TWINN Security News May 16

Nerds On Site
Article Written By David Redekop

1995

Founded In

96,000+

5-Star Reviews

4.83 / 5

Satisfaction Rating

5 years ago I told nerds that we needed to brace for 6 months of a cyber crime spree and protect clients that choose to be protected. Little did I know that 5 years later, we would be in far more challenging landscape than ever.

Welcome to TWINN #72 where in a few minutes I would like to direct your attention to what matters in cyber security this week.

So when we have stories of this nature as a theme today, it’s because ransomware in the news is starting to fall on deaf ears even though it’s never been this bad before as you can see by these first 3 stories today:

More than 1,000 schools were hit with ransomware this week. One of them is closing permanently as the ransomware incident seems to be the straw that broke the camel’s back.

Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating. It is quite predictable what will happen to these 16,000 known vulnerable sites. More ransomware, more multiple paydays for the criminals.

Costa Rican president begins tenure with ransomware national emergency declaration. This is no joke. I wish it was.

Hundreds of Thousands of Konica Printers Vulnerable to Hacking via ​​Physical Access. Operational Security lesson here. In this case, it turns out that an external USB keyboard with an F12 keypress would allow an escape and full developer access. Wow.

Forms you complete often leak data as you type it. If there’s ever been a case for business and personal devices being on a Zero Trust Connectivity policy it is this one. Absolutely horrific what your unfiltered computer is freely giving away to webmasters that administer forms.

Did you know?

gping is a graphical way of doing ping. This is helpful if you’re looking for jitter, the delta between one round trip ping and the next one.

For a video version of this, see: https://youtu.be/-WK9C8K7zSk

You May Also Like…

TWINN #127 Ring’ing Privacy

TWINN #127 Ring’ing Privacy

TWINN #127 Ring'ing Privacy Sometimes technology is so convenient for both the users and vendors that exploitation...

TWINN #120 on Juice Jacking

TWINN #120 on Juice Jacking

TWINN #120 on Juice Jacking Threats come in all shapes and sizes. Not just in a digital sense but also in the...