LizardSF, to VideoGames

THIRTEEN TIMES?

Gotta update those training videos!
Signs of insider threat include:

  • Financial instability/unexplained purchases.

  • Unusually strident criticsm of policy.

  • Asking for access to documents outside job necessity.

  • Playing War Thunder.

https://youtu.be/lFzT3V5D8TI?si=z-u9HNJZHYpww9Ku

dangoodin, to random

Researchers have unearthed nearly two dozen vulnerabilities that could allow hackers to sabotage or disable a popular line of network-connected wrenches that factories around the world use to assemble sensitive instruments and devices.

The vulnerabilities, reported Tuesday by researchers from security firm Nozomi, reside in the Bosch Rexroth Handheld Nutrunner NXA015S-36V-B. The cordless device, which wirelessly connects to the local network of organizations that use it, allows engineers to tighten bolts and other mechanical fastenings to precise torque levels that are critical for safety and reliability. When fastenings are too loose, they risk causing the device to overheat and start fires. When too tight, threads can fail and result in torques that are too loose. The Nutrunner provides a torque-level indicator display that’s backed by a certification from the Association of German Engineers and adopted by the automotive industry in 1999.

Nozomi researchers said the device is riddled with 23 vulnerabilities that, in certain cases, can be exploited to install malware. The malware could then be used to disable entire fleets of the devices or to cause them to tighten fastenings too loosely or tightly while the display continues to indicate the critical settings are still properly in place.

Bosch officials emailed a statement that included the usual lines about security being a top priority. It went on to say that Nozomi reached out a few weeks ago to reveal the vulnerabilities. "Bosch Rexroth immediately took up this advice and is working on a patch to solve the problem," the statement said. "This patch will be released at the end of January 2024."

https://arstechnica.com/security/2024/01/network-connected-wrenches-used-in-factories-can-be-hacked-for-sabotage-or-ransomware/

infosec_jcp,

@dangoodin

Came here to say....

Regularly Audited eDiscoverable IoT(📶+💩) Wrenches

🔧📶👩‍🔧📶👨‍🔧📶🧰📶🛠️📶

This truely is teh future of tightening 📶 but with vulnerabilities 💩🍍📶

🤦‍♂️ Good on them for updating the 🔧📶's SW stack though.

Treat it like a windows box and wipe/reformat AFTER testing. Best to go into 🔧📶 with a clean build.

Now, can they secure this from ☣️ 's ☣️ ☣️ used at the 's called though? ☣️🔬 👀👀

PogoWasRight, to infosec
PogoWasRight, to infosec

Need a reminder of the insider threat? Here's a two-fer for you:

In the U.K.: Former NHS secretary found guilty of illegally accessing medical records: https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/11/former-nhs-secretary-found-guilty-of-illegally-accessing-medical-records/

And in the U.S.: T-Mobile sued after employee stole nude images from customer phone during trade-in: https://www.cnbc.com/2023/11/17/t-mobile-sued-after-employee-stole-nude-images-from-phone.html

@adamshostack

fifonetworks, to random

In the USA, AWS operations are divided into four regions:
us-east-1
us-east-2
us-west-1
us-west-2
In each region, there is an employee who is a Russian spy.
In each region, there is an employee who is a Chinese spy.
The Russian spy is not Russian.
The Chinese spy is not Chinese.
The two spies do not know each other.
US Intelligence has identified both spies.
Plot twist…
There is more than one of each.
They do not know each other.
US Intelligence does not know them all.

PogoWasRight, to random

Does anyone proofread anymore? This is from a breach notification letter from a county agency. The notification letter is dated January 19, 2023 and states, in relevant part:

"What Happened?
DPSS is writing to you because of a privacy incident that occurred on January 19, 2023 at the County of Los Angeles (County) DPSS. A County employee accessed your personal information contained in our electronic systems without a legitimate business reason. County personnel discovered the incident during an internal investigation on December 27, 2022. "

And of course, they don't explain why the lengthy gap between discovery and notification -- unless the notification really was sent on January 19 and they are just first sending it to the state now? What a confusing submission.

🤔 🤦‍♀️

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar
PogoWasRight, to privacy

Today's reminder of your insider threat:

Deputy U.S. Marshal Pleads Guilty to Obtaining Cell Phone Location Information Unlawfully:
https://www.databreaches.net/deputy-u-s-marshal-pleads-guilty-to-obtaining-cell-phone-location-information-unlawfully/

PogoWasRight, to infosec

Here’s your reminder for today about the insider threat:

Lawyer censured for using TeamViewer to snoop on former firm’s business activity:
https://www.abajournal.com/web/article/lawyer-is-censured-for-using-teamviewer-to-snoop-on-former-firms-business-activity

Direct link to Disciplinary Review Board's findings and recommendations in 2022: https://drblookupportal.judiciary.state.nj.us/DocumentHandler.ashx?document_id=1161175

Do you think he got off too lightly or did censure seem right to you?

PogoWasRight, to privacy

A proposed settlement of $988,550 has been reached in a class-action lawsuit relating to patient health records being wrongfully accessed by former employees at the Peterborough Regional Health Centre more than a decade ago:

https://globalnews.ca/news/9770572/prhc-proposed-settlement-patient-privacy-breaches-2011-2012/

For more background/history on the breach and case, find coverage on my site linked from: https://www.databreaches.net/?s=Peterborough+Regional

PogoWasRight, to random

For those who blame employees for breaches or who think occasionally running a phishing exercise will suffice:

Looking at Verizon DBIR's key insights:

74% of all breaches include the human element through Error, Privilege Misuse, Use of stolen credentials or Social Engineering

So... is C-Suite really investing enough and doing enough to "human-proof?" With numbers like these, will class action lawyers be able to argue more convincingly that management was negligent if it didn't do more to human-proof against breaches?

Get the DBIR report at https://www.verizon.com/business/resources/T157/reports/2023-data-breach-investigations-report-dbir.pdf

gcluley, to random
@gcluley@mastodon.green avatar

Bad enough for your company to be held to ransom after a cyber attack.

Worse still to then have one of your own employees exploit the attack in an attempt to steal the ransom for themselves...

Read more in my article on the Tripwire blog: https://www.tripwire.com/state-of-security/rogue-it-security-worker-failed-cover-his-tracks

gcluley, to random
@gcluley@mastodon.green avatar

Six years prison for ex-Ubiquiti staffer who stole data and attempted to extort millions of dollars.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/six-years-prison-for-ex-ubiquiti-staffer-who-stole-data-and-attempted-to-extort-millions-of-dollars/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • kavyap
  • DreamBathrooms
  • modclub
  • magazineikmin
  • InstantRegret
  • khanakhh
  • thenastyranch
  • Youngstown
  • rosin
  • slotface
  • Durango
  • ngwrru68w68
  • ethstaker
  • JUstTest
  • mdbf
  • tacticalgear
  • tester
  • osvaldo12
  • GTA5RPClips
  • everett
  • cisconetworking
  • cubers
  • megavids
  • normalnudes
  • anitta
  • Leos
  • lostlight
  • All magazines