A collection point
...and some of my own.
As Businesses Go Remote, Hackers Find New Security Gaps https://www.darkreading.com/threat-intelligence/as-businesses-go-remote-hackers-find-new-security-gaps/d/d-id/1339336?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple The increase in server-side request forgery (SSRF) vulnerabilities is a trend HackerOne noticed last year but has increased, Rice says. It's a trend somewhat related to the pandemic but more broadly driven by the broad migration to cloud environments. "These vulnerabilities aren't very exploitable in on-prem or local environments but have massive impacts when redeployed to shared multi-tenant cloud environments. … We're seeing the impact of them spike pretty dramatically," he says. Was Hunter Biden’s laptop password really “Hunter02”? https://grahamcluley.com/hunter-biden-laptop-password/ The headline (which in Daily Mail tradition is typically wordy) reads: “EXCLUSIVE: National security nightmare of Hunter Biden’s abandoned laptop containing phone numbers for the Clintons, Secret Service officers and most of the Obama cabinet plus his sex and drug addictions – all secured by the password Hunter02” It’s the bit about the password which interests me the most. Obviously, if true, “Hunter02” is a very poor choice of password. Particularly for somebody called Hunter. But what’s bizarre is that there has been a meme all about having “hunter2” as a password, for the best part of 20 years. Is it possible that somebody is having a joke at the media’s expense, and has duped some non-tech savvy journalists into believing that the son of US Presidential candidate Joe Biden might have used a joke password like “hunter02”? And if that password makes us raise a doubtful eyebrow, might we be wise to be similarly cautious about other claims made in the article – especially with a contentious US election due to take place today? We loved this write in comment about Graham Cluley's article: "I would be cautious about anything in the Daily Mail. They told us Eric Idle would be the new Doctor Who." U.S. Says Iranian Hackers Accessed Voter Information https://www.securityweek.com/us-says-iranian-hackers-accessed-voter-information?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29 “CISA and the FBI assess this actor is responsible for the mass dissemination of voter intimidation emails to U.S. citizens and the dissemination of U.S. election-related disinformation in mid-October 2020. Further evaluation by CISA and the FBI has identified the targeting of U.S. state election websites was an intentional effort to influence and interfere with the 2020 U.S. presidential election,” the alert reads. Between September 29 and October 17, the adversary launched attacks on U.S. state websites, including election websites, to access voter information, CISA and the FBI say. Observed activity includes exploitation of known vulnerabilities, the use of web shells, and the abuse of web application bugs. “CISA and the FBI can confirm that the actor successfully obtained voter registration data in at least one state. The access of voter registration data appeared to involve the abuse of website misconfigurations and a scripted process using the cURL tool to iterate through voter records,” CISA and the FBI say. JM Bullion Discloses Months-Long Payment Card Breach https://www.securityweek.com/gold-dealer-jm-bullion-discloses-months-long-payment-card-breach?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29 Texas-based precious metals dealer JM Bullion has informed some customers that their payment card information may have been stolen by cybercriminals, but the disclosure came months after the breach was discovered. The investigation found that someone hacked into JM Bullion’s website and planted malicious code that was present on the site between February 18 and July 17, 2020. The malicious code was apparently designed to harvest customer information entered on the website — this is known as a skimming or Magecart attack. Some customers who discussed the incident on Reddit seem disappointed that it took the company five months to discover the breach and another three months to alert impacted individuals. Others expressed concern that the exposure of physical addresses is serious as someone could use the information to target the homes of people who acquired precious metals. Securing your home network: https://www.darkreading.com/edge/theedge/how-can-i-help-my-remote-workers-secure-their-home-routers/b/d-id/1339346?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Leave a Reply. |
Linking the world
Sharing is caring Archives
May 2024
Categories |