2

Catalin Cimpanu (@[email protected]) - Mastodon

 6 months ago
source link: https://mastodon.social/@campuscodi
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Catalin Cimpanu (@[email protected])

Prank your future self by wasting your life

Did you ever believe that Hunter Biden took a #laptop full of incriminating information into a computer repair shop and abandoned it there? That the repair shop decided to examine its contents and transmit them to Rudy Giuliani and Steve Bannon?

Of course not. Because you have more common sense than reporters and editors at every major news organization.

The whole thing was a Russian disinformation op, in partnership with the GOP. And it's ongoing. Where's the press?

https://talkingpointsmemo.com/edblog/a-bigger-story-than-you-can-possibly-imagine/sharetoken/hLZyeijgDqrO

b8b20988f0925ebf.png

Amazon, Trader Joe’s, and SpaceX are all fighting in court to have the NLRB declared unconstitutional.

All three companies have a disgraceful history of worker abuse and union busting.

They can’t stop workers from organizing, so now they want to destroy the whole system.

Did I mention that the data broker industry must be destroyed? Because yeah.

journalism is fun because not only are you paid in pocket lint and nickels all of your work can (and probably will) be instantaneously vaporized by a trust fund brat

56d27e70e9a64e3b.jpg

DevSecOps platform Boost Security has published a new project named LOTP (Living Off the Pipeline).

The project lists development tools (typically CLIs), commonly used in CI/CD pipelines, that have lesser-known RCE-by-Design features.

The project is similar to other initiatives that track benign tools that can be abused for attacks on Windows (LOLBAS, LOLDrivers, and LOFLCAB), Linux (GTFOBins), and macOS (LOOBins).

https://boostsecurityio.github.io/lotp/

ClearSky and SentinelLabs have discovered a new wave of Russian information warfare campaign named DoppelgĂ€nger NG. DoppelgĂ€nger is a global information warfare campaign publishing false information on hundreds of fake websites and social media channels. Their research revealed that “DoppelgĂ€nger NG” is again fully operational in 2024, using new infrastructure. They also found a link between the “DoppelgĂ€nger NG” Campaign and the Russian state-sponsored APT28 (Fancy Bear). IOC provided.
🔗https://www.clearskysec.com/dg/

cc: @campuscodi

VulnCheck's Jacob Baines has discovered that a recent vulnerability disclosed in Zyxel firewalls by SSD researchers is actually an older bug tracked as CVE-2023-33012.

"The associated disclosure did not mention any caveats to exploitation, but it turns out only an uncommon configuration is affected. There are currently about 600 internet-facing Zyxel firewalls vulnerable to this issue (out of ~26,000)."

There is no evidence of exploitation in the wild.

https://vulncheck.com/blog/zyxel-cve-2023-33012

3497a976d991ce9e.png

in the spirit of transparency, here’s our response to CISA’s RFI on Secure by Design: https://kellyshortridge.com/papers/CISA-2023-0027-Shortridge-Sensemaking.pdf

SbD should not incentivize lip service or #security theater. It should not be at odds with business goals.

So, @rpetrich and I wrote what SbD should be and not be.

We hope mastonerds especially appreciate our recommendations in Section 1.2.1 for how #software teams can start investing in SbD while supporting velocity, dev productivity, & reliability.

blog: https://kellyshortridge.com/blog/posts/rfi-secure-by-design-response/

Kemp Technologies has published a security update for its LoadMaster load balancer appliance.

The update fixes a critical security flaw that allows threat actors to access the device's management interface. Kemp says attackers can take over devices via malicious API commands. No authentication required.

The vulnerability is tracked as CVE-2024-1212. (cc @simontsui)

https://support.kemptechnologies.com/hc/en-us/articles/23878931058445-LoadMaster-Security-Vulnerability-CVE-2024-1212

French security firm Sekoia has published a report looking at the evolution of the Scattered Spider group and all its connections and infosec codenames—0ktapus (Group-IB), Scatter Swine (Okta), UNC3944 (Mandiant), Octo Tempest (previously Storm-0875, Microsoft), Star Fraud (SentinelOne), Muddled Libra (Unit42) and others.

https://blog.sekoia.io/scattered-spider-laying-new-eggs/

Chart showing reporting on Scattered Spider activity

New communications research spanning 30 countries across 6 continents confirms most online hostility is caused by status-seeking assholes who are also assholes in meat-space.

Additionally, they're more likely to emerge from environments with political or economic inequality.

https://osf.io/preprints/psyarxiv/spkyz


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK