Security Leftovers
-
Reflections on certificates, Part 1
Guest Post: Understanding the complexity, trust relationships, and tradeoffs of certificates can lead to better decision-making and more efficient operations.
-
Microsoft April 2023 Patch Tuesday fixes 1 zero-day, 97 flaws [Ed: Too late as some of these have already been exploited and new bug doors may be added with the new update]
-
Irrigation Systems in Israel Disrupted by Hacker Attacks on ICS
Irrigation systems were disrupted recently in Israel in an attack that once again shows how easy it is to hack industrial control systems (ICS).
-
Microsoft Shares Resources for BlackLotus UEFI Bootkit Hunting [Ed: UEFI itself is the security hole and Microsoft created a scam in the false name of "security"]
Microsoft has shared details on how threat hunters can check their systems for BlackLotus UEFI bootkit infections.
-
New hacker advocacy group seeks to protect work of security researchers
"There are advocacy groups for reptile owners but not hackers, so that seems like a miss," said Ilona Cohen of HackerOne.
-
Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says [Ed: Clown computing is, in its own right, a security breach, but people are made to believe they can trust the owners of the clowns]
Weak passwords accounted for nearly half of the security incidents affecting Google Cloud customers.
-
CISA and partners issue secure-by-design principles for software manufacturers [Ed: That's rich coming from CISA, which works with NSA on back doors]