Security Leftovers
-
Apple patches zero-day kernel hole and much more – update now! [Ed: Apple did not patch this until it was publicly known that it had been exploited]
The bug fixes for iPhones and iPads include remote code execution flaws (RCEs) in components from the kernel itself to Apple’s image rendering library, graphics drivers, video processing modules and more. Several of these bugs warn that “a malicious application may be able to execute arbitrary code with kernel privileges”. That’s the sort of security hole that could lead to a complete device takeover – what’s known in the jargon as a “jailbreak“, because it escapes from Apple’s strict lockdown and app restrictions.
-
Creating our own password manager
We can manage a range of passwords by creating our own password manager using the bash commandline available in popular GNU/Linux operating systems. The GNU/Bash Shell is readily available in Ubuntu/Debian based Linux systems. They can be launched using the terminal application (with the shortcut Ctrl+Alt+T).
-
Conti presses Costa Rica. Bluetooth LE proof-of-concept. Making initial access more difficult. Cyber phases of hybrid wars. [Ed: Costa Rica pays a huge price for being penetrated by Microsoft]
Reuters reports that the number of Costa Rican organizations affected by Conti's ransomware attack has now grown to twenty-seven. Recently elected President Rodrigo Chaves has said that nine institutions, most of them governmental, were heavily affected, and that the attacks were having an "enormous" impact on foreign trade and tax collection. The governments of Israel, the United States and Spain are all providing Costa Rica with assistance in recovery and remediation, but a lot of work remains to be done.
-
Fantastic Open Source Cybersecurity Tools and Where to Find Them [Ed: Ironically, one must run unsafe proprietary software just to open this article]
-
Venezuelan cardiologist charged with 'designing and selling ransomware' [Ed: Microsoft Windows]
The US Attorney’s Office has charged a 55-year-old cardiologist with creating and selling ransomware and profiting from revenue-share agreements with criminals who deployed his product.
A complaint [PDF] filed on May 16th in the US District Court, Eastern District of New York, alleges Moises Luis Zagala Gonzalez – aka “Nosophoros,” “Aesculapius” and “Nebuchadnezzar” – created a ransomware builder known as “Thanos”, and ransomware named “Jigsaw v. 2”.
The self-taught coder and qualified cardiologist advertised the ransomware in dark corners of the web, then licensed it ransomware to crooks for either $500 or $800 a month, it is claimed. He also ran an affiliate network that offered the chance to run Thanos to build custom ransomware, in return for a share of profits, it is alleged.
-
Firefox out-of-band update to 100.0.1 – just in time for Pwn2Own? [Ed: Bloated browsers beget impossible security?]
-
How crooks backdoor sites and scrape credit card info • The Register
In a paper scheduled to appear at the Usenix '22 security conference later this year, authors Asuman Senol (imec-COSIC, KU Leuven), Gunes Acar (Radboud University), Mathias Humbert (University of Lausanne) and Frederik Zuiderveen Borgesius, (Radboud University) described how they measured data handling in web forms on the top 100,000 websites, as ranked by research site Tranco. ®
-
Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware [Ed: Microsoft Windows]
There also is a custom hash-cracking system that "stores cracked hashes, updates threat actors on the cracking status and shows the results of cracking attempts on other servers," the threat hunters wrote. The software claims it can crack a broad array of common hash types, including LM:NTLM hashes, cached domain credentials, Kerberos 5 TGS-REP/AS-REP tickets, KeePass files, and those used for MS Office 2013 documents.
-
Pentester pops open Tesla Model 3 using low-cost Bluetooth module
Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.
Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.
-
Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks
-
India slightly softens infosec incident reporting rules • The Register
India has slightly softened its controversial new reporting requirements for information security incidents and made it plain they apply to multinational companies.
The rules were announced with little advance warning in late April and quickly attracted criticism from industry on grounds including the requirement to report 22 different types of incident within six hours, a requirement to register personal details of individual VPN users, and retention of many log files for 180 days.
-
How to choose a certificate management tool
Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.
-
OpenSSF Helping to Secure Open Source Software [Ed: No, it is mostly a marketing (openwashing) facade for proprietary software companies that actively insert back doors into things and strive to centralise everything around themselves under the guise of "security"]
-
Sigstore Sets Out to Secure Cloud-Native Supply Chain [Ed: No, this is about outsourcing trust and centralising it around Pentagon-connected companies in the name of so-called 'security' (it's censorship of software)]
-
SBOM Everywhere: The OpenSSF Plan for SBOMs [Ed: Missing disclosure here about LF paying for puff pieces about its programs and schemes]
-
Patch your VMware gear now – or yank it out, Uncle Sam tells federal agencies [Ed: When VMWare points the finger at Linux it's a deflection tactic]
-
Malicious PyPI package opens backdoors on Windows, Linux, and Macs [Ed: It's not an OS issue but an issue of people installing malware on their OS]
- Login or register to post comments
- Printer-friendly version
- 2176 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago