Security Leftovers and Windows TCO
-
Bruce Schneier ☛ Device Code Phishing
This isn’t new, but it’s increasingly popular:
The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized in the industry-wide OAuth standard. Authentication through device code flow is designed for logging printers, smart TVs, and similar devices into accounts. These devices typically don’t support browsers, making it difficult to sign in using more standard forms of authentication, such as entering user names, passwords, and two-factor mechanisms.
-
Security Week ☛ How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying
Mandiant warns that multiple Russian APTs are abusing a nifty Signal Messenger feature to surreptitiously spy on encrypted conversations.
-
Scoop News Group ☛ Russia-aligned threat groups dupe Ukrainian targets via Signal
Google researchers say multiple Russian state threat groups have conducted remote phishing operations to target and compromise Signal accounts.
-
Silicon Angle ☛ Google report warns of Russian threat groups targeting Signal Messenger
A new report released today by Surveillance Giant Google LLC’s Threat Intelligence Group warns that Russian state-backed threat actors are increasingly targeting Signal Messenger users in an effort to intercept sensitive communications.
-
Financial Express ☛ CERT-In flags security risk in Google Chrome on Windows, Macs, Linux
Google Chrome users, beware! Severe vulnerabilities have been discovered in the system that could cause you to lose all your data and even remotely run unwanted codes on your system. The Indian Computer Emergency Response Team (CERT-In) has issued a high-severity advisory warning users about multiple vulnerabilities discovered in Google Chrome across Windows, Mac and Linux platforms.
-
Windows TCO / Windows Bot Nets
-
Security Week ☛ Lee Enterprises Newspaper Disruptions Caused by Ransomware
Lee Enterprises has shared more details on the recent cyberattack, saying the attackers encrypted and stole files.
-