Popular Post

200,000 Workers’ PII at Risk in WorkComposer S3 SNAFU
Richi Jennings | | Amazon S3, Amazon S3 bucket, Amazon Web Services, Amazon Web Services (AWS), amazon web services compliance, AWS bucket, AWS GDPR Compliance Shared Responsibility, AWS S3 BUCKET, aws s3 storage, breach of privacy, bucket policy, buckets, California Consumer Privacy Act (CCPA), CCPA, CCPA Compliance, cybersecurity challenges in remote working, EU GDPR, GDPR, GDPR (General Data Protection Regulation), GDPR compliance, gdpr eu, online surveillance, Privacy, remote work, remote work cyber security, Remote Work Cybersecurity, remote work enviornment, remote work productivity, Remote Work Security, remote worker management, remote workers, remote workforce, Remote Workforce Security, remote working, remote working risks, S3, S3 bucket, S3 buckets, SB Blogwatch, spyware, storage bucket, WorkComposer
Don’t say ‘spyware’—21 million screenshots in one open bucket ...
Security Boulevard

Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report
Richi Jennings | | #CryptoScam, #InvestmentScam, #PigButchering, Amazon Phishing Scams, AppleCare Warranty Scam, bank scam, bitcoin ATM scam, bitcoin scam, bitcoin transfer scams, gift card, gift card fraud, Gift Card Gang, gift card scams, gift cards, GiftCardScams, online romance scam, pig butchering, Pig Butchering Scams, romance, romance fraud, romance scam, romance scammers, romance scams, SB Blogwatch, social media intelligence, United Nations, UNODC
Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar ...
Security Boulevard

MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’
Richi Jennings | | cisa, CISA Research, common vulnerabilities and exposures, CVE, CVE (Common Vulnerabilities and Exposures), CVE database, CVE Program, Cybersecurity and Infrastructure Security Agency, cybersecurity funding, Department of Homeland Security, DHS, Funding & Grants, MITRE, MITRE Framework, National Institute of Standards and Technology, National Institute of Standards and Technology (NIST), NIST, SB Blogwatch, U.S. Department of Homeland Security
These are “interesting” times: U.S. government funding for the Common Vulnerabilities and Exposures program expires April 16 ...
Security Boulevard

Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’
Richi Jennings | | CVE-2021-35587, Larry Ellison, OCI, Oracle, Oracle Access Manager, Oracle Classic, Oracle cloud, Oracle Cloud Classic, Oracle Cloud infrastructure, Oracle Fusion Cloud, rose87168, SB Blogwatch
Classic “wordplay:” Larry’s PR angels desperately dance on the head of a pin ...
Security Boulevard

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Spit Happens: 23andMe is Bankrupt — Secure Your DNA Data NOW Already
Double hell-ix: Personal genomics firm tells customers your data is safe—but few will trust the loss-making biotech pioneer ...
Security Boulevard

Microsoft Won’t Fix This Bad Zero Day (Despite Wide Abuse)
Richi Jennings | | .lnk, APT37, APT43, BitterAPT, china espionage, CWE-451, Cybersecurity zero-day flaw, Earth Anansi, Earth Imp, Earth Kumiho, Earth Manticore, Evil Corp., InkySquid, Iranian hackers, kimsuky, Kimsuky hacking group, Konni, LNK file malware, LNKFiles, malicious LNK files, Microsoft, Microsoft Windows Zero Day, North Korean cyber espionage, russia hacker, SB Blogwatch, ScarCruft, Windows, ZDI-CAN-25373, Zero Day Attacks, zero day exploit attack, Zero Day Initiative, Zero Day Initiative (ZDI), zero-day, zero-day attack, Zero-Day Bug
Satya says NO: Redmond blames Windows users, rather than solve 30-year-old bug—exploited since 2017 ...
Security Boulevard

No, Elon — X DDoS was NOT by Ukraine
Richi Jennings | | Cloudflare DDoS Protection, cyber attacks during ukraine war, cyber attacks russia, Dark Storm Team, ddos, DDoS attack, Denial of Service, Denial of Service (DoS) attacks, denial of service attacks, denial of service vulnerability, distributed denial of service, Distributed denial of service (DDoS) attacks, distributed denial of service attack, Elon Musk, elon musk twitter, hacktivism ukraine cyber-attacks, Russia, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, SB Blogwatch, social media, Social Media Attack, social media attacks, social media cyber attacks, Social Media Cybercrime, Social Media Exploits, Ukraine, ukraine conflict, Ukraine Cyber War, Ukraine-Russia War, Ukraine/European Security, X
X marks the botnet: Outage outrage was a Ukrainian cyberattack, implies our favorite African billionaire comedy villain ...
Security Boulevard

‘Ban These Chinese Routers NOW,’ Cries House Committee
Richi Jennings | | Attacking Routers, china, China-linked Hackers, Chinese, Chinese Communists, Chinese devices, chinese government, Chinese hardware, Chinese state-sponsored cyberattacks, Commerce Department, Congress, Consumer IoT, flawed routers, House of Representatives, Internet of things, Internet of Things (IoT), Internet of Things cyber security, internetof things, internetofthings, internte-of-things, iot, Jeff Barney, John Moolenaar, OpenWrt, Peoples Republic of China, Raja Krishnamoorthi, Rob Joyce, router compromise, router exploit, router firmware security flaw, router hacking, router hijacking, router security, router vulnerabilities, SB Blogwatch, SOHO, SOHO and IoT device vulnerabilities, TP-LINK, U.S. Commerce Department, US Congress
Sino stoppage scheme: TP-Link in crosshairs, along with other brands ...
Security Boulevard

Apple vs. UK — ADP E2EE Back Door Faceoff
Richi Jennings | | #nobackdoors, ADP, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, SB Blogwatch, uk, UK Investigatory Powers Act, Won’t somebody think of the children?
Won’t Tim Think of the Children? End-to-end encryption battle continues ...
Security Boulevard