Sat.Dec 23, 2023

article thumbnail

Weekly Update 379

Troy Hunt

It's that time of the year again, time to head from the heat to the cold as we jump on the big plane(s) back to Europe. The next 4 weekly updates will all be from places of varying degrees colder than home, most of them done with Scott Helme too so they'll be a little different to usual. For now, here's a pretty casual Christmas edition, see you next week from the other side 🙂 References Sponsored by: Unpatched devices keeping you up at night?

Mobile 234
article thumbnail

CVE-2023-51385 and CVE-2023-6004 – A Dual OpenSSH Threat

Penetration Testing

OpenSSH, a critical component in secure networking, has recently faced a formidable challenge. A now-patched security vulnerability, with a CVSS score of 9.8, threatened the very core of its secure channel operations. Identified as... The post CVE-2023-51385 and CVE-2023-6004 – A Dual OpenSSH Threat appeared first on Penetration Testing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit ransomware gang claims to have breached accountancy firm Xeinadin

Security Affairs

The LockBit ransomware claims to have hacked accountancy firm Xeinadin threatens to leak the alleged stolen data. The LockBit ransomware claims responsibility for hacking the Xeinadin accountancy firm and threatens to disclose the alleged stolen data. Xeinadin has over 60,000 clients across the UK and Ireland. In 2021, a significant endorsement came from Exponent, one of the leading private equity investors in the UK, propelling the firm to become one of the top 20 accountancy firms in the count

article thumbnail

‘Wall of Flippers’ detects Flipper Zero Bluetooth spam attacks

Bleeping Computer

A new Python project called 'Wall of Flippers' detects Bluetooth spam attacks launched by Flipper Zero and Android devices.

140
140
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Mobile virtual network operator Mint Mobile discloses a data breach

Security Affairs

Mobile virtual network operator Mint Mobile suffered a new data breach, threat actors had access to customers’ personal information. Mint Mobile experienced a recent data breach, exposing customers’ personal information to unauthorized access by threat actors. Mint Mobile is a mobile virtual network operator (MVNO) that offers prepaid mobile phone services.

Mobile 114
article thumbnail

CVE-2023-50254 – Deepin-Reader Flaw: A Shortcut to Remote Command Execution

Penetration Testing

Deepin Linux, renowned for its beauty and simplicity, is a hallmark of open-source technology. Developed by a talented Chinese team, it promises a user-friendly, secure, and stable experience. The default document reader in Deepin Linux,... The post CVE-2023-50254 – Deepin-Reader Flaw: A Shortcut to Remote Command Execution appeared first on Penetration Testing.

More Trending

article thumbnail

USENIX Security ’23 – ‘“It’s The Equivalent of Feeling Like You’re In Jail”: Lessons From Firsthand & Secondhand Accounts Of IoT-Enabled Intimate Partner Abuse’

Security Boulevard

Full Presenter List: Sophie Stephenson, Majed Almansoori, Pardis Emami-Naeini, Rahul Chatterjee Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

IoT 62
article thumbnail

Group Therapy – security and privacy in Facebook groups

Security Boulevard

Having found myself roped into assisting as co-administrator a couple of Facebook groups with security/privacy issues, I thought I should, perhaps, share what little I know about defending your group against scam and spam posts and comments by tightening up group settings. Caveat: I’ve never really wanted to spend a lot of time administering Facebook […] The post Group Therapy – security and privacy in Facebook groups appeared first on Security Boulevard.

Scams 57
article thumbnail

Best Practices in Multi-Factor Authentication for Enhanced Security

Security Boulevard

Imagine standing at the entrance to a vault where your most valuable possessions are stored. The door doesn’t open with just one key; you need several to unlock it. That’s the essence of multi-factor authentication (MFA) in a nutshell. Instead of a single password, MFA requires multiple proofs of identity to grant access to digital … Best Practices in Multi-Factor Authentication for Enhanced Security Read More » The post Best Practices in Multi-Factor Authentication for Enhanced Security appeare