Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Sep 15, 2023

=> Audiocasts/Shows: BSD Now and mintCast | today's howtos

Strengthening Security: What You Need to Know About our New Vulnerability Reporting Policy

=> ↺ Strengthening Security: What You Need to Know About our New Vulnerability Reporting Policy

Today, we're introducing our new vulnerability disclosure policy, which clarifies how vulnerability reporters should connect with the Linux Foundation project maintainers who are able to resolve issues.

China Denies iPhone Ban, but the Devil Is in the Details

=> ↺ China Denies iPhone Ban, but the Devil Is in the Details

China's Foreign Ministry affairs has clarified media reports that iPhones had been "soft-banned" from government administration services. But the devil is in the details, and concerns around cybersecurity could be weaponized in the East as they have been in the West.

DHS warns of malicious AI use against critical infrastructure

=> ↺ DHS warns of malicious AI use against critical infrastructure

The DHS report warns of state-backed hackers using AI for both malware development and election interference.

Remote Desktop Protocol exposures leave 85% of organizations vulnerable to attack [Ed: Microsoftism in action]

=> ↺ Remote Desktop Protocol exposures leave 85% of organizations vulnerable to attack

A new report from Palo Alto Network Inc.’s Unit 42 finds that 85% of organizations have Remote Desktop Protocol internet accessible for at least 25% of the month, leaving them open to ransomware attacks or unauthorized login attempts.

Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack

=> ↺ Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack

A known ransomware gang has taken credit for the highly disruptive cyberattack on MGM Resorts, and the company has yet to restore impacted systems.

North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx

=> ↺ North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx

North Korean hackers stole $53 million in cryptocurrency from crypto exchange CoinEx after the hot wallet private key was leaked.

LockBit Affiliate Deploys New 3AM Ransomware in Recent Attack

=> ↺ LockBit Affiliate Deploys New 3AM Ransomware in Recent Attack

A LockBit affiliate has deployed the new 3AM ransomware family on a victim’s network, after LockBit’s execution was blocked.

PCI v4 is coming. Are you ready?

=> ↺ PCI v4 is coming. Are you ready?

If you’ve landed here the chances are you are considering PCI compliance.

Azure HDInsight Flaws Allowed Data Access, Session Hijacking, Payload Delivery

=> ↺ Azure HDInsight Flaws Allowed Data Access, Session Hijacking, Payload Delivery

Orca Security details eight XSS vulnerabilities in Azure HDInsight that could lead to information leaks, session hijacking, and payload delivery.

Microsoft: Iranian espionage campaign targeted satellite and defense sectors [Ed: Microsoft is not a security expert but purveyor of back doors, which among other things allow Tehran to get into systems and networks all around the world]

=> ↺ Microsoft: Iranian espionage campaign targeted satellite and defense sectors

Tehran's latest hacking activity involves easy-to-detect techniques to gain access and then pivoting to stealthier methods.

A Second Major British Police Force Suffers a Cyberattack in Less Than a Month

=> ↺ A Second Major British Police Force Suffers a Cyberattack in Less Than a Month

Personal details of thousands of police officers and staff from Greater Manchester Police have been hacked from a company that makes identity cards.

Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database

=> ↺ Caesars Confirms Ransomware Hack, Stolen Loyalty Program Database

The hijacked data includes driver’s license numbers and/or social security numbers from a Caesars Entertainment loyalty database.

ICS Computers in Western Countries See Increasing Attacks: Report

=> ↺ ICS Computers in Western Countries See Increasing Attacks: Report

ICS computers in the Western world have been increasingly attacked, but the percentages are still small compared to other parts of the globe.

Kubernetes Vulnerability Leads to Remote Code Execution [Ed: This is a Microsoft Windows issue]

=> ↺ Kubernetes Vulnerability Leads to Remote Code Execution

A high-severity vulnerability can be exploited to execute code remotely on any Windows endpoint within a Kubernetes cluster.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/09/15/Security_Leftovers.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
141.18306 milliseconds
Gemini-to-HTML Time
1.516263 milliseconds

This content has been proxied by September (ba2dc).