak, or cover to allow what would normally be illegal data use – Clubhouse leaked data trove including phone numbers isn’t as bad as it sounds (don’t worry, nahhh)


3 – Astonishing that people still blindly trust tech and Internet ! Bitcoin.org hackers steal $17,000 in ‘double your cash’ scam


4 – Got to love the #clowd and big tech abuses – When the FBI seizes your messages from Big Tech, you may not know it for years


5 – OT / industrial cyber risk is tricky. Ask questions about probabilities like we did 10 years ago and you get answers that just don’t work well – Mark Fabro, President & Chief Security Scientist at Lofty Perch joins the podcast to look at the modern way to model risk


6 – New Android malware, a lot of them lately, don’t blindly trust applications – New Android Malware Steals Financial Data from 378 Banking and Wallet Apps


7 – You can not trust technology – Malicious ‘Safepal Wallet’ Firefox add-on stole cryptocurrency


8 – DMARC, SPF, DKIM, all help to avoid domain impersonation – How Does DMARC Prevent Phishing?


9 – Everything is infected, do you have the proper tools to detect and respond to cyber threats ? A New Jupyter Malware Version is Being Distributed via MSI Installers


10 – Organizations don’t chose to go multi-cloud most of the time, they fail on multiple cloud and end up in nightmare situations – How to avoid the pitfalls of multi-cloud strategy deployment


11 – The cloud is addicted to leaks, so it postpone the suppression of unsafe protocols for a year – Microsoft will disable Basic Auth in Exchange Online in October 2022 ( I know I blame the cloud once again)


12 – Good to see an article about SIEM/SOC and the evolution of the SIEM toward modern environment – Next Generation SIEM/SOC: Formula 1 vs. Rally


13 – You are a target (yes, anyone, and you) – New malware steals Steam, Epic Games Store, and EA Origin accounts


14 – You are hacked, do you even see it ? Russian Turla APT Group Deploying New Backdoor on Targeted Systems


15 – I’m sure your MSSP provider reminded you how critical it is to have XDR protection on your domain controllers as well – Microsoft Warns of ‘FoggyWeb’ Malware Targeting AD FS Servers


16 – Connected cars will get you killed remotely – Yes, Car Hacking Is a Reality. Here’s How Can You Protect Your Fleet


17 – Crimecoins – Ethereum dev admits to helping North Korea evade crypto sanctions


18 – This was an absolutely unexpected stat ! Women, Minorities Are Hacked More Than Others


19 – It’s Qnap patch time ! QNAP fixes critical bugs in QVR video surveillance solution


20 – Why the cloud is exploding your costs and killing your business, and how you should carefully take load out of the dangerous cloud – Cloud Computing Like a Day in a Chocolate Factory for IT Managers


21 – Malware analysis, Blacktech in Japan is active at least ince 2018 – Malware Gh0stTimes used by attack group BlackTech


22 – Jealous of the cloud rip off performance, Veeam decided to follow the ransomware gang by taking a lot more money from the dumb customers – Socket to me: Veeam instance license confusion


23 – Privacy focused video conferencing solution – What started as a small video conferencing service for friends and family, my friend Mitchell Cohen, continued to grow and build a great product


24 – Good job, some less scammers in the place ! Ukraine takes down call centers behind cryptocurrency investor scams


25 – This is very cool ! Some good stuff for exchange servers – New Microsoft Exchange service mitigates high-risk bugs automatically (hoping they don’t break everything to push you to cloud…)


26 – Don’t fall for the scam ! Credential Spear-Phishing Uses Spoofed Zix Encrypted Email


27 – Nice tool, for both offensive and defensive work ! TruffleHog – Now a Browser Extension That Detects Secret Keys In JavaScript


28 – Tuesday, auth0 had 2 regions down, US-1 and EU, which did lead some customers and users not able to login


29 – An interesting document from CISA and NSA about picking the proper VPN for your remote needs – Selecting and Hardening Remote Access VPN Solutions


30 – What could possibly go wrong – Master Lock Introduces New Bluetooth ProSeries Padlocks – Wireless is weak !


31 – When threat actors sells surveillance kits to law enforcement and apply full obfuscation – SAS 2021: FinSpy Surveillance Kit Re-Emerges Stronger Than Ever


32 – Cloud glitched Wednesday ! Twitter web client outage forced users to log out, blocks logins


33 – Cloudy days this week, auth0, twitter, O365, did sound a lot of coincidence to me – Microsoft 365 MFA outage locks users out of their accounts


34 – Was Atlassian patch time – Atlassian Confluence RCE Flaw Abused in Multiple Cyberattack Campaigns


35 – October is the Cyber Security month, and this sponsored article bring some hints and tools to fulfill what you can do during this time ! Essential Toolkit for National Cyber Security Awareness Month


36 – One may wonder why would Facebook care about app privacy ? Obvious, data is Facebook value, while there is no issue for them to take data, there is no way they’ll let anyone mine theirs – Facebook Releases New Tool That Finds Security and Privacy Bugs in Android Apps


37 – Lesson is : when attackers gets in, you lost, it’s too late – Trucking giant Forward Air reports ransomware data breach


38 – Great reading, understand that as soon as you outsource, you are hacked – Cyberspace, Cybergames, and Cyberspies


39 – You understand that internet is a battlefield, the team behind solarwinds hack is still out there, actively hacking – New Tomiris backdoor likely developed by SolarWinds hackers


40 – It’s not new, been on incident response and they wiped the NAS and other backups, but they automated now, especially destroying VEEAM backups – Conti Ransomware Expands Ability to Blow Up Backups


41 – Lovely, the cloud ruined your life. So much for « play protect » BS, and others « just use the official store it’s safe » – New Android malware steals millions after infecting 10M phones


42 – Reminder : cloud=leak – Apple iCloud Private Relay Service Glitch Exposes Users’ Real IP Addresses


43 – Fun thing to see all this big tech with AI, ML, security center and all, and yet, threat actors do business as usual – Threat Actors smarter than you and big tech Weaponize Telegram Bots to Compromise PayPal Accounts


44 – Some accurate advice here rather than in the article :
1 – duct tape against the leaks
2 – hope it will only happen to others
3 – no duck given, it’s not our data anyways
3 Security Initiatives AWS’s New CEO Should Prioritize


45 – Big move here, more and more, big player buy their #cybersecurity company as it seems the market is growing – Akamai acquires Guardicore to expand its zero trust security portfolio


46 – You are hacked, you just don’t know it yet – New FinSpy Malware Variant Infects Windows Systems With UEFI Bootkit


47 – Due diligence is the process where you assess that the scoped area is actually matching your requirements, and allows to validate a possible integration or state of things – New CyCognito Report Reveals Subsidiaries are Global Enterprise Achilles Heel; Increasing Attack Surface and Exposure Drawing in Attackers


48 – Implementation flaws and API, the usual recipe for disaster – Salt Security Finds Widespread Elastic Stack API Security Vulnerability that Exposes Customer and System Data


49 – Dangerous to be a #cybersecurity CEO with « suspicions of high treason » because of sharing threat intelligence – Russia arrests cybersecurity firm CEO after raiding offices


50 – Microsoft will raise the price of O365 by 25% next year, because now they hold you by the … data, so you just shut up and pay.


51 – Somehow there are losers in the cloud world domination game – How IBM lost the cloud


52 – Interesting statistics about ransomware threat actors. Who they are and their market share – The Top Ransomware Threats Aren’t Who You Think


53 – We know wireless is weak, and in this case, same as the cloud, we got huge implementation failure – Thousands of University Wi-Fi Networks Expose Log-In Credentials


54 – Just a reminder, stealing from :
– Steam
– Epic Games Store
– EA Origin
Stealing :
– Cookies
– Passwords
– Bank cards

BloodyStealer Malware Steals Cookies, Passwords, Bank Cards From Gamers Browser


55 – Nice self assessment tool – ImmuniWeb Launches Free Cloud Security Test to Detect Unprotected Storage


56 – This, AND, knowing the cloud leaked all biometric data it ever collected, this is clearly not a good option – How much trust should we place in the security of biometric data?


57 – Smartphone for payments is an absolute joke – Apple Pay with VISA lets hackers force payments on locked iPhones


58 – Wireless is weak – Apple AirTag Zero-Day Weaponizes Trackers – Apple’s personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS


59 – An interesting take about identity consolidation in the cloud – The Need For Identity Consolidation In The Cloud – In an obvious initial approach, goal is to consolidate and bring relevant views of different events across platforms. An evolution of the SSO (single sign on).
On my side, it triggers a question of who decide what proves we are who we are. It’s totally fine for an organization to consider as many non invasive solution to achieve this goal.
It’s a whole other question when it comes to defining our identity in society.


60 – The cloud is as blind as its customers !!! New Azure AD Bug Lets Hackers Brute-Force Passwords Without Getting Caught


61 – If you don’t care about privacy and use chrome, then it’s patch time for you – Google Emergency Update Fixes Two Chrome Zero Days


62 – How has this even been deployed without proper shielding ?! – Military’s RFID Tracking of Guns May Endanger Troops


63 – Reaching the ransomware infection is NOT an option. You must have proper defenses in place – RansomEXX ransomware Linux encryptor may damage victims’ files


64 – it’s #QNAP patch time again ! QNAP fixes bug that let attackers run malicious commands remotely


65 – Big or small doesn’t matter, threat actors will go for every targets ! JVCKenwood hit by Conti ransomware claiming theft of 1.5TB data


66 – Do not fall for the scam ! You’d get hacked – Fake Amnesty International Pegasus scanner used to infect Windows


67 – Rootkit is back on stage lately – GhostEmperor hackers use new Windows 10 rootkit in attacks


68 – Digital transformation killed data governance, we totally lost control – Content sprawl is increasing the risk of data breaches and leaks


69 – When the cloud industry starts to feel the heat, they try to throw some rocks at gov, without cleaning anything in front of their door – Trusted Cloud Principles (lol, we are in the zero trust era due to you cloud, lol again)


70 – The cloud, continuous implementation failure ! Because the cloud is failure by design ! Criminal Hackers rob thousands of Coinbase customers using MFA flaw


71 – Technology is under attack, I don’t think people stand a chance sadly – Flubot Android malware now spreads via fake security updates


72 – Can you keep up ? New APT ChamelGang Targets Russian Energy, Aviation Orgs


73 – Don’t blindly pull apk android software from the cloud and internet cesspool – Hydra malware targets customers of Germany’s second largest bank


74 – At least someone looking at this ! Let’s hope the solution won’t be « let’s throw this is the clowd » ! The FCC proposes rules to fight SIM swap and port-out fraud


What a CRAZY week in the news !

Have a great week end all, as usual, zero BS cyber security.

Loading

Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?

Alexandre Blanc CyberSecurity weekly cyber linkedin
Sept 2021, and criminals are still winning the game, despite all the cloud sparkles

Each week is a learning opportunity, we learn from incidents, we learn from vulnerabilities, we learn from others, and we learn while sharing. Yet, all claiming to have the silver bullet, and in reality, it’s just widely inapplicable to the reality of businesses.

The tech world is echoing so strongly its own stuff, that it doesn’t hear the market and businesses anymore. All sailing in a digital storm in a weak boat, trying to stay afloat, while pirates, whoever their sponsor are, are riding on jet-skis with extreme agility.

The cloud is like a big ship, offering for smaller ones (SMBs etc) to host their critical assets, but the cloud, is also a huge marketplace, and you have no idea about what happen to your assets in these big ships, but one thing is sure, the space is expensive, and loading or unloading your assets is very expensive and dangerous, not forgetting the pirates on their jet-skis jumping on any chunk they can catch or poison.

Can I stop here without thinking about phishing ? Nah, there is big phishing going on as well, this is an ocean after all ! Are you credentials (be them password, biometric, certificates or whatever serves as key, doesn’t matter, all the same) going to be served on the next dark web sushis plate ? (sorry if you are allergic to phish :P )

This week in 49 points :

1 – Why do you continue to connect your private life to dangerous technology ? Something I don’t get ! Serious RCE Vulnerabilities Found In Motorola Halo+ Baby Monitor


2 – When you build your cyber security posture, it’s also to protect yourself from organized crime, especially transnational criminal organizations like these. You are a target. Europol links Italian Mafia to million-dollar phishing scheme


3 – Don’t fall for the scam ! (again) – A New Wave of Malware Attack Targeting Organizations in South America


4 – An interesting event ahead, about API security lifecycle – Taking charge of the API security lifecycle


5 – Don’t fall into the expired certificate trap ! Hacked sites push TeamViewer using fake expired certificate alert


6 – And the cloud continues to ruin millions of lives, this is unbelievable – Payment API Bungling Exposes Millions of Users’ Payment Data


7 – Are you the next in line ? Or will you take care of the key security controls to enhance your posture and reduce risk and imlact ! US farmer cooperative hit by $5.9M BlackMatter ransomware attack (When I posted did one, I did not know a second farmer cooperative would fall just a few days after as well… sad)


8 – Outlook have trouble supporting hardware MFA – Microsoft investigates Outlook issues with security keys, search


9 – A feeling of déjà-vu ? Republican Governors Association email server breached by state hackers


10 – And the cloud leaks and leaks and leaks (I’m sorry, these are just the news, but they confirm cloud=leak, non stop) – EventBuilder misconfiguration exposes Microsoft event registrant data


11 – My podcast recording with Debbie Reynolds about data and privacy – On episode 46 of The Data Diva Talks Privacy, Debbie Reynolds talks to Alexandre BLANC Cyber Security


12 – WordPress as any other online system must be kept up to date and you must enable MFA on it, there are tons of free 2FA/MFA solutions for it – New Capoae Malware Infiltrates WordPress Sites and Installs Backdoored Plugin


13 – Encrypted by ransomware in the cloud – Marketron marketing services hit by Blackmatter ransomware


14 – This is exactly where working with specialists like VARS, who does the heavy lifting for you – 77% of execs concerned about security tools gaps in their company


15 – There are so many surveillance out there that you can’t pee without being noticed – Amazon Driver-Surveillance Cameras Roll Out, Sparking Debate


16 – What to do when your cloud based phone provider is down by DDoS attack ? VoIP.ms phone services disrupted by DDoS extortion attack


17 – A well done whitepaper on managing your assets in an hybrid environment (which means cloud and on prem) – 6 best practices to stay secure in the hybrid cloud


18 – it’s VMware Vcenter patch time due to critical vulnerability – VMware warns of critical bug in default vCenter Server installs


19 – A reminder that state sponsored actors are playing on the same network as the one you connect everyday ! Turla APT Plants Novel Backdoor In Wake of Afghan Unrest


20 – Mac OS is as vulnerable as other systems, sadly, critical vulnerabilities appear on a regular basis – Unpatched High-Severity Vulnerability Affects Apple macOS Computers


21 – Cut the money, that should change things. Making attack useless, force threat actor to take risky workaround, hopefully this will help – US sanctions cryptocurrency exchange used by ransomware gangs


22 – Less effort also means less control – Is Low Code development the biggest cyber threat?


23 – it’s netgear patch time again ! Netgear fixes dangerous code execution bug in multiple routers


24 – OpenOffice patch time, but patch is not yet in binary :) only in source code so far – A malicious document could lead to RCE in Apache OpenOffice (CVE-2021-33035)


25 – Watch for nagios updates ! New Nagios Software Bugs Could Let Hackers Take Over IT Infrastructures


26 – For having been using Cynet for months, and providing it as part of managed solution, I can tell you this is the real deal – How Cynet’s Response Automation Helps Organizations Mitigate Cyber Threats


27 – Big tech summarized ! Creepy data collection and sharing remain common on popular apps


28 – The new world order – Whole cloud spending to surpass $1.3 trillion by 2025


29 – If you work in cyber security, you obviously manage risk all the time, speaking about risk posture, vulnerabilities, exploits etc – What Is Cyber Risk Quantification


30 – Do not wait to build your security posture ! NO ONE WILL DO IT FOR YOU IF YOU DON’T trigger the change ! FBI, CISA, and NSA warn of escalating Conti ransomware attacks


31 – And you think you can negotiate with criminals ? Nope – How REvil May Have Ripped Off Its Own Affiliates


32 – Apple trying to bring TLS security – Apple will disable insecure TLS in future iOS, macOS releases


33 – Another ransomware victim in the farming industry – Second farming cooperative shut down by ransomware this week


34 – Microsoft exchange seems pretty neglected lately, or heavily targeted – Microsoft Exchange Autodiscover bugs leak 100K Windows credentials


35 – Disgusting state of the art ! Introducing vulnerability, not fixing it, and pretending that only using manufacturer privacy invasive security tool can fix the issue ! A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit


36 – Turn off wireless when you don’t use it, or get hacked ! Wireless is weak ! Bluetooth Vulnerability: Arbitrary Code Execution On The ESP32, Among Others


37 – Don’t fall for the scam, don’t click, never apply an update from a site that was not supposed to manage your system (ie any site) – New Android Malware Targeting US, Canadian Users with COVID-19 Lures


38 – Another HUGE #clowd win ! Colombian Real Estate Agency Leak Exposes Records of Over 100,000 Buyers


39 – How well do you know your attack surface ? Do you have a live inventory of all your digital assets and full deep visibility on all your cloud workloads, audit capabilities ? Cring Ransomware Gang Exploits 11 Years Old Adobe Bug & Take Over ColdFusion Server Remotely


40 – Big tech abuses and lies start to have massive effect ! 76% of individual are legitimately scared of technology, knowing they are at greater risk of having their identity stolen – Consumers taking action to protect themselves online, though confidence is low


41 – Amazon really want my pictures ! They send me this non stop ! I think $12 is cheap to know my whole life whereabouts ! Yes, it’s about data collection, and not about backing up your picture


42 – Great detailed analysis of the extend of how threat actors will exploit a vulnerability, and achieve lateral move, while capitalizing on all the available information found during the operation – FamousSparrow: A suspicious hotel guest


43 – Interesting take, and so true. In rush to the dangerous cloud, trying to catch up with digital transformation and feeding their FOMO, organizations totally drops their responsibilities on the Confidentiality and Integrity part of their data management – 76% of IT Teams Are Prioritizing Business Continuity Over Security. Why Not Have Both?


44 – As you can’t embed security solutions, neither easily patch IoT devices, you must adjust your security architecture accordingly – 100M IoT Devices Exposed By Zero-Day Bug


45 – Once again, Apple patch time ! Apple fixes another zero-day used to deploy NSO iPhone spyware


46 – And the cloud leaks, it’s all about stealing data after all – Apple’s New iCloud Private Relay Service Leaks Users’ Real IP Addresses


47 – it’s CISCO patch time again – Cisco fixes highly critical vulnerabilities in IOS XE Software


48 – It’s sonicwall patch time again – SonicWall fixes critical bug allowing SMA 100 device takeover


49 – They do something, but it’s funny – Microsoft rushes to register Autodiscover domains leaking credentials


And this is closing a loaded week, as I’ve been (actually almost about to be in my second panel today at the Titaniam Red summit) and other speaking engagement such as the XDR MSS summit, I can’t wait for the weekend to rest quite a bit :P

Seeing you all next week, most likely for a new weekly !

Enjoy !

Loading

vendredi, septembre 24th, 2021 cloud, clowd, Cyber Security, Paranoïa, Technologie Aucun commentaire

The threat landscape is very dynamic – Cyber news this week

Alexandre Blanc CyberSecurity weekly cyber linkedin
The weekly worked very well on my blog, so I’ll stick with it for a while !

This week again has been quite loaded, and the technology environment, which define the attack surface, is only growing. It takes a vulnerability, a threat attached to it, and we have a risk.

To know the likelihood of any threat to be targeting our organization, we go through a threat modelling exercise. Sometimes it’s formal, documented and referred in the risk register, sometimes it’s a guesstimate, a rough high level assessment. Overall, better than not considering the risk at all.

This week in 49 points, hosted on my blog, because I know I won’t have limitations etc, and for each of these, there is something to learn, a security control you may have forgotten :

1 – The financial system is fully backed by technology, and therefore, fully vulnerable – World Economic Forum (WEF) Warns of Cyberattack Leading to Systemic Collapse of the Global Financial System – Do you have some cash handy ? You are your own risk manager, what happen if you can’t use your payment card for a week ? Do you have enough food ? Gas ? Just a week, think about it.

2 – Building and learning takes time, but if you don’t, you are not the real owner – This Best-Selling TP-Link Router Ships With An Alarming Security Surprise – Do you know what runs on your network ? and what or who is watching your online activities ? (aside of the ISP who gladly sell all your activity, including your favourite recipes on youcorn, they know if you like crunchy corn, or white corn, old corn or even big or slim corn ! yes a VPN might come handy, but think twice who should know how you like to eat your corn ! )

3 – I’m proud having received the Cyber Sentinel Award 2021 in India for my work in #cybersecurity, and that’s a huge news :P – Cyber Sentinel Award 2021 – In the post you’ll find link to the panel I had a chance to participate as well, you’ll see that trends in India are very aligned with trends in US and Canada !

4 – I told you to drill that weak NFC circuit on your payment card ! Paypass is unsafe – New Vulnerability Allow Hackers to Bypass PIN Codes on Contactless Cards From Mastercard & Maestro – Wireless is weak, you know the song

5 – Let’s clear something, when authorities come with a warrant, organizations must comply – Important clarifications regarding arrest of climate activist – unlike the cloud, they did not betray confidentiality, as they are not technically supposed to be able to access your encrypted mailbox, they could just tell which IP use this mailbox. VPN maybe ? again, know which VPN you use, deciding to give all your traffic to a VPN provider is something you should look twice.

6 – Transnational criminal organization are efficient businesses – “FudCo” Spam Empire Tied to Pakistani Software Firm – Enjoy the reading, understand how it works, and be sure there are thousands like these.

7 – bypassing MFA and password reset, more on the SAML golden ticket attack, an attack close to pass the hash – Golden SAML Attack – APT Hackers Hijacking & Gaining Access To The Active Directory Server – Attacker don’t even need your credentials to be logged as you, be aware, MFA + attribute based authentication with continuous diagnosis and mitigation, yes I speak about better than ZeroTrust, I speak about CGM !

8 – Do you really know who you are working for, and what’s the purpose of your work ? TrickBot gang developer arrested when trying to leave Korea – In the not so recent past, I worked for an organization which turned to be terrorists, and this is one of the way I learned how privacy matters, how it’s heavily tight to freedom. So, always check who you work for, and make sure you are sure this is what it is. It doesn’t only happen to others. Due diligence is a good practice for your daily life too.

9 – WordPress plugin patch time ! Gutenberg Template Library Plugin Bugs Affected 1+ Million WordPress Sites – Oh myyyy penguiiiiiinnnn ! I’m currently typing on WordPress ! Oh no ! I’m doomed, nooooooo !…. oh wait, I just clicked on « update » and in 10 sec my blog was updated…. and actually there is a worst one that this one, so you full WordPress deserves an update if you did not apply it today.

10 – Netgear patch time ! Netgear fixes severe security bugs in over a dozen smart switches – Yes, patching is a non stop job, you should have someone coordinating this in your organization, because patching a switch, will turn the network off for a few seconds, even minutes. Coordination is key !

11 – IoT, or the internet of threats, is only growing (it’s supposed to mean the Internet of Things, but it’s not accurate) – IoT Attacks Skyrocket, Doubling in 6 Months – And this is only growing, the more you connect, the more you grow your attack surface, and the need for security controls, network segmentation and more, I know, at home it’s not easy !

12 – Speaking about IoT, Don’t connect all this crap ! Vulnerabilities In Victure Baby Monitor Allow Access To Camera Feeds – Really need to watch your baby with Russia and China doing so with you ? Because they will, do you know this site « Insecam » ? Enjoy.

13 – What do you do when all your stuff is in the cloud and Internet is taken down by DDoS ? New Zealand suffers a widespread Internet outage – You can look at stuff like Cloudflare solutions, issue is, you must give away all your traffic to the platform, and while they claim they never tap any connection, this is still a risk to consider. Sometimes it’s also a matter of national security, you would not want to give all your national internet traffic to another country either. Not simple.

14 – CASB LOL ! Criminal access service brokers to the cloud – Enterprising criminals are selling direct access to cloud accounts – Did you setup geo fencing in your cloud configuration ? On your firewall it’s easy, you just allow only national IPs as per need, in the cloud you’ll pay per rule or so.

15 – Micro segmentation is the very first step to protect your workload and bring governance, including the coverage of legacy systems – Micro-segmentation From Strategy to Execution

16 – A virus in the facebook application that steal your mobile data on Android – Discovered a virus in facebook app that steal data from user – You may consider using « slimsocial » on Android instead of the facebook apps, safer, better for privacy, it works well, and the key is that the app doesn’t send your private data to FB.

17 – I hope you use a password manager and multi factor everywhere – McDonald’s leaks password for Monopoly VIP database to winners – Whenever you give away your data, you must assume it will be compromised, as much as doable, provide fake data.

18 – Your private satellite network ? Review: Hands on with the Swarm Satellite Network Eval Kit

19 – Issue when you have tons of interconnected systems is that decommissioning can be a mess when not properly documented – Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server

20 – If ransomware gets in, you are done. Criminals will promise everything, but they are criminals, they will leak anyways – Ransomware gang threatens to leak data if victim contacts FBI, police – You should have proper security posture so as you never get to this point. At least, start with endpoint protection, such as Cynet XDR (yet we do provide managed offer for this product at work, customers are very happy with it, and the key point is, it works ! )

21 – There is porn, and Netflix and prime video and P2P, so most of internet is leisure and crime – 39% of all internet traffic is from bad bots – Quick hint, you are connected on this very same internet and your traffic is counted in this stat, oh oh….I know, we only watch youcorn ;)

22 – Scraping VS leaks ? Would you know the difference ? Dark Web Scraping

23 – Servers back online, seems they went dark for a while but came back – REvil ransomware’s servers mysteriously come back online – I bet the reason is summer vacations ! What is your take ? They made so much that they took a break ! :P

24 – Manual patch for O365 or get hacked – The cloud is funny – Microsoft shares temp fix for ongoing Office 365 zero-day attacks

25 – A Dash of cyber – In this episode Rod lewis, Brad Rhodes, Alexandre Blanc and Ron Craig will be talking about IoT, Great live we did, don’t miss the replay !

26 – The less apps you use, the less exposed you are. Reduce your attack surface ! Experts Uncover Mobile Spyware Attacks Targeting Kurdish Ethnic Group

27 – Popcorn time ahead, storm and pouring, data flooding as well ! Cloud computing market to reach $1,251.09 billion by 2028 – if we’d stop all cloud spending, we could pay the whole world debt immediately…. I’ll let you think about this.

28 – Backend of most cloud, HAProxy needs patching ! HAProxy Found Vulnerable to Critical HTTP Request Smuggling Attack – You should patch if you use it.

29 – Are you the next in line ? Have you prepared your organization by deploying proper security controls and limit incidents impacts ? Howard University shuts down network after ransomware attack

30 – When you need to provide remote access, but you need to restrict access to a limited amount of resources, and need efficient audit trails, Cyolo comes to mind – How to Provide Remote Users with Access to Restricted Services

31 – Zoho patch time ! Zoho patches actively exploited critical ADSelfService Plus bug – Pretty bad exploit given the nature of the product !

32 – Patching your Fortinet is critical, changing all passwords and enforcing MFA is even more needed ! Criminal Hackers leak passwords for 500,000 Fortinet VPN accounts

33 – Faking vaccine, a kamikaze approach – Spoofing Bug Highlights Cybersecurity for Digital Vaccine Passports

34 – Cloud oriented dev is quite different than traditional open source like CPAN etc – The Dark Side Of Package Repositories: Ownership Drama And Malware – an excellent reading.

35 – You think you can trust teams and that your boss trusts you ? LOL, don’t forget this is cloud based, so pure nastiness ! What Your Boss Can TRACK About YOU with Microsoft Teams

36 – Very happy to have had the opportunity to share during an interview, among amazing world wide known knowledgeable specialists – 2021 MIDDLE TN CYBER CONFERENCE », organized by The Tennessee Department of Safety & Homeland Security and TCAT Shelbyville

37 – They went after the Russians…. There might be some retaliation coming here – New Mēris botnet breaks DDoS record with 21.8 million RPS attack

38 – We spoke about IoT and IIoT security issue during our Dash of cyber live, and here is a very relevant article on the topic – Fighting the Rogue Toaster Army: Why Secure Coding in Embedded Systems is Our Defensive Edge

39 – NPM patch time again ! GitHub finds 7 code execution vulnerabilities in ‘tar’ and npm CLI

40 – Multi factor authentication renders this useless – Ukrainian extradited for selling 2,000 stolen logins per week

41 – You’ll see the take of the article, BUT, I say it depends on the vertical and your compliance requirements ! 3 IT Restrictions that are hurting your business

42 – Public cloud continuous key problem : can’t isolate data between customers – ‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise

43 – CRAZY LOL ! Microsoft, the provider of cloud and teams and online collaboration tools (SharePoint and all) just publicly admits that their cloud doesn’t allow remote worker to do their job ! Study of Microsoft employees shows how remote work puts productivity and innovation at risk

44 – A world of deception, we can do better than this – Rep. Adam Schiff rips Amazon and Facebook for ‘directly profiting’ on COVID-19 misinformation

45 – Fixed but not really, history tends to repeat itself – Windows MSHTML zero-day defenses bypassed as new info emerges – Yes again and again !

46 – Things are moving ! Great !…. well somehow moving …. Rep. Jayapal: Biden administration supports Amazon-busting ‘Ending Platform Monopolies Act’

47 – It is very simple, no 2FA (second factor authentication) is a wide open door – Stolen Credentials Led to Data Theft at United Nations

48 – Threat actors are innovating continuously – SOVA: New Android Banking Trojan Emerges With Growing Capabilities – The less apps you install, the less risk you take !

49 – When you realise that OWASP Top 10 is the EXACT definition of the cloud state !!!! OWASP Top 10 2021 Published – Broken Access Control Jumps to the Top Spot

Some coming event in which I’ll be speaking (I know, bla bla bla bla :D ) :

Enjoy and have a good weekend all ! Thank you for reading !

Loading

vendredi, septembre 10th, 2021 cloud, clowd, Technologie Aucun commentaire
Not f'd — you won't find me on Facebook
décembre 2024
L M M J V S D
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
 

 
Suivez moi sur twitter - follow me on twitter
 
Follow on LinkedIn
[FSF Associate Member]
 
Free Software, Free Society
VIRTUALISATION :
Compacter une image virtualbox VDI
Bon petit tutoriel esxi
Marche d'appliances vmware
Installer ESXi sur un disque IDE
Installer ESXi 3.5 sur un disque USB
Installer proxmox avec DRBD et migration / réplication à chaud
Installer OSSEC avec VMware
Information sur le VDI
SECURITE - FIREWALL :
Ouvrir des ports dynamiquement iptables - knockd
Autre tres bon tuto knockd
Docs Arp poisoning - Anglais
Metasploit test de pénétration
Zone H - sites piratés en temps réel
Blog invisible things
Tips protection sécurité wordpress
Pfsense - distribution firewall opensource - adsl internet failover
Iproute 2 mini how to - linux advanced routing
ClearOS - la passerelle sécuritaire lan - wan
HAUTE DISPONIBILITE :
CDN - Accélération de la distribution de données
drbd iscsi ocfs2 dm multipath tutoriel
Load balancing LVS
Load balancing opensource list
HA-Proxy :
HAproxy - http load balancer
Simple tutoriel HAproxy
HAproxy - debian tutoriel
Centos - Ip failover
Configuratoin DM-Multipath Redhat
VMware Doubletake - continuité
Quelques liens sur la réplication MySQL : Manuel MySQL, chapitre sur la réplication
Manuel MySQL, Tutoriel clair sur la mise en place
Autre tuto sur la mise en place de la réplication MySQL
Références pour optimisation du serveur MySQL
Utilisation de EXPLAIN mysql pour optimiser vos bases
optimiser vos bases - requetes et index
STOCKAGE RESEAU :
Un outil de clonage disque en reseau
Internet NAS 250Go 250 accès VPN
Server ISCSI avec Ubuntu tuto
ISCSI centos redhat tutoriel
Gérer et étendre un LVM
Créer sa piratebox ! trop cool
Deaddrops, les clés USB dans les murs, aussi cool !
OPTIMISATION WORDPRESS :
Télécharger Xenu
Comment utiliser Xenu
optimisation hébergement wordpress
Super howto wordpress (En)
Test de charge serveur web - Load impact
VPN - ROUTEUR - LAN:
Zeroshell - le mini-routeur wifi tout en un
Retroshare, votre réseau d'échange crypté!
Openvpn sur centos redhat
Intégrer Linux dans active directory
Routage inter-vlan avec Linux
Routage avec OSPF
Network Weathermap
TENDANCES - WEB:
Boutons twitter
Analyser les tendances des recherches Google
Protocole sitemap - robots.txt
Creer des animations CSS3
Code php pour interagir avec twitter
E reputation
Jquery
TRUCS ET ASTUCES GNU/LINUX :
Tuxmachines.org - Actus et tips linux
Configurer GRUB2 et grub2 ici
Panoet - en anglais - tips & tricks
Readylines tips and trick pertinents
Squid Clamav - proxy antivirus
Apprendre Unix en 10 minutes
13 tips sur les expressions régulières
IE Sous linux IES
LDAP 2.4 Quickstart guide
Tutoriel LDAP
Installation annuaire LDAP
Serveur Mail Postfix - Dovecot - LDAP - MDS
Créer un linux personnalisé en ligne - custom linux
Super site sur linux - en
Capistrano - déploiement automatisé
MONITORING :
Nagios tutoriel et doc
Nagios plugin NRPE tuto
Nagios plugin NRPE autre tuto
Nagios plugin NRPE officiel
Zabbix - fonctionnalités
Zabbix - installation
Guide MRTGsys - grapher la charge locale
MRTGsys - ajouter des graphs
MRTGsys - interpréter les données
Shinken - Monitoring
Thruk Monitoring webinterface
Shinken - Tutoriel
Shinken - Référence chez Nicolargo
AUTRES LIENS :
RemixJobs IT jobs
USB Multiboot
Reset mot de passe windows
Java python et autres tips, intéressant !
Forum inforeseau
Open Clipart
Excellent comic en ligne
Inforeseau.fr