gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

There’s a Bing ding dong, after Microsoft over-enthusiastically encourages Chrome users to stop using Google, and silence hits the British Library as it shares its story of a ransomware attack. Yes, it’s a new “Smashing Security” podcast with me and Carole Theriault.

Thanks to Kolide by 1Password, Vanta, and Kiteworks for supporting this episode!

https://grahamcluley.com/smashing-security-podcast-364/

br00t4c, to random
@br00t4c@mastodon.social avatar

Fujitsu says it found malware on its corporate network, warns of possible data breach

https://arstechnica.com/?p=2010974

br00t4c, to random
@br00t4c@mastodon.social avatar

Fujitsu reveals malware installed on internal systems, risk of customer data spill

https://go.theregister.com/feed/www.theregister.com/2024/03/18/fujitsu_malware_data_breach/

remixtures, to Bulgaria Portuguese
@remixtures@tldr.nettime.org avatar

: "Now, when push has come to shove, policymakers at the European Union (EU) must act to ban spyware in Europe. Yesterday, the media reported a major attack on EU democracy with members of the European Parliament Defense Committee being the target of phone hacking. Intrusions of this kind pose a threat to democracy by interfering with electoral and decision-making processes and undermining the integrity of the public debate.

But such intrusions into privacy are nothing new. Journalists, human rights defenders and activists have been targeted for years by states with surveillance malware like Pegasus. Our democracies hinge on EU policymakers’ responsibility to create a protective EU-wide framework against spyware. With the 2024 elections approaching, will the EU politicians make the obvious choice of putting the safety of people and the integrity of our democracy first by banning spyware?" https://edri.org/our-work/press-release-brussels-rocked-by-major-spyware-scandal-urgent-call-for-ban/

TechDesk, to Cybersecurity
@TechDesk@flipboard.social avatar

Personal data and customer information may have been stolen from Japanese tech giant Fujitsu after it reported a cyberattack. The company is currently investigating how its network was compromised by malware.

https://flip.it/0yWCd9

#Cyberattack #Cybersecurity #Malware #OnlineSafety #Fujitsu

KrzysztofKolacz, to AppleInc Polish

Apple chwali się, jak szczelny jest App Store pod kątem niedopuszczania do systemowego sklepu z aplikacjami tych, które służą oszustwom. No nie do końca, co pokazuje przykład scamerskiego portfela bitcoinów.

Na moich oczach z kont zostało pobranych 150 tys. USD po tym, jak wprowadziłem swoją frazę seed do tej fałszywej aplikacji z Apple Store. Nie mogę uwierzyć, że Apple pozwala na takie aplikacje w swoim App Store!d

– pisze jedna z osób, które padły ofiarą aplikacji Bitcoin Wallet – BTC Vault, na łamach Haker News.

https://imagazine.pl/wp-content/uploads/2024/03/BTC-Vault.png

Firma stojąca za nią nimi jest zarejestrowana w Nowej Zelandii, w przypadkowym Airbnb.

Cele atakujących są osoby przesiadające się z Androida na iOS (tzw. switcherzy). Po przeniesieniu wszystkich aplikacji chcą oni przenieść także swoje bitcoiny z androidowego portfela na jakiś odpowiednik w iOS.

Wpisałem frazę „portfel bitcoin” w Apple App Store, zainstalowałem pierwszą aplikację, którą zobaczyłem (wyglądała legalnie), przelałem bitcoiny i natychmiast zostały one wysłane donikąd. Okazuje się, że ta aplikacja została wcześniej zgłoszona co najmniej 12 dni temu jako oszustwo!

– relacjonuje kolejny poszkodowany. Mowa o zgłoszeniu na tym Reddit. Apple przez 12 dni zatem nic z tym zgłoszeniem nie zrobiło, a aplikacja wyświetlana jest (nadal!) jako pierwsza rekomendacja. Wyprzedzając inne, dobrze znane na rynku krypto portfele, jak binance, blockchain.com i coinbase.

Chętnie przeczytałbym komentarz Apple w tej sprawie.

https://imagazine.pl/2024/03/18/apple-dopuscilo-do-app-store-falszywa-aplikacje-okradajaca-ludzi/

image/png

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar
tuneintodetuned, to EldenRing Spanish
@tuneintodetuned@mastodon.social avatar

Confirmado.
No juguéis a nada que use a menos que podáis deshabilitarlo y jugar por LAN como hicimos nosotros en .
Easy Anti-Cheat (en declive desde que fue comprado por ) ha sido demostrado como vulnerable a ejecución de código remoto durante el último torneo de , que ha quedado suspendido. Esto implica que se puede instalar sin vuestro consentimiento al estar jugando en una partida "protegida" por Easy Anti-Cheat.

https://www.ign.com/articles/apex-legends-global-series-tournament-abandoned-after-pros-hacked-mid-match

xro, to ads
@xro@chaos.social avatar

What's the problem with #ads and #advertisement?

  • ads are information
  • ads are intentionally incorrect and misleading
  • ads are ubiquitous available information, to the point of being actively PUSHED onto every human reachable.
  • for many people who don't actively seek other sources, it is the main source of information.

That"s not a good basis for a #democracy where informed citizens are supposed to make good decisions.

publicvoit,
@publicvoit@graz.social avatar

@xro At least on the web, #malware gets distributed via the #advertisement propagation channels.

Therefore, an #adblocker + #NoScript add-on are mostly not for personal convenience but rather an important security feature.

As a side-effect, the web is faster and easier to consume without ads.

#security #ads

xro,
@xro@chaos.social avatar

@publicvoit

I was actually mainly thinking about TV ads, billboards, analog newspaper ads, mailbox leaflets or whole papers that pretend to be a newspaper but are in reality a big ad, 😅

since thanks to AdBlockers, WebAds have seized to be a problem for me.

But you are right, the WWW without AdBlockers is a dangerous and unusable mess. At least here on the Web we have a technical solution against ads.

#malware #advertisement #adblocker #NoScript #security #ads

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

LockBit affiliate Mikhail Vasiliev jailed for almost four years after guilty plea.

Read more in my article on the Tripwire blog: https://www.tripwire.com/state-of-security/lockbit-affiliate-jailed-almost-four-years-after-guilty-plea

YourAnonRiots, to github Japanese
@YourAnonRiots@mstdn.social avatar

🚨 Alert: A new phishing campaign uses a Java-based downloader to distribute VCURMS & STRRAT RATs, leveraging public services like AWS & for hosting.

https://thehackernews.com/2024/03/alert-cybercriminals-deploying-vcurms.html

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

Tools of the Trade: Anti- scanning, WAFs, and sandboxing alone aren't sufficient for protecting against malicious uploads.

https://thehackernews.com/2024/03/demystifying-common-cybersecurity-myth.html

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

⚠️ Hackers are getting faster! Magnet Goblin, a threat group known for fast exploitation of 1-day vulnerabilities, targets edge devices & public servers to deploy like Nerbian RAT.

https://thehackernews.com/2024/03/magnet-goblin-hacker-group-leveraging-1.html

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🔒Alert: Cybercriminals weaponizing vulnerabilities in JetBrains TeamCity software to deploy BianLian for extortion attacks.

https://thehackernews.com/2024/03/bianlian-threat-actors-exploiting.html

YourAnonRiots, to infosec Japanese
@YourAnonRiots@mstdn.social avatar

⚠️ Beware of fake DocuSign emails – they're designed to trick you into downloading the New CHAVECLOAK Android banking .

What it does:

  • Hijacks your screen
  • Logs your keystrokes
  • Uses fake pop-ups to capture your banking logins

https://thehackernews.com/2024/03/new-banking-trojan-chavecloak-targets.html

blogdiva, to tv
@blogdiva@mastodon.social avatar

ok, so my sons bought a heavily discounted "smart" last xmas. a TCL with Roku plastered all over the box.

is there a way to root these tvs and wipe their OS?

https://www.wired.com/story/roku-terms-of-service-update-locks-tv/

rooting and changing the OS of smart anything, especially phones, need to be at the center of the right to repair movement, not just getting access to software drivers or hardware.

PS: i have avoided activating the Roku nonsense exactly for what the article describes.

btaroli,
@btaroli@federate.social avatar

@blogdiva This all and bullshit. These huge “smart” TVs are so cheap, but that’s only because they’re burdened with and . Try pricing a “dumb” display at that size.

Then you realize this is like an ISP renting you their hardware at a discount or charging you four times more every month to bring your own. There’s a reason they want their device in your home and it’s not a benefit to you. So they create financial give to make you do it. !

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Alert: Chinese #EvasivePanda (also known as Daggerfly) is targeting Tibetans with watering hole attack and Nightdoor backdoor globally.

https://hackread.com/chinese-evasive-panda-tibetan-nightdoor-backdoor/

#CyberSecurity #Tibet #China #CyberAttack #Malware

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Threat actors used QEMU emulator to create stealthy network tunnels during a recent , bypassing traditional security defenses with sophisticated tactics.

https://thehackernews.com/2024/03/cybercriminals-utilize-qemu-emulator-as.html

pypi, to random
@pypi@fosstodon.org avatar

PyPI now has an improved way to report , via itself! Available on web and preview beta API. Learn more and sign up to help test:

https://blog.pypi.org/posts/2024-03-06-malware-reporting-evolved/

YourAnonRiots, to random Japanese
@YourAnonRiots@mstdn.social avatar

hackers exploit ConnectWise ScreenConnect vulnerabilities (CVE-2024-1708 & CVE-2024-1709) to deploy TODDLERSHARK malware, adding to the notorious Kimsuky arsenal alongside BabyShark and ReconShark.
https://thehackernews.com/2024/03/hackers-exploit-connectwise.html

YourAnonRiots, to cryptocurrency Japanese
@YourAnonRiots@mstdn.social avatar

🚨 New campaign targets misconfigured servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis to deliver miners and enable remote access.

https://thehackernews.com/2024/03/hackers-exploit-misconfigured-yarn.html

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar
kubikpixel, to python
@kubikpixel@chaos.social avatar

:python: Lazarus Exploits Typos to Sneak PyPI into Systems:
The notorious 'n state-backed hacking group Lazarus uploaded four packages to the Package Index () repository with the goal of infecting 'er systems with malware.

😁 https://thehackernews.com/2024/02/lazarus-exploits-typos-to-sneak-pypi.html

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • GTA5RPClips
  • magazineikmin
  • mdbf
  • everett
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • thenastyranch
  • cisconetworking
  • kavyap
  • ethstaker
  • DreamBathrooms
  • JUstTest
  • khanakhh
  • tacticalgear
  • osvaldo12
  • Durango
  • ngwrru68w68
  • tester
  • cubers
  • normalnudes
  • modclub
  • provamag3
  • Leos
  • anitta
  • lostlight
  • All magazines