Type Here to Get Search Results !

Twitter’s top security guy, out with Mudge and Sethi

Twitter's top security guy, out with Mudge and Sethi

in the letter Twitter’s head of security and chief information security officer both stepped down from the social media business this month.

Infosec The great Mudge, aka Peiter Zatko, join twitter In 2020, 130 high-profile accounts, including Elon Musk, Bill Gates, Barack Obama, and Joe Biden, were hijacked by criminals. You may recall that Mudge was an original member of the Dead Cow Cult and L0pht.

He has now left the microblogging site, as has CISO Rinki Sethi, who was also recruited in 2020 to fix Twitter’s security.According to an internal memo seen Both companies are the latest victims of new CEO Parag Agrawal’s restructuring of the businesses he manages, The New York Times reported. Jack Dorsey’s resignation.

Presumably both were given golden parachutes and they would have no problem finding new jobs. Mudge’s exploits are legendary, and Sethi is one of Silicon Valley’s most respected security professionals, with stints at eBay, IBM, and Palo Alto Networks.she comfirmed Friday’s move.

The move has raised eyebrows in the security community, as well as speculation about why they left: It doesn’t appear to be voluntary. New CEOs like to put their stamp on the company, and some believe the new direction may be down to individual differences in certain technologies — such as cryptocurrencies and blockchain, which Twitter has suddenly shown interest in.

Of course, so far, the response has not been good.

  • U.S. government agency is use A 35-year-old surveillance law used to surreptitiously obtain metadata (such as IP addresses and contact numbers) from WhatsApp for the purpose of investigating targets – Forbes
  • Malicious bootkit code dubbed MoonBounce has been hacked Find In some UEFI firmware, designed to inject user-mode malware into the runtime environment and link to the Chinese-speaking APT41 – Kaspersky
  • Belarusian hacker activist claim They have infected the network of the country’s railway system with ransomware and will only provide decryption keys if the country stops aid to Russian troops that may be preparing to invade Ukraine – Ars Technica
  • WordPress plugin and theme author AccessPress is apparently compromise Their software was replaced by a backdoor version last year – Juice (and jetpack, which discovered and disclosed the details of the intrusion)
  • Russian cybersecurity firm Infotecs, which is on the U.S. government’s export ban list, has allegedly been active in the U.S., drawing scrutiny from federal investigators – Forensic News
  • Check to make sure you have CVE-2021-4122 If you are using cryptsetup with Linux full disk encryption, please patch on your Linux system. As Red Hat puts it, “An attacker with physical access to a medium (such as a flash drive) could exploit this vulnerability to force a user to permanently disable the encryption layer for that medium.” As a result, someone with physical access to your machine could potentially Will decrypt a portion of your encrypted disk under nontrivial-sounding circumstances.

NSO faces Israeli government investigation

Spyware maker NSO Group faces more legal woes, this time on its home ground.

Israeli State Auditor Mattanyahu Engelman According to reports The investigation into the company followed news reports that its Pegasus software was being used by the country’s police to spy on Israeli citizens — particularly those protesting against then-Benjamin Netanyahu’s rule.

In addition, police appear to have used the software to investigate corruption by the two mayors without any judicial order or oversight. Israel-based Cellebrite is also accused of helping police with surveillance.

To improve its somewhat tarnished reputation, NSO Group has been pushing for PR.the result has been a bit confused, to say the least.

Nigerian police hunt down Silver Terrier BEC gang, arrest 11

A joint Interpol and Nigerian police operation has busted a major business email hacking gang allegedly operating in the West African country.

Details of last month’s arrests under Operation Falcon II have just been released, with Nigerian officials acting on Interpol information and using the international agency’s secure communications network to avoid giving leads to suspects. According to Interpol, the scheme allegedly found that one suspect had “over 800,000 potential victim domain credentials on his laptop,” while another suspect allegedly contacted 16 companies and obtained transfer funds to their accounts.

“By alerting Nigeria to this serious cybercrime threat, INTERPOL has enabled me to order a nationwide hunt for these globally active criminals and drive them out wherever they try to hide in our country,” Say Garbaba Omar, Deputy Attorney General for Police and Interpol Africa.

“I encourage the rest of Africa to also work with Interpol to eliminate cybercrime from our continent and make the online world a safer place.”

The little guy by the bed?

Healthcare tech company Cynerio claim Seventy-three percent of IV pumps have known computer security vulnerabilities, a large proportion of medical systems use default or weak passwords, and a third of bedside IoT devices have an “identified critical risk.” ®



Read More..

Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ad

Below Post Ad