Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Apr 14, 2023

=> today's howtos | Android Leftovers

Reflections on certificates, Part 1

=> ↺ Reflections on certificates, Part 1

Guest Post: Understanding the complexity, trust relationships, and tradeoffs of certificates can lead to better decision-making and more efficient operations.

Microsoft April 2023 Patch Tuesday fixes 1 zero-day, 97 flaws [Ed: Too late as some of these have already been exploited and new bug doors may be added with the new update]

=> ↺ Microsoft April 2023 Patch Tuesday fixes 1 zero-day, 97 flaws

Irrigation Systems in Israel Disrupted by Hacker Attacks on ICS

=> ↺ Irrigation Systems in Israel Disrupted by Hacker Attacks on ICS

Irrigation systems were disrupted recently in Israel in an attack that once again shows how easy it is to hack industrial control systems (ICS).

Microsoft Shares Resources for BlackLotus UEFI Bootkit Hunting [Ed: UEFI itself is the security hole and Microsoft created a scam in the false name of "security"]

=> ↺ Microsoft Shares Resources for BlackLotus UEFI Bootkit Hunting | ↺ UEFI itself is the security hole

Microsoft has shared details on how threat hunters can check their systems for BlackLotus UEFI bootkit infections.

New hacker advocacy group seeks to protect work of security researchers

=> ↺ New hacker advocacy group seeks to protect work of security researchers

"There are advocacy groups for reptile owners but not hackers, so that seems like a miss," said Ilona Cohen of HackerOne.

Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says [Ed: Clown computing is, in its own right, a security breach, but people are made to believe they can trust the owners of the clowns]

=> ↺ Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says

Weak passwords accounted for nearly half of the security incidents affecting Google Cloud customers.

CISA and partners issue secure-by-design principles for software manufacturers [Ed: That's rich coming from CISA, which works with NSA on back doors]

=> ↺ CISA and partners issue secure-by-design principles for software manufacturers

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/04/14/Security_Leftovers.2.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
140.478484 milliseconds
Gemini-to-HTML Time
0.818039 milliseconds

This content has been proxied by September (3851b).