I know I haven't posted one lately, but some might want a refresher, some might be new to it.
Use a password manager.
Most account compromises occur because a username/password combination was lifted off one breach and tried (successfully) on another site.
A pwd manager mitigates this because it can generate a unique password for each site and stores it so you don't have to remember hundreds of passwords: just 2. One for your computer, one for your pwd manager.
New type of supply chain attack:
Compromise a subcontractor, forcing a very expensive entire re-write of software.
https://www.theregister.com/2020/11/12/china_compromised_f35_software_claim/
Old and busted: ransomware
New Hotness: ransomware gangs taking out facebook ads attempting to shame victims into paying
https://gizmodo.com/ransomware-hackers-helpfully-take-out-facebook-ads-to-r-1845654984
Well, this is scary.
I had [incorrectly] assumed to get a blue check, you had to have 2FA turned on.
Apparently, The president had neither a strong password or 2FA.
Phone camera isn't working.
everything I read points to a hard reset as the probable fix.
But that means I have to go through and transfer a whole bunch of 2FA codes.
I was using Google Authenticator.... What's a good OTP app that survives resets?
so.,.. Barnes & Noble fell to a cybersecurity attack and it reads like it was a ransomware attack.
For the love of everything you hold dear.... just don't open emails these days.
or slack messages from ppl you don't know.
or links in text messages even if you do know them.
Iranian APT: "We'll hack all the things!"
"Let's record us doing it too!"
"Where are going going to put the recording?"
"Put it on the AWS server with the stuff we hacked."
"BTW, did you ever password protect that server?"
"..."
"..."
"wormable" Windows DNS Server vulnerability found.
so uh... network peeps...
patch your F5s if you have any.
(you can do the research yourself for why, but the exploit is under 280 characters)
other things have had connectivity pasted on:
Printers are a prime example. They have an unpatched apache browser baked in.
These make it nice and easy to set up, but they should not be allowed to accept connections from outside your home.
Please consult your device manuals and make sure you limit your home's internet footprint to only what you need.
This... this is horrible
https://nymag.com/intelligencer/2020/06/what-its-like-to-get-doxed-for-taking-a-bike-ride.html
And if I can use this as an example of why you need to stay safe online: Make sure you know what you're posting publicly, and better yet, make sure it can't be traced back to you, even if you aren't in danger normally or aren't doing anything wrong. Internet trolls and vigilantes don't bother checking facts before attacking.
I know @BlackRabbit has posted about similar situations, so listen to him.
When you terminate employees, make sure you also rotate the passwords if the access to infrastructure cannot be locked behind a firewall or active directory SSO.
https://gizmodo.com/workers-at-hollywood-reporter-and-billboard-vandalize-w-1842875053
popping in quickly and leaving just as quick
If anybody wants to hone or learn some #CoSoSec skills, you may want to sign up for OWASP virtual training:
kthnxby
IC signing back off.
Just a #CoSoSec reminder, if you get a link that was "mistakenly" sent to you about a "secret" stash, or "completing your order" of PPE that you can get by clicking a link/going somewhere....
it's a trap.
Sorry if this is a duplicate but...
The CDC does NOT go door to door to conduct tests, surveys, or investigations.
Nor does the CDC call you on the phone randomly.
If this happens to you, do not give out your personal information, and contact authorities as soon as you can.
“If you’re innocent, that doesn’t mean you can’t be in the wrong place at the wrong time, like going on a bike ride in which your GPS puts you in a position where police suspect you of a crime you didn’t commit,” McCoy said.
Just like everything that captures the attention of a large percentage of the world, criminals are using the Covid news to phish and spread malware.
(via @Kronykal on twitter)