-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Security Leftovers


Posted by Roy Schestowitz on Sep 09, 2023


today's howtos

Reproducible Builds News and Release



Lessons from a ransomware attack: How one healthcare CIO helped her company recover


↺ Lessons from a ransomware attack: How one healthcare CIO helped her company recover


> In the early-morning hours of Feb. 25, 2021, Terri Ripley got the call every chief information officer dreads: Her company, OrthoVirginia Inc., had been hit by a massive attack of the Ryuk ransomware that had shut down its entire computing fabric.



US, UK Sanction More Members of Trickbot Russian Cybercrime Group


↺ US, UK Sanction More Members of Trickbot Russian Cybercrime Group


> The US and UK have announced sanctions against 11 more alleged members of the Russian cybercrime group Trickbot.



Understanding the Cyber Resilience Act: What Everyone involved in Open Source Development Should Know


↺ Understanding the Cyber Resilience Act: What Everyone involved in Open Source Development Should Know


> The European Union is making big changes to cybersecurity requirements with its proposed Cyber Resilience Act (CRA). You may have heard about the CRA’s potential impact on the open source ecosystem. But what does the Cyber Resilience Act mean for you? This post is an introduction to the Act and explains how it may affect the open source maintainers and developer community. Note that this post is based on a draft of the CRA from September 15, 2022. The Act is still in a draft stage and getting feedback, and its provisions may differ before it is passed into law.



Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap


↺ Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap


> Emsisoft urges its users to update anti-malware and other security products after signing them with an improperly issued digital certificate.



New Phishing Campaign Launched via Google Looker Studio


↺ New Phishing Campaign Launched via Google Looker Studio


> Check Point has observed a wave of phishing attacks launched via Google Looker Studio to steal credentials and funds from intended victims.



US Aeronautical Organization Hacked via Zoho, Fortinet Vulnerabilities


↺ US Aeronautical Organization Hacked via Zoho, Fortinet Vulnerabilities


> APTs exploited vulnerabilities in Zoho ManageEngine and Fortinet VPNs to hack an aerospace organization in early January 2023.



The ‘aha’ moment in cybersecurity: How one contract affected a startup’s mission


↺ The ‘aha’ moment in cybersecurity: How one contract affected a startup’s mission


> The year 2018 was a different era when it came to security. It was a time when there were a lot of security companies, and it became quickly apparent that more scrutiny and regulation was on the way, as the European Union’s new General Data Protection Regulation just came into effect.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sun Jun 16 03:57:46 2024