Security Leftovers
-
University of Michigan ☛ UMich introduces Duo Universal Prompt [Ed: Fake security gimmicks after University of Michigan was down for most of a week (entirely) because of Microsoft, then covered up what had happened]
Users logging into any University of Michigan website Tuesday were greeted with a revamped pop-up screen for two-factor authentication as the University transitioned to the Duo Universal Prompt, a move mandated by Cisco Security.
-
OpenSSF (Linux Foundation) ☛ OpenSSF Week at a Glance – Feb 20
Announcing the First Ever SOSS Fusion Conference: How You Can Get Involved We are thrilled to announce the first ever Secure Open Source Software (SOSS) Fusion Conference 2024, a two-day conference...
-
Silicon Angle ☛ New report warns of ongoing rise of malicious emails bypassing secure email gateways
A new report released by phishing detection and response solutions company Cofense Inc. today finds a significant increase in malicious emails bypassing secure email gateways in 2023, serving as a wakeup call to the increasing abilities of malicious actors.
-
OpenSSF (Linux Foundation) ☛ OpenSSF Responds to US CISA RFI on Cybersecurity Risk and Secure by Design Software
OpenSSF has submitted a response to the Request For Information (RFI) on Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software issued by the US Cybersecurity and Infrastructure Security Agency (CISA).
-
Security Week ☛ China’s Volt Typhoon Hackers Are Exfiltrating Sensitive OT Data
Volt Typhoon and two other threat groups that emerged in 2023 can pose a serious threat to ICS/OT, according to industrial cybersecurity firm Dragos.
-
Security Week ☛ ConnectWise Rushes to Patch Critical Vulns in Remote Access Tool
ConnectWise ships patches for extremely critical security defects in its ScreenConnect remote desktop access product and urges emergency patching.
-
SANS ☛ Python InfoStealer With Dynamic Sandbox Detection, (Tue, Feb 20th)
Infostealers written in Python are not new. They also onboard a lot of sandbox detection mechanisms to prevent being executed (and probably detected) by automatic analysis. Last week, I found one that uses the same approach but in a different way. Usually, the scripts have a list of "bad stuff" to check like MAC addresses, usernames, processes, etc. These are common ways to detect simple sandboxes that are not well-hardened.
-
Scoop News Group ☛ Report: Manufacturing bears the brunt of industrial ransomware [Ed: Windows TCO. They fail to take note of the role of Windows.]
The ransomware variant LockBit is responsible for 25% of ransomware incidents affecting industrial systems tracked by cybersecurity firm Dragos.
-
Security Week ☛ Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation [Ed: Windows TCO]
The LockBit ransomware operation has been severely disrupted by an international law enforcement operation resulting in server seizures and arrests.
-
Pen Test Partners ☛ Cyber security for Credit Unions 101
American consumers have two clear yet vastly differing choices when it comes to banking. Many opt for a large-sized national or regional bank.