helpnetsecurity.com

breakingcups, to cybersecurity in IT pros targeted with malicious Google ads for PuTTY, FileZilla - Help Net Security

Surely actual IT pros use uBlock origin?

scytale, (edited )

It’s actually surprising how a lot of people in tech aren’t really aware of the security and privacy side of things, especially in their personal lives. They may be more secure at work because the infosec team has oversight, but outside of that I know a lot of very technical people who don’t apply basic security/privacy measures outside of work.

sanpo,

How I wish that was true… “Pro” and “competence” aren’t as closely linked as people like to think.

MajorHavoc, to cybersecurity in Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)

Yay! I have a better reason to hate submodules now, until it’s patched everywhere, at least.

Altreus,

Nice, came here to dunk on submodules, and find there’s no need.

MajorHavoc, (edited )

Yeah. I wanted to like submodules, but submodules, to me, ended up feeling like one feature too many in git.

I mainly run into submodules that have been setup accidentally by cloning inside an existing clone. That situation is, of course, not great.

Even for the many reasonable use cases for submodules, I generally end up letting my actual package manager do the work, instead. I’m generally happier for it, since life tends to be simpler when my package manager of choice knows about any required libraries.

Altreus,

Agreed. Haven’t yet found a use case that isn’t better handled by either build tools or “don’t do that”

MajorHavoc, to cybersecurity in 73% of SME security pros missed or ignored critical alerts - Help Net Security

And 75% of accountants have made a typo, and 75% of human resources professionals have failed to close the hiring process with an ideal candidate…

cron, to cybersecurity in 73% of SME security pros missed or ignored critical alerts - Help Net Security

Only 73%? I would guess that this number is way higher, as many probably don’t know what they missed.

lando55, to cybersecurity in 73% of SME security pros missed or ignored critical alerts - Help Net Security

Really struggling to find the value in this article. How does it go from

Cybersecurity is typically handled by a company’s IT staff, who become quickly overwhelmed

to

The most effective way for SMEs to escape this cybersecurity hell is to adopt a single platform

without so much as entertaining the idea of hiring a dedicated team of security professionals with this specific task in mind?

This reads more like, “We have all these lawyers that sometimes talk to the IRS, instead of hiring an accountant let’s just buy TurboTax.”

elgordio, to technology in Bots dominate internet activity, account for nearly half of all traffic

My CDN bill recently went from about $5 a month to over $200. Turned out it was Tictok’s spider relentlessly scraping the same content over and over again.

It was ignoring robots.txt. In the end I just had to ban their user agent in the CDN config.

noorbeast, to technology in Bots dominate internet activity, account for nearly half of all traffic

It will get worse with AI joining the fray!

RootBeerGuy, to technology in Bots dominate internet activity, account for nearly half of all traffic
@RootBeerGuy@discuss.tchncs.de avatar

I don’t believe it. Its gotta be more than that.

rammer,
@rammer@sopuli.xyz avatar

Don’t forget that porn is a huge chunk as well. Between bots and porn there’s little left.

maegul, to technology in Bots dominate internet activity, account for nearly half of all traffic
@maegul@lemmy.ml avatar

Yea. Along with web rings, human-focused search and just harbouring communities better … we gotta start building people-focused online gardens and ditch this capitalistic hustle shit.

fatalError,

Not all bots are bad, the piped bot is nice and there are others too

Dave, to technology in Bots dominate internet activity, account for nearly half of all traffic
@Dave@lemmy.nz avatar

What proportion of the bots were fediverse servers syncing with each other?

thanks_shakey_snake,

Yeah, I’m wondering about how they characterize “bot activity.” It seems like “any traffic not proximally related to a user’s synchronous activity” is a little too broad.

I’m not sure if fediverse syncing is bot activity. Or my laptop checking for software updates while I’m sleeping. Or my autopay transactions for utility bills.

luciole,
@luciole@beehaw.org avatar

From the org’s definition of bots, I’d say it’s implicit that bot activity excludes expected communication in an infrastructure, client-server or otherwise. A bot is historically understood as an unexpected, nosy guest poking around a system. A good one might be indexing a website for a search engine. A bad one might be scraping email addresses for spammers.

In any case, none of the examples you give can be reasonably categorized as bots and the full report gives no indication of doing so.

Mirodir,

I’d argue that with their definition of bots as “a software application that runs automated tasks over the internet” and later their definition of download bots as “Download bots are automated programs that can be used to automatically download software or mobile apps.”, automated software updates could absolutely be counted as bot activity by them.

Of course, if they count it as such, the traffic generated that way would fall into the 17.3% “good bot” traffic and not in the 30.2% “bad bot” traffic.

Looking at their report, without digging too deep into it, I also find it concerning that they seem to use “internet traffic” and “website traffic” interchangeably.

luciole,
@luciole@beehaw.org avatar

Yeah, their reporting suffers from not adequately defining what is being measured.

Sagar, to cybersecurity in How to protect IP surveillance cameras from Wi-Fi jamming - Help Net Security

Firstly, we need to get rid of cameras at every 10m. That is ridiculous! I have seen cameras at a street vendor who supposedly keeps them for “protection”, against what, right to beg?

Each camera is an offense against the customer, you’re not trusting anyone at all!

We have to say these golden words, you poor bastard, do you need Z+ security?

gnuplusmatt, to cybersecurity in IT pros targeted with malicious Google ads for PuTTY, FileZilla - Help Net Security

Software comes from a repository, even on Windows these days, who is bothering to download exes when there is winget

Pacmanlives, to cybersecurity in IT pros targeted with malicious Google ads for PuTTY, FileZilla - Help Net Security

I mean ssh is built into Windows 11 and has been a part of Mac for like the OG Mac release: I can’t remember downloading a Mac ssh client since OS9 and windows has had WSL so chose your flavor of Linux to run and ssh into you jumpbox

knobbysideup, to cybersecurity in IT pros targeted with malicious Google ads for PuTTY, FileZilla - Help Net Security
@knobbysideup@sh.itjust.works avatar

Real IT pros don’t use either of those in the first place.

Dkarma,

Putty? Tell me you know nothing about IT…

knobbysideup,
@knobbysideup@sh.itjust.works avatar

Even windoze has native openssh built in now. Most people who don’t like pain will simply use wsl instead.

Tell me you’ve never properly managed enterprise equipment at scale…

madsen,

Seems a bit excessive to install WSL just to get an SSH client.

doubletwist,

You don’t have to. There’s an openssh client available in powershell. Maybe when cmd, though I haven’t tried it.

madsen,

Ah, cool. I do have WSL installed on every Windows box I use regularly, but it’s good to know for when I run into a more locked down machine.

VonReposti,

How is this upvoted? PuTTY is legacy software at this point and it even neglects the fact that a lot of IT people have been using Linux for ages.

Jaysyn, to cybersecurity in IT pros targeted with malicious Google ads for PuTTY, FileZilla - Help Net Security
Jaysyn avatar

Real IT "pros" don't see ads.

Buelldozer,
@Buelldozer@lemmy.today avatar

They do however see Sponsored search results on google.com and that’s how this attack chain starts. You search for one those tools, get a sponsored result and click it. You’re then whisked away to a spoofed site.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • InstantRegret
  • mdbf
  • ethstaker
  • magazineikmin
  • GTA5RPClips
  • rosin
  • thenastyranch
  • Youngstown
  • osvaldo12
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • JUstTest
  • Durango
  • everett
  • cisconetworking
  • Leos
  • normalnudes
  • cubers
  • modclub
  • ngwrru68w68
  • tacticalgear
  • megavids
  • anitta
  • tester
  • lostlight
  • All magazines