-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security and FUD Leftovers


Posted by Roy Schestowitz on Sep 12, 2022,

updated Sep 13, 2022


today's leftovers

Free Software Under Litigation Attacks



Ubuntu Linux and Azure DNS Problem Gives Azure Fits [Ed: No wonder Azure has layoffs and Microsoft is tight-lipped on performance]


↺ Ubuntu Linux and Azure DNS Problem Gives Azure Fits



NSA Wants Strong Kubernetes Authentication and Authorization [Ed: What sane person takes security advice from the NSA?]


↺ NSA Wants Strong Kubernetes Authentication and Authorization


> When I want to get into my phone, I use a passcode or face ID to authenticate. When I want to get into my home, I use a key because no person should be able to access my home without being authorized. So when the NSA released its Kubernetes Hardening Guidelines, it made sense that they consider authentication and authorization to be pivotal to a strong defense.



Shadow IT and shadow IoT: Protecting yourself against IoT malware


↺ Shadow IT and shadow IoT: Protecting yourself against IoT malware


> Can an IoT coffee maker leak company secrets? Where do you put the 'S' in 'IoT'? Join Alison Naylor, Senior Manager for Information Security at Red Hat, in this episode of Security Detail as she discusses the importance of securing IoT devices and how to proceed with caution.



New Linux Cryptomining Malware [Ed: It does not say how Linux systems actually get infected, so Bruce Schneier just helps Microsoft-serving attention-shifting FUD. He repeats what the editor of Slashdot pinned there. The Microsofters then repeat him.]


↺ New Linux Cryptomining Malware

↺ Microsofters

↺ repeat him



Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593) - Help Net Security


↺ Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593) - Help Net Security


> CVE-2022-27593 exists because of an externally controlled reference that resolves to a resource that is outside of the intended control sphere, and affects the widely used Photo Station application.


> The vulnerability allows attackers to modify system files and, ultimately, install and deploy ransomware.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 18:37:42 2024