Riding cloud can be tricky, don’t fall from it, in the weekly cyber !
Somehow short week for me, but quite intense, ended escaping in the hoods off grid, and that’s pretty good !
Meanwhile, earlier, this week has been quite intense, and despite my good will, humanity always find way to show how bad and nasty it can be, and as bad as I want to expose stupidity, it will not help, because it seems some are so bad, that there is no cure. For these, R.I.P means Rot In Peace :D
BUT FOR YOU, 48K+ followers, 24K+ subscribers to this newsletter, I send you all my love, and the peace I found in nature, here, north from Quebec in the « Parc des Grands Jardins », where you wake after a cold night in beautifully frozen nature, that quickly transform as the sun rises !
Back to our topic, this week in 46 points, this happened :
1 – Scammers strategy reviewed, as they use porn scam to get your attention – Porn Spam, Malware and Questionable References to Teens
2 – I told you, they just went on vacation ! And now they are fully back ! REvil ransomware is back in full attack mode and leaking data
3 – Some said it’s great, I believe, in the case of this Facebook based service, a backup encrypted with a password stored in the cloud, is not something safe, how long will this backup hold against dictionary attack based on all the passwords ever leaked on internet ? 10 seconds ? WhatsApp to Finally Let Users Encrypt Their Chat Backups in the Cloud , good idea, but I’m afraid it’s a false sense of privacy.
4 – The cloud strikes again ! (I know you come from my cloud rants :P ) – MyRepublic Data Breach Raises Data-Protection Questions
5 – This article bring facts you must be aware of so as you avoid the pitfalls – cloud-based issues comprise 79% of observed exposures compared with 21% for on-premises assets ( I see you cloud lover, bla bla, this sentence is out of context, bla bla… ok, read the linked article on the post, and you’ll have all the context :) )
6 – Wireless is weak, bluetooth hacked again – BrakTooth Vulnerabilities Riddle Bluetooth Devices From Numerous Vendors
7 – Zero day exploit out and shared. No patch, no fix. Windows MSHTML zero-day exploits shared on hacking forums (more in the comments of the post as usual)
8 – How much do you know who’s really behind the keyboard ? Real-Time Identity Protection at Last: Closing a Critical Gap in our Security Stacks
9 – Once again, don’t fall for the scam – FTC warns of extortionists targeting LGBTQ+ community on dating apps
10 – Everything is fake in technology, and it’s very challenging to know what is a good investment and what is not (like if it took human model ! ). Fake Walmart press release hoax causes Litecoin to spike 34%
11 – You are hacked and you don’t know it yet – Linux Implementation of Cobalt Strike Beacon Targeting Organizations Worldwide
12 – Hopefully you’ll update your build quickly, but won’t drop security scans to avoid supply chain attacks – Critical Bug Reported in NPM Package With Millions of Downloads Weekly
13 – Do you have an incident response plan ? ( hint : you must have one) – BlackMatter ransomware hits medical technology giant Olympus
14 – A not so sandboxed browser tab (deception again I know) – New SpookJS Attack Bypasses Google Chrome’s Site Isolation Protection
15 – On a related topic, the not so #privacy focused browser needs patching – Google patches 10th Chrome zero-day exploited in the wild this year (Security and privacy are two very different things ! )
16 – Windows 11, lol – Firefox now bypasses Windows 11’s messy default browser settings (yet they are about to sign a deal with Microsoft to make Bing the default search engine….. that makes you wonder)
17 – Apple patch time ! There is a worm in the apple – Apple products vulnerable to FORCEDENTRY zero-day attack – patch now (if you haven’t patched at this time, shame on you ! )
18 – HP Omen patch time (HP Gaming PC line) – HP OMEN Gaming Hub flaw hits millions of gaming devices
19 – Always watch where you download from, as once again threat actor use ads to be placed on top of search results – New Stealthier ZLoader Variant Spreading Via Fake TeamViewer Download Ads . That said, using pihole instance as your DNS server should wipe all ads from your web browser, and drop the risk :P
20 – The evolution of ransomware, from early days to industrial infrastructure take over – Ransomware, a timeline of destruction Part II
21 – We often say the perimeter is gone, but it doesn’t mean your attack surface is gone, it’s actually expended and on steroid if you use the cloud – Principles Of External Attack Surface Protection: Discover Everything
22 – Top of the risks being the dangerous cloud and an ever growing uncontrolled attack surface. No wonder why data continuously leak – Most Fortune 500 companies’ external IT infrastructure considered at risk
23 – A very accurate view, explaining why it takes an incident for organization to handle their security posture properly – Ransomware preparedness is low despite executives’ concerns
24 – Don’t forget to register for the coming event on Sept 24th, great panels covering the ransomware challenges, and what we can do about it – I’m lucky to participate in 2 panels, with amazing co-panelists, and this will be quite fun and interesting – Was so sick during the preparation of this one, you have no idea :P
25 – This article in PDF format will cover some key points of supply chain security, and what to look after – How safe is your technology supply chain
26 – Oldie and still goodie – How to Install Fail2ban on Rocky Linux and AlmaLinux
27 – Cloud is poisoning your VMs. Want it or not. Issue with the cloud, you control nothing (Yeah admit it, you missed these ones :P ) – Microsoft Azure Users with Linux VMs Exposed to Security Vulnerabiltiy Called OMIGOD—How to Fix
28 – You’d better be sure that the channel you pick as replacement for the password is as safe as the password ! Sensitive topic to me, I don’t think passwordless is a fix, password is supposed to be a secret, if no longer a secret, then there is no confidentiality, see what I mean ? If you need third party to support the validation of you, this is becoming to be complex – Microsoft rolls out passwordless login for all Microsoft accounts (lots of comments on this post, some pros, some cons).
29 – Packets Can Cause Bullets – Why cyber wars becomes war
30 – Great news for previous Revil victims ! (assuming you kept a copy or image of your encrypted drives) – Free REvil ransomware master decrypter released for past victims
31 – Hopefully by now, all your NETGEAR manageable switched are patched ! Third Critical Bug Affects Netgear Smart Switches — Details and PoC Released
32 – The whole internet relies on pretty weak bases, one being domains – Anonymous Hacker claims to have stolen Data from Epik
33 – A vulnerability is a risk only if there is a way to exploit it – No Patch for High-Severity Bug in Legacy IBM System X Servers – Micro network segmentation ant ZTNA for the rescue !
34 – Everyday we help customers effectively protecting their infrastructure. Have started to take care of your security ? (selft push for the work side at VARS :D ) – Ransomware encrypts South Africa’s entire Dept of Justice network
35 – Don’t let your router serve evil ! MikroTik shares info on securing routers hit by massive Mēris botnet
36 – Don’t wait to reach that point ! Prevention ! Ransomware gang threatens to wipe decryption key if negotiator hired
37 – Smart is dumb, not the first time I say it, if it contains the word « smart » in its name, you are not the smart part of it ! Smart Home Hack Breaks Down Walls Figuratively And Literally
38 – Nice article, points and puns, showing that there is still a threat for low hanging fruits – Airline Credential-Theft Takes Off in Widening Campaign
39 – Running windows on Linux is way less dangerous than the opposite :) the underlaying systems should be the reliable one :) New malware uses Windows Subsystem for Linux for stealthy attacks
40 – I have to admit, it has been couple of weeks since the last joke like this – New Windows security updates break network printing
41 – How much would it take to bribe your low paid employees for their access ? AT&T lost $200M in seven years to illegal phone unlocking scheme
42 – As usual, keep your systems patched, and apply one of the oldest security principle, least privileges. Nowadays in an hyper connected and infected cyber world, it would not be very wise, to say the least, to let any user with full power on a systems, or even not patching properly – Capoae Malware Attacking Linux systems & Web Apps Using Multiple Vulnerabilities
43 – While you should have active patch management, these should not be missed ! Researchers compile list of vulnerabilities abused by ransomware gangs
44 – The more we place services online, the more we grow our attack surface – Cyberattack hits German Election body
45 – This might actually be effective – U.S. to sanction crypto exchanges, wallets used by ransomware
46 – An interesting reading to start the week – Security Implications of a weakened supply chain
Wishing you a great week all, as you can see this newsletter went out late sunday night :D Hopefully it will bring some useful points to you ! Good night (Or good day if you read this in the morning :) )
The threat landscape is very dynamic – Cyber news this week
This week again has been quite loaded, and the technology environment, which define the attack surface, is only growing. It takes a vulnerability, a threat attached to it, and we have a risk.
To know the likelihood of any threat to be targeting our organization, we go through a threat modelling exercise. Sometimes it’s formal, documented and referred in the risk register, sometimes it’s a guesstimate, a rough high level assessment. Overall, better than not considering the risk at all.
This week in 49 points, hosted on my blog, because I know I won’t have limitations etc, and for each of these, there is something to learn, a security control you may have forgotten :
1 – The financial system is fully backed by technology, and therefore, fully vulnerable – World Economic Forum (WEF) Warns of Cyberattack Leading to Systemic Collapse of the Global Financial System – Do you have some cash handy ? You are your own risk manager, what happen if you can’t use your payment card for a week ? Do you have enough food ? Gas ? Just a week, think about it.
2 – Building and learning takes time, but if you don’t, you are not the real owner – This Best-Selling TP-Link Router Ships With An Alarming Security Surprise – Do you know what runs on your network ? and what or who is watching your online activities ? (aside of the ISP who gladly sell all your activity, including your favourite recipes on youcorn, they know if you like crunchy corn, or white corn, old corn or even big or slim corn ! yes a VPN might come handy, but think twice who should know how you like to eat your corn ! )
3 – I’m proud having received the Cyber Sentinel Award 2021 in India for my work in #cybersecurity, and that’s a huge news :P – Cyber Sentinel Award 2021 – In the post you’ll find link to the panel I had a chance to participate as well, you’ll see that trends in India are very aligned with trends in US and Canada !
4 – I told you to drill that weak NFC circuit on your payment card ! Paypass is unsafe – New Vulnerability Allow Hackers to Bypass PIN Codes on Contactless Cards From Mastercard & Maestro – Wireless is weak, you know the song
5 – Let’s clear something, when authorities come with a warrant, organizations must comply – Important clarifications regarding arrest of climate activist – unlike the cloud, they did not betray confidentiality, as they are not technically supposed to be able to access your encrypted mailbox, they could just tell which IP use this mailbox. VPN maybe ? again, know which VPN you use, deciding to give all your traffic to a VPN provider is something you should look twice.
6 – Transnational criminal organization are efficient businesses – “FudCo” Spam Empire Tied to Pakistani Software Firm – Enjoy the reading, understand how it works, and be sure there are thousands like these.
7 – bypassing MFA and password reset, more on the SAML golden ticket attack, an attack close to pass the hash – Golden SAML Attack – APT Hackers Hijacking & Gaining Access To The Active Directory Server – Attacker don’t even need your credentials to be logged as you, be aware, MFA + attribute based authentication with continuous diagnosis and mitigation, yes I speak about better than ZeroTrust, I speak about CGM !
8 – Do you really know who you are working for, and what’s the purpose of your work ? TrickBot gang developer arrested when trying to leave Korea – In the not so recent past, I worked for an organization which turned to be terrorists, and this is one of the way I learned how privacy matters, how it’s heavily tight to freedom. So, always check who you work for, and make sure you are sure this is what it is. It doesn’t only happen to others. Due diligence is a good practice for your daily life too.
9 – WordPress plugin patch time ! Gutenberg Template Library Plugin Bugs Affected 1+ Million WordPress Sites – Oh myyyy penguiiiiiinnnn ! I’m currently typing on WordPress ! Oh no ! I’m doomed, nooooooo !…. oh wait, I just clicked on « update » and in 10 sec my blog was updated…. and actually there is a worst one that this one, so you full WordPress deserves an update if you did not apply it today.
10 – Netgear patch time ! Netgear fixes severe security bugs in over a dozen smart switches – Yes, patching is a non stop job, you should have someone coordinating this in your organization, because patching a switch, will turn the network off for a few seconds, even minutes. Coordination is key !
11 – IoT, or the internet of threats, is only growing (it’s supposed to mean the Internet of Things, but it’s not accurate) – IoT Attacks Skyrocket, Doubling in 6 Months – And this is only growing, the more you connect, the more you grow your attack surface, and the need for security controls, network segmentation and more, I know, at home it’s not easy !
12 – Speaking about IoT, Don’t connect all this crap ! Vulnerabilities In Victure Baby Monitor Allow Access To Camera Feeds – Really need to watch your baby with Russia and China doing so with you ? Because they will, do you know this site « Insecam » ? Enjoy.
13 – What do you do when all your stuff is in the cloud and Internet is taken down by DDoS ? New Zealand suffers a widespread Internet outage – You can look at stuff like Cloudflare solutions, issue is, you must give away all your traffic to the platform, and while they claim they never tap any connection, this is still a risk to consider. Sometimes it’s also a matter of national security, you would not want to give all your national internet traffic to another country either. Not simple.
14 – CASB LOL ! Criminal access service brokers to the cloud – Enterprising criminals are selling direct access to cloud accounts – Did you setup geo fencing in your cloud configuration ? On your firewall it’s easy, you just allow only national IPs as per need, in the cloud you’ll pay per rule or so.
15 – Micro segmentation is the very first step to protect your workload and bring governance, including the coverage of legacy systems – Micro-segmentation From Strategy to Execution
16 – A virus in the facebook application that steal your mobile data on Android – Discovered a virus in facebook app that steal data from user – You may consider using « slimsocial » on Android instead of the facebook apps, safer, better for privacy, it works well, and the key is that the app doesn’t send your private data to FB.
17 – I hope you use a password manager and multi factor everywhere – McDonald’s leaks password for Monopoly VIP database to winners – Whenever you give away your data, you must assume it will be compromised, as much as doable, provide fake data.
18 – Your private satellite network ? Review: Hands on with the Swarm Satellite Network Eval Kit
19 – Issue when you have tons of interconnected systems is that decommissioning can be a mess when not properly documented – Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server
20 – If ransomware gets in, you are done. Criminals will promise everything, but they are criminals, they will leak anyways – Ransomware gang threatens to leak data if victim contacts FBI, police – You should have proper security posture so as you never get to this point. At least, start with endpoint protection, such as Cynet XDR (yet we do provide managed offer for this product at work, customers are very happy with it, and the key point is, it works ! )
21 – There is porn, and Netflix and prime video and P2P, so most of internet is leisure and crime – 39% of all internet traffic is from bad bots – Quick hint, you are connected on this very same internet and your traffic is counted in this stat, oh oh….I know, we only watch youcorn ;)
22 – Scraping VS leaks ? Would you know the difference ? Dark Web Scraping
23 – Servers back online, seems they went dark for a while but came back – REvil ransomware’s servers mysteriously come back online – I bet the reason is summer vacations ! What is your take ? They made so much that they took a break ! :P
24 – Manual patch for O365 or get hacked – The cloud is funny – Microsoft shares temp fix for ongoing Office 365 zero-day attacks
25 – A Dash of cyber – In this episode Rod lewis, Brad Rhodes, Alexandre Blanc and Ron Craig will be talking about IoT, Great live we did, don’t miss the replay !
26 – The less apps you use, the less exposed you are. Reduce your attack surface ! Experts Uncover Mobile Spyware Attacks Targeting Kurdish Ethnic Group
27 – Popcorn time ahead, storm and pouring, data flooding as well ! Cloud computing market to reach $1,251.09 billion by 2028 – if we’d stop all cloud spending, we could pay the whole world debt immediately…. I’ll let you think about this.
28 – Backend of most cloud, HAProxy needs patching ! HAProxy Found Vulnerable to Critical HTTP Request Smuggling Attack – You should patch if you use it.
29 – Are you the next in line ? Have you prepared your organization by deploying proper security controls and limit incidents impacts ? Howard University shuts down network after ransomware attack
30 – When you need to provide remote access, but you need to restrict access to a limited amount of resources, and need efficient audit trails, Cyolo comes to mind – How to Provide Remote Users with Access to Restricted Services
31 – Zoho patch time ! Zoho patches actively exploited critical ADSelfService Plus bug – Pretty bad exploit given the nature of the product !
32 – Patching your Fortinet is critical, changing all passwords and enforcing MFA is even more needed ! Criminal Hackers leak passwords for 500,000 Fortinet VPN accounts
33 – Faking vaccine, a kamikaze approach – Spoofing Bug Highlights Cybersecurity for Digital Vaccine Passports
34 – Cloud oriented dev is quite different than traditional open source like CPAN etc – The Dark Side Of Package Repositories: Ownership Drama And Malware – an excellent reading.
35 – You think you can trust teams and that your boss trusts you ? LOL, don’t forget this is cloud based, so pure nastiness ! What Your Boss Can TRACK About YOU with Microsoft Teams
36 – Very happy to have had the opportunity to share during an interview, among amazing world wide known knowledgeable specialists – 2021 MIDDLE TN CYBER CONFERENCE », organized by The Tennessee Department of Safety & Homeland Security and TCAT Shelbyville
37 – They went after the Russians…. There might be some retaliation coming here – New Mēris botnet breaks DDoS record with 21.8 million RPS attack
38 – We spoke about IoT and IIoT security issue during our Dash of cyber live, and here is a very relevant article on the topic – Fighting the Rogue Toaster Army: Why Secure Coding in Embedded Systems is Our Defensive Edge
39 – NPM patch time again ! GitHub finds 7 code execution vulnerabilities in ‘tar’ and npm CLI
40 – Multi factor authentication renders this useless – Ukrainian extradited for selling 2,000 stolen logins per week
41 – You’ll see the take of the article, BUT, I say it depends on the vertical and your compliance requirements ! 3 IT Restrictions that are hurting your business
42 – Public cloud continuous key problem : can’t isolate data between customers – ‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise
43 – CRAZY LOL ! Microsoft, the provider of cloud and teams and online collaboration tools (SharePoint and all) just publicly admits that their cloud doesn’t allow remote worker to do their job ! Study of Microsoft employees shows how remote work puts productivity and innovation at risk
44 – A world of deception, we can do better than this – Rep. Adam Schiff rips Amazon and Facebook for ‘directly profiting’ on COVID-19 misinformation
45 – Fixed but not really, history tends to repeat itself – Windows MSHTML zero-day defenses bypassed as new info emerges – Yes again and again !
46 – Things are moving ! Great !…. well somehow moving …. Rep. Jayapal: Biden administration supports Amazon-busting ‘Ending Platform Monopolies Act’
47 – It is very simple, no 2FA (second factor authentication) is a wide open door – Stolen Credentials Led to Data Theft at United Nations
48 – Threat actors are innovating continuously – SOVA: New Android Banking Trojan Emerges With Growing Capabilities – The less apps you install, the less risk you take !
49 – When you realise that OWASP Top 10 is the EXACT definition of the cloud state !!!! OWASP Top 10 2021 Published – Broken Access Control Jumps to the Top Spot
Some coming event in which I’ll be speaking (I know, bla bla bla bla :D ) :
- Will be speaking at the upcoming RED Summit on 9/24. Ransomware and Extortion Defense for Industry and Government
- Will be speaking at InfoGov World Expo & Conference 2021
Enjoy and have a good weekend all ! Thank you for reading !
Cybersecurity is not obvious even for this newsletter !
Cyber security focus is to achieve CIA, Confidentiality, Integrity, Availability. Well, seems that my edition of last week suffered from availability issues where no one got notification of it. Sad because it was quite interesting, you can still find it by checking previous version of this newsletter.
Let’s hope, this week, you’ll get notified of the publication ! :D Actually, had to move my newsletter content to my blog, as linkedin blocked edition after the 18th link, as weird as it sound, can’t post on linkedin as I did before.
First, I wanted to share that I had a great time during Enterprise IT World Security Symposium and awards 2021, in India. Was a great virtual event, where I spoke for the first time on a panel in this event, and got awarded for the second time :)
Back to this week in 45 points :
1 – Ransomwares are like the cloud, and vice versa, sadly here to stay : Three Things That Amplify the Threat of Ransomware and How To Combat Them
2 – Keep an eye on coming QNAP patches – QNAP works on patches for OpenSSL bugs impacting its NAS devices
3 – Is your exchange fully patched and up to date ? Microsoft Exchange ProxyToken bug can let hackers steal user email
4 – Ransomware impact can be avoided or at least mitigated with proper security posture – LockBit Gang to Publish 103GB of Bangkok Air Customer Data
5 – Patching everything, from connected toilets to garage door – Critical Vulnerability In Annke Network Video Recorder Could Allow RCE Attacks
6 – Privacy is much critical factor than what big tech may think – Zoom Stock Wipes Out More Than $15 Billion In Market Value After Earnings Reveal Pandemic Growth Is Waning
7 – Weekend and vacations are bad times for security, yet we need them :P FBI, CISA: Ransomware attack risk increases on holidays, weekends
8 – Dynamic Pricing and Discounts plugin from Envato #wordpress patch time – WooCommerce Pricing Plugin Allows Malicious Code-Injection
9 – Is your GPU computing for criminals ? Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs
10 – Will you stop connecting everything and anything and growing your attack surface ?! Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms
11 – Cloud employees spying program got caught and shamed the cloud for its usual abuses – Microsoft 365 Usage Analytics now anonymizes user info by default
12 – I’m speaking ( again ! ) at RED Summit 2021: Ransomware and Extortion Defense For Industry & Government. Would you like to attend? (I don’t appear yet on the website, but it will come), we also did an intro video with the amazing Debbie Reynolds !
13 – Can We Digitally Disappear: Our Lives Exposed O… by The Bureau with Frank Figliuzzi – Don’t miss a great interview of an amazing FBI agent that support privacy !
14 – The future of technology is decentralized, unlike the cloud – Decentralized cloud computing platform preserves internet privacy
15 – Where do you stand with your security posture ? [Cocktail Book] Raise Your Drinks & Your OT / IoT Security Posture
16 – Cloud is so safe that NSA won’t use it at all and spend $2B for their own on prem cloud – NSA Cloud Capabilities See Boost Under New Billion-Dollar Contract with HPE
17 – There is an obvious pattern seeing the raise of attacks on crypto exchange places – Bilaxy Crypto Exchange Went Offline After Cyber Attack
18 – Botnets are trendy again ! (they never ceased to be anyway in the criminal activities) – Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns
19 – This is why your processes must be put in a formal way, be documented and maintained, so as upon termination, employees accesses will be properly removed – Fired NY credit union employee nukes 21GB of data in revenge
20 – Watch for linphone and underlaying stack updates – Linphone SIP Stack Bug Could Let Attackers Remotely Crash Client Devices
21 – Criminals too, face skills shortage ! BEC Scammers Seek Native English Speakers on Underground
22 – You control nothing, time to move to Linux and recover lost #privacy – Microsoft kicks unsupported PCs out of Windows 11 preview program
23 – Happy to share this article about the advantages of performing an IT Security audit for your organization, my first article at work ! yeah ! Why perform an IT security audit? (I linked to my linkedin post about it for now so you can interact, in the end I might just go straight to target)
24 – A good PDF reference document about the ZeroTrust architecture – The CISO’s guide to Extending Zero Trust to the Endpoint
25 – A workaround that will also kill the plug and play capability, convenience or security ? How to block Windows Plug-and-Play auto-installing insecure apps
26 – Now that Zuckerman is out, remains Zuckerberg to kick out ;) for the same privacy invasion issues :p – FTC bans stalkerware maker Spyfone from surveillance business
27 – it’s CISCO patch time ! Cisco fixes critical authentication bypass bug with public exploit
28 – Not without reminding the poor security of the COVID related apps, seems that we never ever learn – Digital State IDs Start Rollouts Despite Privacy Concerns
29 – wareztheremotes ! Comcast RF Attack Leveraged Remotes for Surveillance
30 – How long will it take for you to realize you are hacked ? Autodesk reveals it was targeted by Russian SolarWinds hackers
31 – Simple : anything you put on technology will betray you – WhatsApp Photo Filter Bug Could Have Exposed Your Data to Remote Attackers
32 – When you put your assets in the cloud, you know they’ll be stolen – Cream Finance hacked; $29 million Crypto asset stolen
33 – Be aware, in a not so far future, we’ll turn humans into bots, altering memory, programming at will – Machines can read your brain. There’s little that can stop them.
34 – Private cloud, on your own infrastructure that can bring the same flexibility as public cloud – Why is On-Demand OpenStack Important for SMBs?
35 – A mean to an end ! After all, target being compliance, security controls are what you need to achieve them – Compliance is Tough. Zero Trust Can Make It Easier
36 – Anything tight to cloud is privacy invasive – Google Play Sign-Ins Allow Covert Location-Tracking
37 – Technology enable crime, and it pays well ! Gift Card Gang Extracts Cash From 100k Inboxes Daily
38 – Disable the Bluetooth ! Wireless is weak ! New BrakTooth Flaws Leave Millions of Bluetooth-enabled Devices Vulnerable
39 – Don’t fall for these scams ! Everything is fake nowadays with deep fake technology – FBI: Spike in sextortion attacks cost victims $8 million this year
40 – Cleaning up domains that you stop using is critical, it’s even extremely critical with cloud threat – Over 60,000 parked domains were left up for hijacking leading to cloud takeover
41 – This one is not without reminding of NTFS streams abuses using indexed storage entries – This New Malware Family Using CLFS Log Files to Avoid Detection
42 – Blindly pulling from the infected cloud is not a good idea ! NPM package with 3 million weekly downloads had a severe vulnerability
43 – There is a growing trend, as cloud as proven to be a confidentiality failure, and a crazy expensive platform, far above anything was ever spent on prem, things are shifting – The Cloud Is Coming Back Home ( Fun fact, linkedin was totally bugged and I had to bring the newsletter content back to my blog at home !!! So, the trend is growing :P )
44 – Hopefully you patch and you have a good security posture ! Conti ransomware now hacking Exchange servers with ProxyShell exploits
45 – The babukers babuk themselves ! Babuk ransomware’s full source code leaked on hacker forum
And that’s it for this week ! I hope the content is still accessible, I apologize for the weird behavior, seems that linkedin is cloud after all, not working very well :s , anyway, have a great weekend !
Links
Calendrier
L | M | M | J | V | S | D |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 | 31 |
Recherche
Derniers articles
Tresronours Twitter
Keywords cloud topic
Membre de la FSF
Liens qui vont bien
Mots clés vrac – keyword cloud
License du contenu – CC By NC SA
Archives
- Resumed posting and expanding on X
- Linkedin Access to your account has been restricted – Final debrief and resilience plan
- I’m thankful for the support I get in rough time
- Cyber security news of the day – 2024 May 31
- Alexandre Blanc Cyber Kicked out from Linkedin
- You’ll most likely find me on LinkedIn
- The Russian roulette landing page !
- RTSP, Debian, VLC, not playing, IP Camera
- 5G network hosted in the cloud, no internet, no phone ! So smart ! And I ended on TV, This week in cyber
- They lock the door for privacy… but they keep a copy of the key, and couple of backdoors
- Worst is yet to come, but they all warned you
- Migrating an old WordPress and handling character set, UTF8, latin1, latin1_swedish_ci
- From a broken TLS CA, to Facebook, to FIN12 hit and run
- Yes we can fix this mess, but do we want to ? That’s another story
- Criminals are still dominating the game, why are we doing so wrong, and what can we learn in this tech ocean ?
- Riding cloud can be tricky, don’t fall from it, in the weekly cyber !
- The threat landscape is very dynamic – Cyber news this week
- Cybersecurity is not obvious even for this newsletter !
- Install Slack desktop app on Kali rolling fixing libappindicator3-1 missing dependency
- How to delete all resources in azure to avoid charges after trial on your forced credit card registration
- Proxmox – ZFS – Dead drive on active VM, recover from replicated disk
- Restrict access to proxmox web admin interface
- Migrate your ESXI VMs to proxmox ZFS
- Install your VPN server with pi-hole on OVH VPS in 30 min
- Using raspberry pi 3 as wifi bridge and repeater and firewall
- Raspberry 3 – create a wifi repeater with USB wifi dongle
- raspberry 3 – routeur pare feu point d’acces wifi avec filtrage pub et tracking – router firewall access point with ads and tracking filtering
- Dell XPS 13 touchpad – corriger la sensibilité
- Utiliser Zazeen set top box depuis une connexion videotron
- Fermeture de mon compte facebook – la dernière goutte
- Choisir un kernel par defaut au demarrage de Centos 7.2 – configuration grub2
- Openvpn access server 2.0.25 et android
- Régler la luminosité du laptop par ligne de commande
- chromium outlook web app version complete sous linux
- Nexus 7 2012 – android 5 lollipop solution au probleme de lenteur
- HDD led sur Xubuntu – xfce
- xubuntu 14.04 verrouiller ecran de veille et desactiver mise en veille a la fermeture de l’ecran
- Authentification avec Radmin en utilisant Wine sur Gentoo
- Patcher bash sur une distribution plus supportee comme fedora 11
- Zimbra desktop sous xubuntu 14.04 64bit – fix
- xubuntu 12.10 probleme de son avec VLC – pulse audio – alsa – toshiba L855D – solution
- Evolution sous xubuntu 12.10 – bug affichage a la configuration – solution temporaire
- Booster son acces internet en changeant de DNS pour opendns
- Serveur DLNA sous ubuntu – minidlna
- sshfs sous windows – dokan sshfs
- xubuntu 11.10 Installer le plugin java pour firefox
- Installer Google Earth sur Xubuntu 11.10
- Installer nagios sur Fedora 11 depuis les sources
- Configurer varnish-cache avec des virtualhosts, apache, fedora, redhat, centos
- Installer Varnish depuis les sources sur Fedora 11