Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Nov 23, 2022

=> Proxmox VE 7.3 released! (UPDATED) | Voice (gnome-voice) 1.0.1 with Multiple Voice Streaming and Recording

Open source and cybersecurity: from prevention to recovery

=> ↺ Open source and cybersecurity: from prevention to recovery

So you have just installed the latest antivirus and turned on your shiny new firewall. Now your organisation is fully secure, right?
The reality is that all the security products in the world will never be able to fully protect your data centre or your business from security threats. Because of the asymmetry between attackers and enterprises, cybersecurity is a problem that can never be solved and is never going away. The key is to realise that the journey towards a healthy infrastructure is one that has a beginning but not an end.
So what does a good cybersecurity strategy look like? While Canonical is not a cybersecurity vendor, we make sure countless organisations around the world are safe from potential attackers. As the first link in the software supply chain, we play a critical role here.

CISA Releases Eight Industrial Control Systems Advisories | CISA

=> ↺ CISA Releases Eight Industrial Control Systems Advisories | CISA

CISA has released eight (8) Industrial Control Systems (ICS) advisories on 22 November 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

AVEVA Edge [Ed: 9.8 out of 10 in severity. Microsoft TCO: "Windows UNC Share".]

=> ↺ AVEVA Edge

Successful exploitation of these vulnerabilities could allow an attacker to insert malicious DLL files and trick the application into executing code.

Project Zero: Mind the Gap

=> ↺ Project Zero: Mind the Gap

In June 2022, Project Zero researcher Maddie Stone gave a talk at FirstCon22 titled 0-day In-the-Wild Exploitation in 2022…so far. A key takeaway was that approximately 50% of the observed 0-days in the first half of 2022 were variants of previously patched vulnerabilities. This finding is consistent with our understanding of attacker behavior: attackers will take the path of least resistance, and as long as vendors don't consistently perform thorough root-cause analysis when fixing security vulnerabilities, it will continue to be worth investing time in trying to revive known vulnerabilities before looking for novel ones.

Apple Device Analytics Contain Identifying iCloud User Data, Claim Security Researchers - MacRumors

=> ↺ Apple Device Analytics Contain Identifying iCloud User Data, Claim Security Researchers - MacRumors

On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics data includes an iCloud account and can be linked directly to a specific user, including their name, date of birth, email, and associated information stored on iCloud.

Apple’s Device Analytics Can Identify iCloud Users - Schneier on Security

=> ↺ Apple’s Device Analytics Can Identify iCloud Users - Schneier on Security

Apple was just sued for tracking iOS users without their consent, even when they explicitly opt out of tracking.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2022/11/23/Security_Leftovers.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
139.538946 milliseconds
Gemini-to-HTML Time
0.633647 milliseconds

This content has been proxied by September (ba2dc).