Sat.Oct 29, 2022

article thumbnail

Weekly Update 319

Troy Hunt

Geez we've been getting hammered down here: Optus, MyDeal, Vinomofo, Medibank and now Australian Clinical Labs. It's crazy how much press interest there's been down here and whilst I think some of it is a bit hyperbolic, bringing the issue to the forefront and ensuring it's being discussed is certainly a good thing. Anyway, let's see what happens between now and next week's video, at this rate there'll be at least one more major Aussie breach to talk about!

IoT 209
article thumbnail

New open-source tool scans public AWS S3 buckets for secrets

Bleeping Computer

A new open-source 'S3crets Scanner' scanner allows researchers and red-teamers to search for 'secrets' mistakenly stored in publicly exposed or company's Amazon AWS S3 storage buckets. [.].

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A massive cyberattack hit Slovak and Polish Parliaments

Security Affairs

The Slovak and Polish parliaments were hit by a massive cyber attack, and the voting system in Slovakia’s legislature was brought down. A massive cyber attack hit the Slovak and Polish parliaments, reported the authorities. The cyber attack brought down the voting system in Slovakia’s legislature. “The attack was multi-directional, including from inside the Russian Federation,” reads a statement published by the Polish Senate.

article thumbnail

Microsoft releases out-of-band updates to fix OneDrive crashes

Bleeping Computer

Microsoft has released out-of-band updates today to address a known issue causing OneDrive and OneDrive for Business to crash after installing recent Windows 10 updates. [.].

141
141
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Twilio Reveals Another Breach from the Same Hackers Behind the August Hack

The Hacker News

Communication services provider Twilio this week disclosed that it experienced another "brief security incident" in June 2022 perpetrated by the same threat actor behind the August hack that resulted in unauthorized access of customer information.

Hacking 118
article thumbnail

Cisco Secure Workload: Policy-as-Code Is a Win-Win for Everyone

Cisco Security

The last few years have proved to be a catalyst for digital transformation for many of our enterprise customers. Application modernization and adopting multicloud are the foundational building blocks for digitizing business. Customers employ CI/CD (continuous integration, continuous delivery) to modernize their applications, building them on a cloud infrastructure.

More Trending

article thumbnail

China Operates Secret ‘Police Stations’ in Other Countries

WIRED Threat Level

Plus: The New York Post gets hacked, a huge stalkerware network is exposed, and the US claims China interfered with its Huawei probe.

Hacking 100
article thumbnail

Azure CLI Code Injection CVE-2022-39327 hits 9.8/10 CVSS score

Security Boulevard

The most recent Azure CLI Code Injection vulnerability is a rare and dangerous case. It’s not often that the most popular cloud platform client is vulnerable to such critical issues as code injection. Regardless overall high risk of injections by OWASP Top 10 and OWASP API Security Top 10, code injections are not common for [.]. The post Azure CLI Code Injection CVE-2022-39327 hits 9.8/10 CVSS score appeared first on Wallarm.

Risk 80
article thumbnail

Chrome issues urgent zero-day fix – update now!

Naked Security

We've said it before/And we'll say it again/It's not *if* you should patch/It's a matter of *when*. (Hint: now!).

108
108
article thumbnail

BSidesLV 2022 Lucky13 I Am The Cavalry (IATC) – ‘STUFF Is On Fire – A Panel: David Batz. Meg West, Lisa Young, Dean Ford, Bryson Bort, Liz Wharton’

Security Boulevard

Our sincere thanks to BSidesLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesLV 2022 Lucky13 I Am The Cavalry (IATC) – ‘STUFF Is On Fire – A Panel: David Batz. Meg West, Lisa Young, Dean Ford, Bryson Bort, Liz Wharton’ appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How will Twitter change under Elon Musk?

Security Affairs

Cybhorus CEO Pierluigi Paganini talks to TRT World about Elon Musk completing his $44 billion deal to buy Twitter and what changes he will make to the social media platform. Of course, the first impact will be on the leadership, Elon Musk was critical in the past with Agrawal’s leadership. Musk will also take action to demonstrate that his priority is to preserve free speech on Twitter.