Zum Inhalt der Seite gehen

Suche

Beiträge, die mit SECURITY getaggt sind


Be careful of misleading security claims by hosting companies: US FTC cracks down on GoDaddy


Red colour background with word GoDaddy in white font
The Federal Trade Commission (FTC) will require web hosting giant GoDaddy to implement basic security protections, including HTTPS APIs and mandatory multifactor authentication, to settle charges that it failed to secure its hosting services against attacks since 2018.

FTC says the Arizona-based company’s claims of reasonable security practices also misled millions of web-hosting customers because GoDaddy was instead “blind to vulnerabilities and threats in its hosting environment” due to its failings to implement standard security tools and practices.

The big problem is the company claimed to have robust security measures in place, but lots of basic security practices were found not to be in place, and they had multiple major security breaches over time.

According to a proposed settlement order, the FTC will require GoDaddy to establish a robust information security program and prohibits the company from misleading customers about its security protections. The order also mandates that GoDaddy hire an independent third-party assessor to conduct biennial reviews of its information security program.

It really appears that this was almost tantamount to fraud — where you promise something in writing to customers, but in fact, that is not what you are delivering behind the scenes.

Hopefully it is a major wakeup call to other hosting providers. Promise what you are delivering on, and don’t promise what you are not doing. It is really as simple as that. Independent security audits are certainly a desirable practice to have in place, along with how regularly it is performed.

See https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices
#Blog, #security, #technology, #vulnerabilities


GmsCompatConfig version 153 released:

https://github.com/GrapheneOS/platform_packages_apps_GmsCompat/releases/tag/config-153

See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.

Forum discussion thread:

https://discuss.grapheneos.org/d/19423-gmscompatconfig-version-153-released

#GrapheneOS #privacy #security #gmscompat


How Barcelona became an unlikely hub for spyware startups

Having Barcelona become a crucial regional outpost for offensive cybersecurity companies puts the spyware problem squarely on the doorstep of Europe, which has a fractious relationship with surveillance tech, due to scandals in Cyprus, Greece, Hungary, and Poland — all involving Israeli spyware makers.

#Barcelona #spain #israel #spyware #startups #business #malware #security #cybersecurity #privacy #surveillance

https://techcrunch.com/2025/01/13/how-barcelona-became-an-unlikely-hub-for-spyware-startups/


WP3.XYZ Malware attacks Add Rogue Admins to 5,000+ WordPress Sites.

Webscript security company c/side discovered during an incident response engagement for one of their clients that the malicious activity uses the wp3[.]xyz domain to exfiltrate data but have yet to determine the initial infection vector.

https://cside.dev/blog/over-5k-wordpress-sites-caught-in-wp3xyz-malware-attack

#wordpress #malicious #plugin #it #security #privacy #engineer #media #tech #news


The first-ever Ransomware dropped 35 Years ago disguised as a Floppy Sharing [AIDS Information].

Thirty-five years ago, as December 1989 turned into January 1990, the then-largest ever cybercrime investigation was launched in response to the world's first known example of ransomware.

https://www.heise.de/news/Missing-Link-35-Jahre-Ransomware-am-Anfang-stand-eine-unscheinbare-Diskette-10247344.html

#ransomware #history #retrocomputing #retro #it #security #privacy #engineer #media #tech #news
This first ransomware payload was secreted on a 5.25-inch floppy disk titled "AIDS Information — Introductory Diskette 2.0" [h/t Heise.de]. The pioneering ransomware was developed by one American biologist [Dr. Joseph Lewis Andrew Popp Jr.], and about 20.000 copies were distributed to subscribers of the magazine PC Business World, various mailing lists, and even to World Health Organization delegates during a conference on AIDS.

As one may be able to deduce by the years and names being thrown around, this attack's choice of target was highly intelligent and the method of delivery exploited people's existing fears of a terrifying new biological virus at a time when knowledge of regular computer viruses was at an all-time low — much less an all-new form of malware meant to extort its victims.

Compared to modern-day threat actor attacks, only file names [not the files themselves], were encrypted by this ransomware. Thanks to this, effective software countermeasures ("AIDSOUT" to remove it and "AIDSCLEAR" to check for hidden directories combined into "CLEARAID") were developed by John Sutcliffe and Jim Bates to rescue impacted parties.


Vanadium version 132.0.6834.122.0 released:

https://github.com/GrapheneOS/Vanadium/releases/tag/132.0.6834.122.0

See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.

Forum discussion thread:

https://discuss.grapheneos.org/d/19322-vanadium-version-132068341220-released

#GrapheneOS #privacy #security #browser


From Trans Army:

For #trans people in the #US.

The US is now under a #fascist #authoritarian #regime. Here's some #safety tips.

Avoid using a mobile #phone in #conservative states. Disable #location services. Always use a #VPN. Consider all #corporate #online service to be potential #security risk.

Stock up on #hormones and #medications. Keep a bag with everything you need to #survive at least 3-5 days.


Check out my review of @GrapheneOS at 890.blog:

https://www.890.blog/post/my-thoughts-on-grapheneos

#GrapheneOS #Privacy #Security #TechReview #890Blog #OpenSource #Android


Die Signatur-Problematik bei F-Droid ist offenbar noch immer nicht gelöst: "We find it concerning that F-Droid constantly chooses to move the goalposts and continues to rely on a fundamentally broken approach for certificate pinning, merely patching [15] known vulnerabilities without ever addressing the underlying cause." 😵👇

https://github.com/obfusk/fdroid-fakesigner-poc?tab=readme-ov-file#update-2025-01-19

#fdroid #security #privacy #certpinning #signature


दिल्ली पुलिस ने कसी कमर: विधानसभा चुनाव और गणतंत्र दिवस के लिए सघन अभियान।

https://aliyesha.com/sub/articles/news/display/nd_delhi_elections_and_republic_day_vigilance

#newdelhi #delhi #india #news #press #police #elections2025 #RepublicDay2025 #security #weapons #drugs #MoneyLaundering #safety #security

Enjoy tracker free reading with us. #privacy #privacymatters


Russian Star Blizzard targets WhatsApp Accounts in new Spear-Phishing Campaign.

The cat-and-mouse game between state-sponsored Russian threat actor group’s and one of the world’s biggest technology companies has continued into 2025.

https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/

#whatsapp #phishing #campaign #it #security #privacy #engineer #media #tech #news
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victim’s WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection.

"The targets primarily belong to the government and diplomacy sectors, including both current and former officials," said Sherrod DeGrippo, director of threat intelligence strategy at Microsoft. "Additionally, the targets encompass individuals involved in defense policy, researchers in international relations focusing on Russia, and those providing assistance to Ukraine in relation to the war with Russia."
It all starts with a spear-phishing email that purports to be from a U.S. government official to lend it a veneer of legitimacy and increase the likelihood that the victim would engage with them.

The message contains a quick response (QR) code that urges the recipients to join a supposed WhatsApp group on "the latest non-governmental initiatives aimed at supporting Ukraine NGOs." The code, is deliberately broken so as to trigger a response from the victim.

Should the email recipient reply, Star Blizzard sends a second message, asking them to click on a t[.]ly shortened link to join the WhatsApp group, while apologizing for the inconvenience caused. "When this link is followed, the target is redirected to a web page asking them to scan a QR code to join the group," Microsoft explained. "However, this QR code is actually used by WhatsApp to connect an account to a linked device and/or the WhatsApp Web portal."

<https://faq.whatsapp.com/1317564962315842/?cms_platform=web>

In the event the target follows the instructions on the site ("aerofluidthermo[.]org"), the approach allows the threat actor to gain unauthorized access to their WhatsApp messages and even exfiltrate the data via browser add-ons.


Update your Mac ⚠️RIGHT NOW⚠️.
[:apple_inc: Sequoia 15.2]

Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.

https://www.microsoft.com/en-us/security/blog/2025/01/13/analyzing-cve-2024-44243-a-macos-system-integrity-protection-bypass-through-kernel-extensions/

#apple #macos #update #it #security #privacy #engineer #media #tech #news


GrapheneOS version 2025011500 released:

https://grapheneos.org/releases#2025011500

See the linked release notes for a summary of the improvements over the previous release.

Forum discussion thread:

https://discuss.grapheneos.org/d/19017-grapheneos-version-2025011500-released

#GrapheneOS #privacy #security


Vanadium version 132.0.6834.79.2 released:

https://github.com/GrapheneOS/Vanadium/releases/tag/132.0.6834.79.2

See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.

Forum discussion thread:

https://discuss.grapheneos.org/d/19065-vanadium-version-13206834792-released

#GrapheneOS #privacy #security #browser