avuko, to random
AAKL, to Cybersecurity
@AAKL@noc.social avatar
0x58, to Cybersecurity

Consulting firm has been swept up in a global cybersecurity breach that threatens to embroil more Australian companies after Russian-linked cybercriminals breached widely used file-sharing software.

https://www.afr.com/technology/embattled-consulting-firm-pwc-swept-up-in-global-cyber-breach-20230619-p5dhlz

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

→ 🇺🇸 🇨🇳 The US Navy, NATO, and are using a shady Chinese company’s chips
→ 🦠 🏢 Group Starts Naming Victims of Zero-Day Attacks
→ ☁️ 🪣 New Supply Chain Attack Exploits Abandoned to Distribute Malicious Binaries
→ ☁️ Vulnerabilities in Led to Unauthorized Access to User Sessions
→ 🇨🇳 🦠 ESG zero-day attacks linked to suspected Chinese hackers
→ 🇷🇺 🇺🇸 Russian national arrested in Arizona, charged for alleged role in ransomware attacks
→ 🇷🇺 🇺🇦 Russia-backed hackers unleash new USB-based malware on ’s military
→ 🇺🇸 💰 LockBit Ransomware Extorts $91 Million from U.S. Companies
→ 🇷🇺 🇺🇦 identifies new hacking unit within Russian military intelligence
→ 🦠 Fake Researcher Profiles Spread through Repositories as PoC Exploits
→ 🎣 👟 Massive campaign uses 6,000 sites to impersonate 100 brands
→ 🇨🇳 Chinese Cyberspies Caught Exploiting ESXi
→ 🩹 Microsoft , June 2023 Edition
→ ☁️ Microsoft: Azure Portal was caused by traffic “spike”
→ 🇨🇳 🇺🇸 's cyber now aimed at infrastructure, warns CISA boss
→ 🇰🇷 🇨🇳 Ex-Samsung executive alleged to have stolen tech to recreate chip plant in China
→ 🇨🇭 🗄️ Swiss Fear Government Data Stolen in Cyberattack
→ 🩹 🔐 fixes critical RCE flaw in SSL-VPN devices, patch now

📚 This week's recommended reading is: "The Cyber Effect: An Expert in Cyberpsychology Explains How Technology Is Shaping Our Children, Our Behavior, and Our Values — and What We Can Do About It" by Prof Mary Aiken

Subscribe to the to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-242023

ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

offers customers exclusive digital clock showing number of hours since last security patch

Sunny, to Cybersecurity

So in Oregon, the hack resulted in the state compromising all drivers license data for over 3 million people.

And what did the state decide to do about that?

They issued a statement.

"Keep an eye on your credit card bills".

That's it. That's all. Good luck everyone.


brett, to random

has listed multiple other victims, including the University of Missouri System, Aon, and the Boston Globe. By my count, there are now 63 known/confirmed victims plus an unspecified number of USG agencies. Cl0p has also updated its statement. .

PogoWasRight, to infosec

At least two states' motor vehicle agencies became victims of the MOVEit breach. Oregon says it may be 3.5 million, and no numbers yet for Louisiana.

https://www.databreaches.net/oregon-dmv-louisiana-omv-warn-residents-of-moveit-data-breach/

gadgetry, to infosec
@gadgetry@techhub.social avatar
jbzfn, (edited ) to Cybersecurity
@jbzfn@mastodon.social avatar

⚠️ US government agencies hit in global cyberattack | @CNN

"The hacks have not had any “significant impacts” on federal civilian agencies, CISA Director Jen Easterly told reporters, adding that the hackers have been “largely opportunistic” in using the software flaw to break into networks"



https://edition.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html

laprice, to oregon
@laprice@mastodon.social avatar

So it looks like the DMV got popped with the hack.

Everybody panic! Oregonians Credit scores are worthless now! All your info are belong to shadowy hackers in strange places with foreign names!

Or just take commonsense precautions and never give info to someone who calls you.

https://www.oregonlive.com/commuting/2023/06/massive-hack-of-oregon-dmv-system-puts-estimated-35-million-driver-license-and-id-card-info-at-risk-officials-say.html

AAKL, to Cybersecurity
@AAKL@noc.social avatar
AAKL, (edited )
@AAKL@noc.social avatar
smfinlay, to random

Another vulnerability disclosed today. Progress is recommending all customers to "immediately take down their HTTP and HTTPs traffic to safeguard their environments while the patch is finalized."

DJ Khaled another one gif

https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability

PogoWasRight, to random

Is anyone compiling a list that they are sharing of MOVEit victims?

AAKL, to Cybersecurity
@AAKL@noc.social avatar
gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

There are shocking revelations about a US Government data suck-up, historic security breaches at Windsor Castle, and the causes consternation.

It's a brand new "Smashing Security" podcast, with special guest @bittner from The CyberWire!

Find it in all good podcast apps, or at https://www.smashingsecurity.com/326

video/mp4

brett, to random
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

A bunch of people have alerted me to a vulnerability in , a secure file transfer app used heavily in the UK.

I did some digging and it looks like it’s a zero day under active exploitation. Not 100% on threat actor yet but it may be one of the ransomware/extortion groups.

Really serious, impacted orgs should shut down the server. Thread follows.

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Shell oil, Transport for London have confirmed they were impacted by by zero day. Cl0p have started posting victim names. https://therecord.media/shell-impacted-in-clop-ransomware-attack

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

CNN and Washington Post confirming something in this Mastodon thread from two weeks ago - multiple US gov orgs hit via . https://www.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html

CyberLeech, (edited )
@CyberLeech@cyberplace.social avatar
GossiTheDog,
@GossiTheDog@cyberplace.social avatar

There is another new vulnerability in . No patch. Shut them down again. HT @brett https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Several of the orgs in the Ransomware Task Force are impacted by the cl0p incident, as is one of the Joint Ransomware Task Force. (This toot is sponsored by those trying to shut down discussion about it).

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Yesterday's new vulnerability has been allocated CVE-2023-35708. Patch is out now.

GossiTheDog,
@GossiTheDog@cyberplace.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • cisconetworking
  • DreamBathrooms
  • InstantRegret
  • mdbf
  • khanakhh
  • magazineikmin
  • Durango
  • Youngstown
  • slotface
  • rosin
  • everett
  • kavyap
  • Leos
  • JUstTest
  • ngwrru68w68
  • tacticalgear
  • osvaldo12
  • GTA5RPClips
  • ethstaker
  • thenastyranch
  • cubers
  • anitta
  • tester
  • modclub
  • normalnudes
  • provamag3
  • lostlight
  • All magazines