ESET buys 18 corporate routers, over half contain "a treasure trove of sensitive data... including corporate credentials, VPN details, cryptographic keys, and more."
Seems a surprising number of organizations don't have robust hardware decommissioning policies in place, or are overlooking network infrastructure equipment.
This is a great series of articles by security researcher Mike Kuketz that documents the data transmission behavior of popular web browsers on their default settings, examining the type of connections they make and what data they "phone home" with:
Interesting analysis of Chinese and Russian influence operations through the lens of the recent DOJ indictments. Details include tutorials on how to setup accounts on multiple social networks, tools to gain followers, and measures on how to avoid platform detection.
I had an iPhone and an MacBook both on iCloud and keychain synced.
I then logged out from iCloud on both, wiped them and sold them.
I then bought a new iPhone and MacBook and logged in to my iCloud account, used the same passcode on my devices and all my keychain data was still there!
According to Apples documentation the keychain should be wiped off the servers when all devices logout.
(I had two Apple TVs logged in to my account the whole time, but they don’t have access to the keychain from what I understand).
📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #16/2023 is out! It includes, but not only:
-EvilExtractor #malware activity spikes in Europe and the U.S.
-North Korean #3CX Hackers Also Hit Critical Infrastructure Orgs
-China building cyberweapons to hijack enemy satellites, says US leak
-#GitHub Announces New Security Improvements
-Air Force Unit in Document Leaks Case Loses Intel Mission
-Russian hackers exfiltrated data from from #Capita over a week before outage
-#Lazarus hackers now push Linux malware via fake job offers
-3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible
-#Fortra shares findings on #GoAnywhere MFT zero-day attacks
-#Google TAG Warns of Russian Hackers Conducting Phishing Attacks in #Ukraine
-Google patches another actively exploited #Chrome zero-day
-#Microsoft: Iranian hackers behind retaliatory cyberattacks on US orgs
-#Goldoson#Android Malware Infects Over 100 Million Google Play Store Downloads
-Takedown of GitHub Repositories Disrupts RedLine Malware Operations
-Microsoft has shifted to a new naming taxonomy for threat actors
-#YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader
-#Apple’s high security mode blocked NSO #spyware, researchers say
-#Trigona#Ransomware Attacking MS-SQL Servers
-#WhatsApp and other encrypted messaging apps unite against UK law plan
-Mom Says Daughter's Voice Was Cloned with AI in $1 Million Kidnapping #Hoax
-#LockBit ransomware encryptors found targeting Mac devices
📚 This week's recommended book is "Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software" by Michael Sikorski and Andrew Honig.
Subscribe to the #newsletter to have it piping hot in your inbox every Sunday ⬇️
#introductions
Hello, I am new to #calckey but been in the fediverse for a bit now. I grew up playing A Link to the Past, watching Ninja Turtles and Mummies Alive and I am now an adult person who works in #infosec and also still really enjoys Ninja Turtles and Zelda games. I also enjoy baking, cooking and traveling whenever possible.
For the most part, I think online #software updates are a fine thing. New features, #security fixes, all good stuff.
But it needs a good UX. Download updates in the background. Apply them in off hours when the user isn't doing anything. Give users control to opt out or suspend them.
The easy availability of online update mechanisms, in a way, drives the demand for constant, new product features.
A program that's fit for purpose doesn't need updates.
Long ago I was in the "turn off windows updates" entirely camp. I'm now in #infosec and I try to stay current and update all the things. Patching is important, and by and large, many vendors have gotten better about stability in patches.
But I do wish feature updates and security updates were better differentiated.
I've just registered with a professional organisation and received, in clear, my user details, including the password they generated for me. Along with the text:
"To maintain this security, you cannot change your password and we have no means of retrieving lost passwords."
Two months after we raised the alarm about fake authenticator apps, rogue apps continue to dominate top search results on both the App Store and Google Play --including the app sending #2FA seeds remotely. A recent podcast by @nakedsecurity reveals. #InfoSec#Cybersecurity#Privacy#Security