Remove en blogs
article thumbnail

Weekly Update 384

Troy Hunt

To add some more perspective, I've just posted a poll immediately before publishing this blog post, let's see what the masses have to say: Scraping: should we be concerned if an individual's personal data is scraped, aggregated en mass and redistributed if that same data is already publicly accessible on the service anyway?

article thumbnail

Hive ransomware gang hit Costa Rica public health service

Security Affairs

CCSS sufrió hackeo en la madruga de este martes El hackeo se dio en horas de la madrugada de este martes 31 de mayo. Estoy de momento sola en la oficina y la impresora empezó a funcionar y está tirando estas hojas. Se están realizando los análisis correspondientes. — CCSSdeCostaRica (@CCSSdeCostaRica) May 31, 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Investigación Digital y la Web: Explorando fuentes y métodos de investigación emergentes

Archive-It

Por el equipo ARCH, traducido por Rosario Rogel-Salazar ¿Qué es la investigación computacional crítica y cómo afianzarla en la comunidad académica? Izquierda: Karl Blumenthal presenta el Archive Research Compute Hub (ARCH); derecha: Rosario Rogel-Salazar describe las iniciativas de archivo web en América Latina (fotos de Brian Rosenblum).

article thumbnail

Threat actors are actively exploiting CVE-2022-1388 RCE in F5 BIG-IP

Security Affairs

Estoy viendo la explotación masiva de F5 BIG-IP CVE-2022-1388 (RCE), instalando #Webshell en /usr/local/www/xui/common/css/ como backdoor para mantener el acceso. Ataques desde: 216.162.206.213 209.127.252.207 Payload escribe en /tmp/f5.sh, sh” and install them to “/usr/local/www/xui/common/css/.”. sh, ejecuta y elimina.

article thumbnail

Iran-linked MERCURY APT behind destructive attacks on hybrid environments

Security Affairs

“DEV-1084 was then later observed leveraging highly privileged compromised credentials to perform en masse destruction of resources, including server farms, virtual machines, storage accounts, and virtual networks, and send emails to internal and external recipients.” ” reads the report published by Microsoft.

article thumbnail

Inside the Massive Alleged AT&T Data Breach

Troy Hunt

I linked to the story from the beginning of this blog post and got a handful of willing respondents for whom I sent their data and asked two simple questions: Does this data look accurate? As I said in the intro, this is not the conclusive end I wanted for this blog post.

article thumbnail

Are you using a Sophos UTM appliance? Be sure it is up to date!

Security Affairs

” explained the expert in a blog post. Accept : text/javascript, text/html, application/xml, text/xml, */* Accept-Language : en-US,en;q=0.5 “I grabbed ISOs for versions 9.510-5 and 9.511-2 of the Sophos UTM platform and spun them up in a lab environment. Host : 192.168.50.17 User-Agent : Mozilla/5.0 (X11;

IT 100