Security Leftovers
-
Misconfiguration leaves thousands of servers vulnerable to attack, researchers find
Simple mistakes and configuration errors is still a major cybersecurity issue, according to security firm Censys.
-
New Zero-Click Exploits Against iOS
CitizenLab has identified three zero-click exploits against iOS 15 and 16. These were used by NSO Group's Pegasus spyware in 2022, and deployed by Mexico against human rights defenders. These vulnerabilities have all been patched.
-
EFF on the UN Cybercrime Treaty
EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being negotiated in Vienna.
The draft treaty has the potential to rewrite criminal laws around the world, possibly adding over 30 criminal offenses and new expansive police powers for both domestic and international criminal investigations.
-
Ransomware group behind Oakland attack strengthens capabilities with new tools, researchers say
The group known as PLAY is using custom tools researchers say allow it to be faster and more efficient when carrying out ransomware attacks.
-
Taking a Bite Out of Password Expiry Helpdesk Calls, (Wed, Apr 19th)
By call volume, the top problem that most Helpdesks face is expired or forgotten passwords.
-
Russian Man Who Laundered Money for Ryuk Ransomware Gang Sentenced
Russian national Denis Dubnikov has been sentenced to time served after he pleaded guilty to charges related to laundering money for the Ryuk ransomware group.
-
Enterprises Exposed to Hacker Attacks Due to Failure to Wipe Discarded Routers
Discarded enterprise routers are often not wiped and contain secrets that could be highly useful to malicious hackers.
-
Google Patches Second Chrome Zero-Day Vulnerability of 2023
Google warns of another zero-day vulnerability in Chrome, only days after addressing a similar issue.
-
DC Health Link Data Breach Blamed on Human Error
The recent data breach of personal information for thousands of users of Washington D.C.’s health insurance exchange, including members of Congress, was caused by basic human error
-
Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Agencies [Ed: That malware needs to get there somewhere, and not owing to "Linux"]
The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used by Indian government agencies as a ruse to deliver a new Linux backdoor called Poseidon.
-
Deceptive Bytes' new Active Endpoint Deception solution for Linux is now available
Deceptive Bytes is thrilled to announce the release of the first Linux version of its Active Endpoint Deception solution with support for enterprise server distributions: Ubuntu, Debian, RHEL, and SLES.
-
Security updates for Thursday [LWN.net]
Security updates have been issued by Debian (golang-1.11), Fedora (chromium, golang-github-cenkalti-backoff, golang-github-cli-crypto, golang-github-cli-gh, golang-github-cli-oauth, golang-github-gabriel-vasile-mimetype, libpcap, lldpd, parcellite, tcpdump, thunderbird, and zchunk), Red Hat (java-11-openjdk, java-17-openjdk, and kernel), SUSE (chromium, dnsmasq, ImageMagick, nodejs16, openssl-1_0_0, openssl1, ovmf, and python-Flask), and Ubuntu (dnsmasq, libxml2, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-oem-5.17, linux-oem-6.0, linux-oem-6.1, and linux-snapdragon).