How to create Let’s Encrypt SSL certificates with acme.sh on Linux

Issuing and installing SSL certificates doesn’t have to be a challenge, especially when there are tools like acme.sh available. Jack Wallen shows you how to install and use this handy script. Image: Getty Images/iStockphoto Installing SSL certificates isn’t difficult, but it’s a process every Linux administrator will have to take

0 Comments

Here’s a fix for open source supply chain attacks

Commentary: Open source has never been more popular or more under attack, but there’s something cloud providers can do to make OSS more secure. Image: Kheng Guan Toh/Shutterstock TechRepublic contributing writer Jack Wallen is correct that “Open source software has proved itself, time and time and time again, that it

0 Comments

REvil Affiliates Confirm: Leadership Were Cheating Dirtbags

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums. Forget shadowy attackers deploying bespoke zero-day exploits from afar. A risk that is far more real for organizations as they embark on ambitious digital

0 Comments

Microsoft Exchange Bug Exposes ~100,000 Windows Domain Credentials

An unpatched design flaw in the implementation of Microsoft Exchange’s Autodiscover protocol has resulted in the leak of approximately 100,000 login names and passwords for Windows domains worldwide. “This is a severe security issue, since if an attacker can control such domains or has the ability to ‘sniff’ traffic in

0 Comments

Ransomware now accounts for 69% of all attacks that use malware

The most common targets of ransomware in the second quarter of 2021 were governmental, medical and industrial companies along with scientific and educational institutions, says Positive Technologies. Image: Getty Images/iStockphoto Ransomware attacks have hit “stratospheric” levels, according to a report released Wednesday by cybersecurity firm Positive Technologies. In the second

0 Comments

Your IoT devices may be vulnerable to malware

Your IoT devices may be vulnerable to malware Length: 7:47 | Sep 22, 2021 NordPass: Only 33% of users surveyed had changed the default passwords on their IoT devices, leaving the rest vulnerable to attack.

0 Comments

UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data

The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences. On Sept. 20, 2021, it came to light that the UK’s Ministry of Defence (MoD) had committed a basic mistake: It had included the email

0 Comments

Crystal Valley Farm Coop Hit with Ransomware

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

European police dismantle cybercrime ring with ties to Italian Mafia

The group used phishing, BEC and other types of attacks to swindle victims out of millions Law enforcement agencies from Europe have cracked down on an organized group that is associated with the Italian Mob and has been involved in all manner of cybercrime, including phishing campaigns, SIM swapping and Business

0 Comments