cybersecurity
"We are working methodically to restore the involved services as quickly as possible"
"Cozy Bear" gained unauthorized access to HPE’s cloud-based email environment
A 10-line exploit is now widely available. Unpatched instances *will* come under attack.
A rewritten EU cyber resiliency act removes the biggest threats to open source but much standards work still to be done, says Linux Foundation Europe
"We will act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes..."
VPN appliances "all appear to have been constructed with the code equivalent of string, stamped with the word ‘secure’ and then just left to decay for 20 years..."
"In every insider threat case, there is a combination of network activity and employee behaviour. The malicious activity crosses both physical and electronic modalities..."
Attackers re-write JavaScript loaded by the VPN login page for the Appliance to capture credentials; also grabbed Veeam credentials, moved laterally for full SYSTEM control.