Sat.Jun 24, 2023

article thumbnail

Weekly Update 353

Troy Hunt

This feels like a week of minor frustrations with little real world consequence but they just bugged the hell out of me. Couldn't record in my office due to a weird ground loop problem, my Home Assistant instance was unexpectedly rebooting, the Yale IoT door locks had near unprecedentedly bad UX. and then I saw Miele's IoT 😭 Other than that, everything is fine 😊 References Sponsored by: Kolide can get your cross-platform fleet to 100% compliance.

IoT 185
article thumbnail

Grafana warns of critical auth bypass due to Azure AD integration

Bleeping Computer

Grafana has released security fixes for multiple versions of its application, addressing a vulnerability that enables attackers to bypass authentication and take over any Grafana account that uses Azure Active Directory for authentication. [.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Someone is sending mysterious smartwatches to the US Military personnel

Security Affairs

U.S. Army’s Criminal Investigation Division warns that US military personnel have reported receiving unsolicited smartwatches in the mail. The U.S. Army’s Criminal Investigation Division reported that service members across the military received smartwatches unsolicited in the mail. Upon using these smartwatches, the devices automatically connected to Wi-Fi and began connecting to cell phones unprompted, gaining access to a huge quantity of user data.

Malware 98
article thumbnail

LastPass users furious after being locked out due to MFA resets

Bleeping Computer

LastPass password manager users have been experiencing significant login issues starting early May after being prompted to reset their authenticator apps. [.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

article thumbnail

American Airlines, Southwest Airlines disclose data breaches affecting pilots

Bleeping Computer

American Airlines and Southwest Airlines, two of the largest airlines in the world, disclosed data breaches on Friday caused by the hack of Pilot Credentials, a third-party vendor that manages multiple airlines' pilot applications and recruitment portals. [.

More Trending

article thumbnail

Can You Trick Malware into Believing a Production System Is a Virtual Machine?

SecureWorld News

This question arises amidst the constant battle against threats posed by malware. By tricking the malware into identifying the environment improperly, security professionals could outsmart self-termination mechanisms utilized by certain strains. This article explores this concept and examines the potential and challenges of manipulating malware into thinking it operates within a virtual machine (VM).

Malware 69
article thumbnail

Update Your iPhone Right Now to Fix 2 Apple Zero Days

WIRED Threat Level

Plus: Discord has a child predator problem, fears rise of China spying from Cuba, and hackers try to blackmail Reddit.

Hacking 77
article thumbnail

Avoid The Hack: 3 Best Privacy Browser Picks for Android

Security Boulevard

This post was originally published on 14 APR 2021 ; it has since been updated and revised. Most Android phones come from the factory with Google Chrome installed. As you're more than likely aware, Google Chrome is highly detrimental to your online privacy. Of the Android phones that don't, they may come with another manufacturer browser that proves non-privacy friendly and/or has questionable security.

Hacking 57
article thumbnail

Avoid The Hack: 3 Best Privacy Browsers Picks for iOS

Security Boulevard

This post was originally published on 2 APR 2021 ; it has since been updated and revised. Unfortunately, it's difficult - if not impossible - to delete Safari on a regular iPhone. However, with iOS 14 and later , users are free to change the default browser on their iPhones - opening the door for users to make the most out of privacy browsers available for iOS.

Hacking 57
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

BSidesSF 2023 – Sam Manzer, Mike Parowski – The Best Defense Is A Great Offense: Leveraging Automated OffSec To Build Proactive C2 Detections

Security Boulevard

Our thanks to BSidesSF for publishing their presenter’s superlative BSidesSF 2023 content on the organizations’ YouTube channel. Permalink The post BSidesSF 2023 – Sam Manzer, Mike Parowski – The Best Defense Is A Great Offense: Leveraging Automated OffSec To Build Proactive C2 Detections appeared first on Security Boulevard.