Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Sep 01, 2023

=> Greg Kurtzer on Red Hat and the Red Hat and Google Collaboration | today's howtos

Q&A about internet issues for employees [Ed: The issue is that the university had its whole system/infrastructure breached/paralysed, not "internet [sic] issues for employees"; way to distract from Microsoft saboteurs who should be held accountable for bringing in the back-doored mess]

=> ↺ Q&A about internet issues for employees

Questions and answers to some key questions for U-M faculty and staff.

U. Michigan restores campus internet after cyberattack disrupts first week of classes [Ed: Well, "cyberattack" just means complete, catastrophic breach, but they don't want to admit it]

=> ↺ U. Michigan restores campus internet after cyberattack disrupts first week of classes

The University of Michigan announced it has restored internet to its three campuses after a cyberattack over the weekend.

Q&A: Monthly payroll to be paid on time, and other issues [Ed: Microsoft TCO]

=> ↺ Q&A: Monthly payroll to be paid on time, and other issues

Questions and answers to some key questions for U-M faculty and staff.

Internet service restored to all U-M campuses [Ed: They do not bother explaining what happened and who was held accountable]

=> ↺ Internet service restored to all U-M campuses

Internet connectivity and WiFi has been restored on all U-M campuses. Users should be able to connect as normal from any device. While some issues are expected in the short term with select U-M systems and services, they should be resolved over the next several days. Any service interruptions will be posted on the ITS status page. Please contact the Service Center for technical assistance if needed. Q&A: Monthly payroll to be paid on time, and other issues

CSG holds first meeting of the semester amid campus-wide internet outage [Ed: Central Student Government affected by Microsoft TCO]

=> ↺ CSG holds first meeting of the semester amid campus-wide internet outage

The University of Michigan’s Central Student Government convened Tuesday evening in the Michigan Union to discuss the campus Wi-Fi outage and various resolutions. While CSG is usually hybrid, their first meeting of the fall semester was held entirely in person due to the lack of internet.

‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors

=> ↺ ‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors

Earth Estries, a cyberspy group possibly linked to China, has targeted governments and tech firms in the US, Germany, South Africa and Asia.

Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs

=> ↺ Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs

Roughly 78% of the healthcare organizations in North America, South America, the APAC region, and Europe experienced a cyberattack over the past year, according to a new report.

Recent Juniper Flaws Chained in Attacks Following PoC Exploit Publication

=> ↺ Recent Juniper Flaws Chained in Attacks Following PoC Exploit Publication

Four recent vulnerabilities in the J-Web component of Junos OS have started being chained in malicious attacks after PoC exploit code was published.

DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner

=> ↺ DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner

The DreamBus botnet has resurfaced and it has been exploiting a recently patched Apache RocketMQ vulnerability to deliver a Monero miner.

DOE launches cyber contest to benefit rural utilities

=> ↺ DOE launches cyber contest to benefit rural utilities

A Department of Energy contest aims to help under-resourced rural utilities beef up their cybersecurity defenses.

Africa cyber threats exposed

=> ↺ Africa cyber threats exposed

That digital insecurity and cyber threats in Africa are real was forcibly brought to light by a joint Interpol/Afripol operation across 25 of the continent’s 54 countries. The four-month Africa Cyber Surge II operation focused on identifying cybercriminals and compromised infrastructure.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/09/01/Security_Leftovers.2.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
144.364547 milliseconds
Gemini-to-HTML Time
0.875244 milliseconds

This content has been proxied by September (ba2dc).