-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Mar 31, 2023,

updated Mar 31, 2023


today's howtos

Linux Lite 6.4 Officially Released, Based on Ubuntu 22.04.2 LTS



Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data


↺ Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data


> An Azure Active Directory (AAD) misconfiguration leading to Bing.com compromise earned Wiz researchers a $40,000 bug bounty reward.



Microsoft Defender mistakenly tagging URLs as malicious [Ed: No wonder Microsoft is finally layoff off its "security" divisions (deep cuts). Worthless snake oil.]


↺ Microsoft Defender mistakenly tagging URLs as malicious


> Microsoft Defender is mistakenly flagging legitimate links as malicious, and some customers have already received dozens of alert emails since the issues began over five hours ago.


> As the company confirmed earlier today on Twitter, its engineers are investigating this service incident as a false positive.



The "Vulkan Files": A Look Inside Putin's Secret Plans for Cyber-Warfare


↺ The "Vulkan Files": A Look Inside Putin's Secret Plans for Cyber-Warfare


> Elite hackers from Russia have their sights set on airports and power plants around the world, along with the internet. Confidential data from Moscow, obtained by DER SPIEGEL and its partners, now provide a look inside their arsenal of cyber-weapons and reveal their strategy.



Russian Cyberwarfare Documents Leaked


↺ Russian Cyberwarfare Documents Leaked


> Now this is interesting:


↺ this


↺ this



Hackers Claim to Dox Russian 'War Criminal,' Convince His Wife to Do 'Patriotic Photoshoot'


↺ Hackers Claim to Dox Russian 'War Criminal,' Convince His Wife to Do 'Patriotic Photoshoot'


> A group of Ukrainian hacktivists say they've hacked the accounts of a Russian colonel.



Hackers infect popular 3CX communications application with malware


↺ Hackers infect popular 3CX communications application with malware


> Hackers have compromised 3CX, a popular videoconferencing and business phone management application used by more than 600,000 companies.



3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component


↺ 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component


> 3CX confirms investigating a security breach as the cybersecurity community is sharing more information on what appears to be a sophisticated supply chain attack.



Bypassing PowerShell Strong Obfuscation, (Thu, Mar 30th)


↺ Bypassing PowerShell Strong Obfuscation, (Thu, Mar 30th)


> Yesterday, I found a malicious PowerShell script that was heavily obfuscated.



Report finds employees are storing sensitive information on personal devices


↺ Report finds employees are storing sensitive information on personal devices


> A new report today from phishing protection company SlashNext Inc. finds that a majority of employees have sensitive work information on personal devices as "bring your own device" behavior continues to surge in popularity.



Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks [Ed: The problem is the malware, not Linux, and the malware needs to get there somehow. Whereas with Windows the flaws are typically in the OS itself, unpatched for months if not years.]


↺ Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks


> The recently identified Melofee Linux implant allowed Chinese cyberespionage group Winnti to conduct stealthy, targeted attacks.



500k Impacted by Data Breach at Debt Buyer NCB


↺ 500k Impacted by Data Breach at Debt Buyer NCB


> NCB Management Services is informing roughly 500,000 individuals of a data breach impacting their personal information.



Unpatched Security Flaws Expose Water Pump Controllers to Remote [Cr]acker Attacks


↺ Unpatched Security Flaws Expose Water Pump Controllers to Remote [Cr]acker Attacks


> Water pumping systems made by ProPump and Controls are affected by several vulnerabilities that could allow hackers to cause significant problems.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Thu Jun 13 15:38:05 2024