-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Mar 09, 2023,

updated Mar 09, 2023


Programming Leftovers

Arch Linux vs Other Linux Distros: Which is Right for You?



‘Sys01 Stealer’ Malware Targeting Government Employees


↺ ‘Sys01 Stealer’ Malware Targeting Government Employees


> The Sys01 Stealer has been observed targeting the Facebook accounts of critical government infrastructure employees.



Increase in exploits against Joomla (CVE-2023-23752), (Wed, Mar 8th)


↺ Increase in exploits against Joomla (CVE-2023-23752), (Wed, Mar 8th)


> About three weeks ago, Joomla fixed a vulnerability in the Joomla content management system, patching a trivial to exploit access control vulnerability. The vulnerability allowed access to the Joomla username/password database.



Chrome 111 Patches 40 Vulnerabilities


↺ Chrome 111 Patches 40 Vulnerabilities


> Google has released Chrome 111 in the stable channel with patches for 40 vulnerabilities, including eight high-severity bugs



TSA Requires Aviation Sector to Enhance Cybersecurity Resilience


↺ TSA Requires Aviation Sector to Enhance Cybersecurity Resilience


> TSA instructs airport and aircraft operators to improve their cybersecurity resilience and prevent infrastructure disruption and degradation.



TSA issues aviation regulations for airlines, airports facing ‘persistent cybersecurity threat’


↺ TSA issues aviation regulations for airlines, airports facing ‘persistent cybersecurity threat’


> The agency's new cybersecurity rules issued on Tuesday followed the Biden administration's national cybersecurity strategy.



Israel blames prolific Iranian-linked hacking group for February university hack [Ed: They should blame Microsoft Windows all over the place, not those who allegedly exploit that.]


↺ Israel blames prolific Iranian-linked hacking group for February university hack


> MuddyWater has been attacking targets around the world for years, according to the U.S. and other western governments.



US intel: Chinese influence operations are growing more aggressive, more similar to Russia’s


↺ US intel: Chinese influence operations are growing more aggressive, more similar to Russia’s


> China is stepping up efforts to influence U.S. public opinion, which increasingly resemble Russian operations.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 18:07:40 2024