Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Mar 01, 2023,

updated Mar 01, 2023

=> today's howtos | today's howtos

Kent State’s ticket vendor down due to security breach

=> ↺ Kent State’s ticket vendor down due to security breach

The third-party ticket vendor for Kent State events, including athletics and performing arts, experienced a security breach Tuesday. AudienceView has halted services until the investigation is over.

Hackers Claim They Breached T-Mobile More Than 100 Times in 2022

=> ↺ Hackers Claim They Breached T-Mobile More Than 100 Times in 2022

Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then convert that access into a cybercrime service that could be hired to divert any T-Mobile user's text messages and phone calls to another device.

A Top LastPass Engineer's Home PC Got Pwned by a Hacker's Keylogger

=> ↺ A Top LastPass Engineer's Home PC Got Pwned by a Hacker's Keylogger

Beleaguered password manager LastPass has announced yet another serious security screwup and, this time, it may be the final straw for some users.

Security Defects in TPM 2.0 Spec Raise Alarm

=> ↺ Security Defects in TPM 2.0 Spec Raise Alarm

Security defects in the Trusted Platform Module (TPM) 2.0 reference library specification expose devices to code execution attacks.

Ransomware Attack Hits US Marshals Service

=> ↺ Ransomware Attack Hits US Marshals Service

The US Marshals Service has confirmed that ransomware was deployed on one of its systems that contains sensitive law enforcement information.

Vulnerabilities Being Exploited Faster Than Ever: Analysis

=> ↺ Vulnerabilities Being Exploited Faster Than Ever: Analysis

The time from vulnerability disclosure to exploitation is decreasing, according to a new intelligence report from Rapid7.

Vulnerability in Popular Real Estate Theme Exploited to Hack WordPress Websites [Ed: FUD. This is about a theme! Not WordPress.]

=> ↺ Vulnerability in Popular Real Estate Theme Exploited to Hack WordPress Websites

A critical vulnerability in the Houzez premium WordPress theme and plugin has been exploited in the wild.

‘Hackers’ Behind Air Raid Alerts Across Russia: Official

=> ↺ ‘Hackers’ Behind Air Raid Alerts Across Russia: Official

Russian authorities said that several television and radio stations that have recently broadcast air raid alerts had been breached by hackers.

Firefox 110.0.1 fixes security issues and a crash: here are the details

=> ↺ Firefox 110.0.1 fixes security issues and a crash: here are the details

Mozilla plans to release Firefox 110.0.1 Stable later today. The new stable version of the Firefox web browser fixes security issues in the browser as well as crashes and other non-security issues.
Firefox users may select Menu > Help > About Firefox to display the version that is installed on their device. The browser checks for updates when the about page is opened, and it will download any update that it finds to the local system to install note.
Please note that the update may not be available yet, if you are reading this on February 28,2023.

Dish Network Confirms Hack Following Chaotic Multi-Day Outage

=> ↺ Dish Network Confirms Hack Following Chaotic Multi-Day Outage

Dish Network, the television provider and satellite/telecoms company, has been hacked, according to a statement published Tuesday on its website.

=> ↺ a statement

33 New Adversaries Identified by CrowdStrike in 2022 [Ed: Microsoft-connected CrowdStrike is a political front group, alsoa FUD merchant, not a reliable source or authority]

=> ↺ 33 New Adversaries Identified by CrowdStrike in 2022

CrowdStrike identified 33 new threat actors and campaigns in 2022, including many cybercrime groups and operations.

New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates [Ed: Microsoft Windows TCO]

=> ↺ New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates

A recently identified post-exploitation framework ‘Exfiltrator-22’ uses the same C&C infrastructure as the LockBit ransomware.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/03/01/Security_Leftovers.1.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
140.639799 milliseconds
Gemini-to-HTML Time
1.766659 milliseconds

This content has been proxied by September (ba2dc).