Technologie

Cybersecurity is not obvious even for this newsletter !

The weekly cyber ended on my blog for now, linkedin stuff doesn’t work !

Cyber security focus is to achieve CIA, Confidentiality, Integrity, Availability. Well, seems that my edition of last week suffered from availability issues where no one got notification of it. Sad because it was quite interesting, you can still find it by checking previous version of this newsletter.

Let’s hope, this week, you’ll get notified of the publication ! :D Actually, had to move my newsletter content to my blog, as linkedin blocked edition after the 18th link, as weird as it sound, can’t post on linkedin as I did before.

First, I wanted to share that I had a great time during Enterprise IT World Security Symposium and awards 2021, in India. Was a great virtual event, where I spoke for the first time on a panel in this event, and got awarded for the second time :)

Back to this week in 45 points :

1 – Ransomwares are like the cloud, and vice versa, sadly here to stay : Three Things That Amplify the Threat of Ransomware and How To Combat Them

2 – Keep an eye on coming QNAP patches – QNAP works on patches for OpenSSL bugs impacting its NAS devices

3 – Is your exchange fully patched and up to date ? Microsoft Exchange ProxyToken bug can let hackers steal user email

4 – Ransomware impact can be avoided or at least mitigated with proper security posture – LockBit Gang to Publish 103GB of Bangkok Air Customer Data

5 – Patching everything, from connected toilets to garage door – Critical Vulnerability In Annke Network Video Recorder Could Allow RCE Attacks

6 – Privacy is much critical factor than what big tech may think – Zoom Stock Wipes Out More Than $15 Billion In Market Value After Earnings Reveal Pandemic Growth Is Waning

7 – Weekend and vacations are bad times for security, yet we need them :P FBI, CISA: Ransomware attack risk increases on holidays, weekends

8 – Dynamic Pricing and Discounts plugin from Envato #wordpress patch time – WooCommerce Pricing Plugin Allows Malicious Code-Injection

9 – Is your GPU computing for criminals ? Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs

10 – Will you stop connecting everything and anything and growing your attack surface ?! Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms

11 – Cloud employees spying program got caught and shamed the cloud for its usual abuses – Microsoft 365 Usage Analytics now anonymizes user info by default

12 – I’m speaking ( again ! ) at RED Summit 2021: Ransomware and Extortion Defense For Industry & Government. Would you like to attend? (I don’t appear yet on the website, but it will come), we also did an intro video with the amazing Debbie Reynolds !

13 – Can We Digitally Disappear: Our Lives Exposed O… by The Bureau with Frank Figliuzzi – Don’t miss a great interview of an amazing FBI agent that support privacy !

14 – The future of technology is decentralized, unlike the cloud – Decentralized cloud computing platform preserves internet privacy

15 – Where do you stand with your security posture ? [Cocktail Book] Raise Your Drinks & Your OT / IoT Security Posture

16 – Cloud is so safe that NSA won’t use it at all and spend $2B for their own on prem cloud – NSA Cloud Capabilities See Boost Under New Billion-Dollar Contract with HPE

17 – There is an obvious pattern seeing the raise of attacks on crypto exchange places – Bilaxy Crypto Exchange Went Offline After Cyber Attack

18 – Botnets are trendy again ! (they never ceased to be anyway in the criminal activities) – Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

19 – This is why your processes must be put in a formal way, be documented and maintained, so as upon termination, employees accesses will be properly removed – Fired NY credit union employee nukes 21GB of data in revenge

20 – Watch for linphone and underlaying stack updates – Linphone SIP Stack Bug Could Let Attackers Remotely Crash Client Devices

21 – Criminals too, face skills shortage ! BEC Scammers Seek Native English Speakers on Underground

22 – You control nothing, time to move to Linux and recover lost #privacyMicrosoft kicks unsupported PCs out of Windows 11 preview program

23 – Happy to share this article about the advantages of performing an IT Security audit for your organization, my first article at work ! yeah ! Why perform an IT security audit? (I linked to my linkedin post about it for now so you can interact, in the end I might just go straight to target)

24 – A good PDF reference document about the ZeroTrust architecture – The CISO’s guide to Extending Zero Trust to the Endpoint

25 – A workaround that will also kill the plug and play capability, convenience or security ? How to block Windows Plug-and-Play auto-installing insecure apps

26 – Now that Zuckerman is out, remains Zuckerberg to kick out ;) for the same privacy invasion issues :p – FTC bans stalkerware maker Spyfone from surveillance business

27 – it’s CISCO patch time ! Cisco fixes critical authentication bypass bug with public exploit

28 – Not without reminding the poor security of the COVID related apps, seems that we never ever learn – Digital State IDs Start Rollouts Despite Privacy Concerns

29 – wareztheremotes ! Comcast RF Attack Leveraged Remotes for Surveillance

30 – How long will it take for you to realize you are hacked ? Autodesk reveals it was targeted by Russian SolarWinds hackers

31 – Simple : anything you put on technology will betray you – WhatsApp Photo Filter Bug Could Have Exposed Your Data to Remote Attackers

32 – When you put your assets in the cloud, you know they’ll be stolen – Cream Finance hacked; $29 million Crypto asset stolen

33 – Be aware, in a not so far future, we’ll turn humans into bots, altering memory, programming at will – Machines can read your brain. There’s little that can stop them.

34 – Private cloud, on your own infrastructure that can bring the same flexibility as public cloud – Why is On-Demand OpenStack Important for SMBs?

35 – A mean to an end ! After all, target being compliance, security controls are what you need to achieve them – Compliance is Tough. Zero Trust Can Make It Easier

36 – Anything tight to cloud is privacy invasive – Google Play Sign-Ins Allow Covert Location-Tracking

37 – Technology enable crime, and it pays well ! Gift Card Gang Extracts Cash From 100k Inboxes Daily

38 – Disable the Bluetooth ! Wireless is weak ! New BrakTooth Flaws Leave Millions of Bluetooth-enabled Devices Vulnerable

39 – Don’t fall for these scams ! Everything is fake nowadays with deep fake technology – FBI: Spike in sextortion attacks cost victims $8 million this year

40 – Cleaning up domains that you stop using is critical, it’s even extremely critical with cloud threat – Over 60,000 parked domains were left up for hijacking leading to cloud takeover

41 – This one is not without reminding of NTFS streams abuses using indexed storage entries – This New Malware Family Using CLFS Log Files to Avoid Detection

42 – Blindly pulling from the infected cloud is not a good idea ! NPM package with 3 million weekly downloads had a severe vulnerability

43 – There is a growing trend, as cloud as proven to be a confidentiality failure, and a crazy expensive platform, far above anything was ever spent on prem, things are shifting – The Cloud Is Coming Back Home ( Fun fact, linkedin was totally bugged and I had to bring the newsletter content back to my blog at home !!! So, the trend is growing :P )

44 – Hopefully you patch and you have a good security posture ! Conti ransomware now hacking Exchange servers with ProxyShell exploits

45 – The babukers babuk themselves ! Babuk ransomware’s full source code leaked on hacker forum

And that’s it for this week ! I hope the content is still accessible, I apologize for the weird behavior, seems that linkedin is cloud after all, not working very well :s , anyway, have a great weekend !

Alexandre Blanc

Loading

vendredi, septembre 3rd, 2021 Technologie 2 Comments

Install Slack desktop app on Kali rolling fixing libappindicator3-1 missing dependency

If you try to install Slack desktop app on Kali linux latest rolling as of May 2021, you face a missing dependency of libappindicator3-1 which makes it complicated to get the app installed.

You can force the install with :

dpkg -i –force-depends slack-desktop-4.15.0-amd64.deb

But then when you run an apt update and apt upgrade, you have dependency issue with the same libappindicator.

Dirty workaround is go and edit /var/lib/dpkg/status and remove libappindicator3-1 from the package dependency, then you can apt update and apt upgrade without getting slack removed.

Finally so as you know, libappindicator3-1 have been replaced in kali by libayatana-appindicator ( https://github.com/jgraph/drawio-desktop/issues/504 )

I hope that it will help you.

Have a good day. I hope this helps.

Loading

mercredi, mai 5th, 2021 Technologie Un commentaire

How to delete all resources in azure to avoid charges after trial on your forced credit card registration

Warning, this article aims to show you how to delete everything, so make sure you have backups of your data and anything before deleting resources !!! In my case, this was after course, and I did not want anything to remain.
I assume that if you manage azure resources, you know what you want to delete. Be careful.

So you went for an azure training, and you have been asked to either have an active account or a trial account.
You created your account and were forced to provide your credit card despite the fact that you absolutely don’t plan to give a single buck to the cloud.

But the cloud nature is to take money, a lot of money, so the very first step, before you can do anything, it to take your credit card.

I recommend you use a temporary credit card like privacy.com or lastcard.com based, or even your if your bank provide temporary credit cards.

Anyways, here we are, for some reason you had to setup stuff in azure and you don’t want to take any chance, make sure you cleanup as much as can do. It took me a while to get this, and this was not 100% clear for the trainer as well (full cleanup process, platform change often).

So here is how you can cleanup everything.

For each tenant you want to get rid of (most likely all) you’ll have to do this (in Azure portal, you can switch tenant by going to the « Azure Active Directory » tab, and use the menu « switch tenant ».

While in the tenant you want to clean up, we’ll use the « Azure Resource Explorer » as key tool in this.

This takes you to the Azure Resource Explorer blade (yes, panels or tabs are called « blades »), in which all resources are listed under « Subscriptions ».
So you’ll expand the Subscriptions tree, for each and every subscription in which you want to delete assets.

You expand all the « ResourcesGroups », and you’ll go delete assets 1 by one under « Resources » for each « ResourcesGroup »

Select a resource, and above the JSON detailed configuration, you click on « Open blade »

It will take you to the resource blade, from where you can delete the resource

It will ask for confirmation, confirm :

And then from the navigation tree, go back to Resource Explorer.

Do this for each and every items up to the Resources Group itself :

Which you confirm by typing the name.

As the cloud is slow and inefficient, you’ll face a lot of refresh issues, and you’ll have to reload the web page many times to hope to have a clear picture on what is still there and what is not.

The notifications area will pop some partial notifications, but to actually have a detailed view of what is really happening, and what is the status (deleting resources in the cloud is painfully slow and inefficient), so under the « Notifications » button (little bell, top right of the screen), click on « More events in the activity log »

From there, you’ll have a better view of what happens, but by default, it doesn’t show much, you will have to expand each and every task to actually have an idea. As the top level task may show « Succeeded », but some sub task are not done at all.

When nothing is left in the « Resource Explorer », under every Subscriptions, you know you are done, and hopefully, the cloud won’t charge you.

Oups, don’t forget to cancel the subscription ! If it’s a trial, you can’t, you’ll have to wait for expiration, but if you don’t have any resources under it, you should be fine.

Another thing to check, is under « Licenses », search in the top search bar for « Licenses », make sure that NO LICENSE are still assigned. If they are, you’ll be charged !

EDIT : Another point to check are the services you might have subscribed that may not appear under resources, such as « Azure Security center », « Azure Sentinel », and « Azure DDoS protection ». Make sure you disable all of these too ! <— Don’t forget additional services ! They are costly !

EDIT2 : Another point, when it comes to deleting a tenant that was tight to a subscription : You need to have a user created on the domain of the tenant, with Global admin privileges. Then, you have to log in office365 (absolute nonsense) to cancel your subscription :

https://businessstore.microsoft.com/en-in/manage/inventory/subscriptions

From there, you can actually delete the subscription. Then, you have to go back in azure, logout, login (you’d better do this after each and every action, this platform is slow as hell and mostly never reflect any action you take).

Delete the admin user you had to create, and leave only your default user as global admin. Grand subscription management rights to your external/default user, so as you can proceed. BUT, even after doing so, while you should not be charged, you’ll have to wait for he « grace » recovery delay for the subscription to be completely de validated. Then maybe you may be able to delete the tenant. Pure nightmare.

Not easy at all to escape from the cloud, or at least, hoping that they won’t take money on your credit card. Because they will, if you forget anything, they won’t forget you !

Loading

lundi, octobre 19th, 2020 azure, cloud, clowd, Technologie Aucun commentaire
Not f'd — you won't find me on Facebook
décembre 2024
L M M J V S D
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
 

 
Suivez moi sur twitter - follow me on twitter
 
Follow on LinkedIn
[FSF Associate Member]
 
Free Software, Free Society
VIRTUALISATION :
Compacter une image virtualbox VDI
Bon petit tutoriel esxi
Marche d'appliances vmware
Installer ESXi sur un disque IDE
Installer ESXi 3.5 sur un disque USB
Installer proxmox avec DRBD et migration / réplication à chaud
Installer OSSEC avec VMware
Information sur le VDI
SECURITE - FIREWALL :
Ouvrir des ports dynamiquement iptables - knockd
Autre tres bon tuto knockd
Docs Arp poisoning - Anglais
Metasploit test de pénétration
Zone H - sites piratés en temps réel
Blog invisible things
Tips protection sécurité wordpress
Pfsense - distribution firewall opensource - adsl internet failover
Iproute 2 mini how to - linux advanced routing
ClearOS - la passerelle sécuritaire lan - wan
HAUTE DISPONIBILITE :
CDN - Accélération de la distribution de données
drbd iscsi ocfs2 dm multipath tutoriel
Load balancing LVS
Load balancing opensource list
HA-Proxy :
HAproxy - http load balancer
Simple tutoriel HAproxy
HAproxy - debian tutoriel
Centos - Ip failover
Configuratoin DM-Multipath Redhat
VMware Doubletake - continuité
Quelques liens sur la réplication MySQL : Manuel MySQL, chapitre sur la réplication
Manuel MySQL, Tutoriel clair sur la mise en place
Autre tuto sur la mise en place de la réplication MySQL
Références pour optimisation du serveur MySQL
Utilisation de EXPLAIN mysql pour optimiser vos bases
optimiser vos bases - requetes et index
STOCKAGE RESEAU :
Un outil de clonage disque en reseau
Internet NAS 250Go 250 accès VPN
Server ISCSI avec Ubuntu tuto
ISCSI centos redhat tutoriel
Gérer et étendre un LVM
Créer sa piratebox ! trop cool
Deaddrops, les clés USB dans les murs, aussi cool !
OPTIMISATION WORDPRESS :
Télécharger Xenu
Comment utiliser Xenu
optimisation hébergement wordpress
Super howto wordpress (En)
Test de charge serveur web - Load impact
VPN - ROUTEUR - LAN:
Zeroshell - le mini-routeur wifi tout en un
Retroshare, votre réseau d'échange crypté!
Openvpn sur centos redhat
Intégrer Linux dans active directory
Routage inter-vlan avec Linux
Routage avec OSPF
Network Weathermap
TENDANCES - WEB:
Boutons twitter
Analyser les tendances des recherches Google
Protocole sitemap - robots.txt
Creer des animations CSS3
Code php pour interagir avec twitter
E reputation
Jquery
TRUCS ET ASTUCES GNU/LINUX :
Tuxmachines.org - Actus et tips linux
Configurer GRUB2 et grub2 ici
Panoet - en anglais - tips & tricks
Readylines tips and trick pertinents
Squid Clamav - proxy antivirus
Apprendre Unix en 10 minutes
13 tips sur les expressions régulières
IE Sous linux IES
LDAP 2.4 Quickstart guide
Tutoriel LDAP
Installation annuaire LDAP
Serveur Mail Postfix - Dovecot - LDAP - MDS
Créer un linux personnalisé en ligne - custom linux
Super site sur linux - en
Capistrano - déploiement automatisé
MONITORING :
Nagios tutoriel et doc
Nagios plugin NRPE tuto
Nagios plugin NRPE autre tuto
Nagios plugin NRPE officiel
Zabbix - fonctionnalités
Zabbix - installation
Guide MRTGsys - grapher la charge locale
MRTGsys - ajouter des graphs
MRTGsys - interpréter les données
Shinken - Monitoring
Thruk Monitoring webinterface
Shinken - Tutoriel
Shinken - Référence chez Nicolargo
AUTRES LIENS :
RemixJobs IT jobs
USB Multiboot
Reset mot de passe windows
Java python et autres tips, intéressant !
Forum inforeseau
Open Clipart
Excellent comic en ligne
Inforeseau.fr