Security Leftovers
-
Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems [Ed: Hosted and served by Microsoft]
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.
-
Microsoft says Azure breach 'probably' due to account being cracked
Nearly three months after its Azure cloud was breached, Microsoft says the "probable" cause was the cracking of a staff engineer's corporate account.
-
The NitroPC Pro is Qubes-certified!
It is our pleasure to announce that the NitroPC Pro is officially certified for Qubes OS Release 4!
-
Android Zero-Day Patched With September 2023 Security Updates
Android’s September 2023 security update resolves a high-severity elevation of privilege vulnerability exploited in malicious attacks.
-
Enterprise security challenges for CNI organizations: Security challenges with people and processes
This is the second in a series of three blog posts focusing on Critical National Infrastructure (CNI) cybersecurity. This blog looks at the problem space through the lens of "People and Processes."
As mentioned in the previous blog post, CNI cybersecurity is not just a technical problem—technology and tools can be enablers to help reduce risk, but you should also identify the "people and processes" required to put good security practices in place.