Black belt in Mikado, Photo model, for the photos where they put under ‘BEFORE’

  • 26 Posts
  • 37 Comments
Joined 5 years ago
cake
Cake day: April 25th, 2021

help-circle

  • Zerush@lemmy.mlOPtoSecurity@lemmy.mlMS Digital Defense Report
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    10 days ago

    Well, MS is an data hog which has nothing to do with privacy (at least MS make money selling soft and services, no need to sell userdata to third parties, like Google do, MS profile the user for own uses and now also to train it’s AI), but in the ambit security it has done a good work. Current Windows lacks more because an overprtection as with security flaws- MS has a lot of knowledge about, precisely because Windows was always the most atacked OS. It’s the demon talking about evil acts, not charity. The report is an interesting read, despite that it is from M$.





























  • Andisearch Writeup

    A threat actor known as “Orange” has leaked nearly 500,000 Fortinet VPN login names and passwords, a move that has sent ripples through the cybersecurity community. These credentials were allegedly scraped from vulnerable FortiGate SSL-VPN devices, exploiting a known vulnerability, CVE-2018-13379, which had been patched since May 2019. Despite the availability of patches, many systems remained unpatched, leaving them susceptible to this breach.

    The leaked credentials were posted for free on the RAMP hacking forum, a platform managed by Orange, who was previously associated with the Babuk Ransomware operation. This leak is believed to be a promotional tactic for the RAMP forum and the Groove ransomware operation, aiming to attract other cybercriminals by offering a “freebie”.

    The breach has affected organizations across 74 countries, with a significant number of compromised devices located in the USA. The leaked data includes VPN credentials for 498,908 users over 12,856 devices. While some sources confirm the validity of these credentials, others provide mixed reports, indicating that not all credentials may be functional.

    Fortinet has acknowledged the breach, emphasizing the importance of patching and resetting passwords to mitigate the risk. They have urged affected users to upgrade their devices to the latest FortiOS versions and perform an organization-wide password reset. The incident underscores the critical need for timely patching and robust security practices to protect against such vulnerabilities.