
Our Founder, @morris is speaking at QCTR next Friday on “The Big Hairy Edge Device Problem.” Don’t miss it. April 25, 8–10AM ET. Register: https://bit.ly/42x325a
#NSO lawyer names #Mexico, #SaudiArabia, and #Uzbekistan as #spyware customers accused of 2019 #WhatsApp hacks
If you missed this, CISA Has Released Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise https://www.cisa.gov/news-events/alerts/2025/04/16/cisa-releases-guidance-credential-risks-associated-potential-legacy-oracle-cloud-compromise #cybersecurity #infosec #Oracle
Researchers reveal a large-scale ransomware campaign leveraging over 1,200 stolen AWS access keys to encrypt S3 buckets.
Read: https://hackread.com/mass-ransomware-campaign-s3-buckets-stolen-aws-keys/
This dumb password rule is from CVent.
Password Rules
- 8 to 20 characters with at least 1 number and 1 letter.
- No symbols or spaces.
Researchers claim breakthrough in fight against #AI’s frustrating security hole
With six months left to go until the official end of support for Windows 10, more than half of all Windows users are still relying on the operating system.
#Microsoft #Windows #cybersecurity #bigtech
https://cnews.link/windows-10-cybersecurity-threats-infostealers-3/
Five GNA register to Global CVE (GCVE) allocation system vuldb.com, Ericsson PSIRT, EACG, SCHUTZWERK and DFN-CERT.
If you want to join and get a unique identifier
https://gcve.eu/about/#eligibility-and-process-to-obtain-a-gna-id
Strengthening #FOSS Legal Resilience
https://f-droid.org/en/2025/04/16/strengthening-foss-legal-resilience.html
Sekoia has a good report out on Interlock ransomware. One thing that jumped out at me is the continued abuse of Cloudflare’s free trycloudflare[.]com service. This domain should be blocked if you want to avoid ransomware as this isn’t the only group using this service for C2 and remote access. If your developers need this kind of functionality, you should have them sign up for the inexpensive paid version of the service that allows for the use of your own custom domain name. #cybersecurity
From: @sekoia_io
https://infosec.exchange/@sekoia_io/114346873677895469
Firewalls function at various layers of the OSI model. Basic stateless firewalls work at layers 3 and 4, filtering traffic by IP address and port. In contrast, application-layer firewalls operate at layer 7, analyzing the actual content of the traffic to make filtering decisions
Here is an overview of firewalls across OSI layers #infosec #sysadmin
Find high-res pdf books with all my #cybersecurity related infographics at https://study-notes.org
The timing of this DOGE-enabled breach alleged by a whistleblower lines up with other efforts by the administration to weaken the #cybersecurity apparatus of the U.S. #infosec https://arstechnica.com/tech-policy/2025/04/government-it-whistleblower-calls-out-doge-says-he-was-threatened-at-home/
That's Not How A SIM Swap Attack Works
https://shkspr.mobi/blog/2025/04/thats-not-how-a-sim-swap-attack-works/
There's a disturbing article in The Guardian about a person who was on the receiving end of a successful cybersecurity attack.
EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did so immediately. Twenty-four hours later, my mobile stopped working and money was withdrawn from my bank account.
With their alien sim, the fraudster infiltrated my handset and stole details for every account I had. Passwords and logins had been changed for my finance, retail and some social media accounts.
(Emphasis added.)
I realise it is in the consumer rights section of the newspaper, not the technology section, and I dare-say some editorialising has gone on, but that's nonsense.
Here's how a SIM swap works.
Do you notice the missing step there?
At no point does the attacker "infiltrate" your handset. Your handset is still in your possession. The SIM is dead, but that doesn't give the attacker access to the phone itself. There is simply no way for someone to put a new SIM into their phone and automatically get access to your device.
Try it now. Take your SIM out of your phone and put it into a new one. Do all of your apps suddenly appear? Are your usernames and passwords visible to you? No.
There are ways to transfer your data from an iPhone or Android - but they require a lot more work than swapping a SIM.
So how did the attacker know which websites to target and what username to use?
What (Probably) Happened
Let's assume the person in the article didn't have malware on their device and hadn't handed over all their details to a cold caller.
The most obvious answer is that the attacker already knew the victim's email address. Maybe the victim gave out their phone number and email to some dodgy site, or they're listed on their contact page, or something like that.
The attacker now has two routes.
First is "hit and hope". They try the email address on hundreds of popular sites' password reset page until they get a match. That's time-consuming given the vast volume of websites.
Second is targetting your email. If the attacker can get into your email, they can see which sites you use, who your bank is, and where you shop. They can target those specific sites, perform a password reset, and get your details.
I strongly suspect it is the latter which has happened. The swapped SIM was used to reset the victim's email password. Once in the email, all the accounts were easily found. At no point was the handset broken into.
What can I do to protect myself?
It is important to realise that there's nothing you can do to prevent a SIM-swap attack! Your phone company is probably incompetent and their staff can easily be bribed. You do not control your phone number. If you get hit by a SIM swap, it almost certainly isn't your fault.
So here are some practical steps anyone can take to reduce the likelihood and effectiveness of this class of attack:
Stay safe out there.
blog! “That's Not How A SIM Swap Attack Works”
There's a disturbing article in The Guardian about a person who was on the receiving end of a successful cybersecurity attack.
EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did …
⸻
#2fa #CyberSecurity #MFA #security #sim
1/3 wykrywanych incydentów w małych firmach to ransomware – analiza Sophos. Cyberprzestępcy coraz częściej wykorzystują luki w urządzeniach sieciowych i przełamują powszechnie stosowane zabezpieczenia, jak uwierzytelnianie wieloskładnikowe. https://linuxiarze.pl/1-3-wykrywanych-incydentow-w-malych-firmach-to-ransomware-analiza-sophos/ #ransomware #cyberattack #cybersecurity
Physical security has been around since the #Hyborian Age: guards, portals, and blades. #cybersecurity https://cromwell-intl.com/cybersecurity/physical.html?s=mc