Weshalb wundert dies mich nicht und weshalb wird zB Russland immer noch unterschätzt? Sicherheit ist nicht so simpel, wie es viele verkaufen. Danke @evawolfangel für den informatieven Artikel:
»Neue russische Cyberwaffe entdeckt:
Russlands Geheimdienst hat offenbar ein neues Werkzeug entwickelt, um Firmen auszuspionieren. Es gibt nur wenige Spuren, denn die Schadsoftware löscht sich teils selbst«
I updated to #Ubuntu 22.04 yesterday and got a little notification that my #apt Firefox was being switched to #snap. Weird flex, but okay.
Today, when I tried to open my local #Rust documentation with rustup doc --book, I got a page that said that the access to the file was denied.
It turns out that #snap prevents firefox opening files in hidden folders and the best workaround is to create a symbolic link to a non-hidden folder. WTH?
@manpacket I saw this last week and finally made the switch when I found that #snap#firefox could not open pages from the /tmp/ directory (snap: 2, me: 0)
I don't understand what is the point of releasing an IDE via #flatpak, when that flatpak doesn't include all the necessary dev tools, and it can't access the ones outside its sandboxing. Honestly. What's the point? I'm looking at you, #Geany.
Personally, I can't stand flatpaks or #snap. #Appimage is nicer just because it's just one delete away from within the file manager and doesn't leave crumbs everywhere. But overall, I prefer #apt, and #dnf.
Rumint is that the Change Healthcare was Chinese espionage that was caught and they overreacted and turned off all systems thinking ransomware was going to be deployed.
This fits with Chinese targeting of healthcare and pharmacies in the past. My assessment is that it could also be Russian long term staging or espionage as they are also known to target healthcare and pharmacies.
Hot off the press! CISA adds CVE-2023-43770 (6.1 medium) Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability to the Known Exploited Vulnerabilities (KEV) Catalog.
🔗 (to be replaced later) https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Why you should care about CVE-2023-43770:
ESET Research previously reported on 25 October 2023 that the Winter Vivern APT was exploiting a similar RoundCube cross-site scripting vulnerability CVE-2023-5631 as a zero-day against European overnmental entities and a think tank.
CISA, on behalf of the collective group of industry and government partners that comprise the Joint Cyber Defense Collaborative (JCDC), released JCDC’s 2024 Priorities. Similar to the 2023 JCDC Planning Agenda, JCDC’s 2024 Priorities will help focus the collective group on developing high-impact and collaborative solutions to the most pressing cybersecurity challenges.
2024 priorities are defined around three focus areas. The first focus area, Defend Against Advanced Persistent Threat (APT) Operations, aligns JCDC strategic and operational efforts to counter known and suspected APT campaigns that target critical infrastructure sectors with the potential to impact National Critical Functions. The second focus area, Raise the Baseline, encompasses JCDC efforts to improve the cybersecurity posture of critical infrastructure entities to reduce the frequency and impact of cyber incidents. The third focus area, Anticipate Emerging Technology and Risks, seeks to decrease the likelihood and impact of AI-related threats and vulnerabilities to critical infrastructure providers.