ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Miscellaneous Tech News

    News
    83
    7.4k
    2.7m
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stacksofplatesS
      stacksofplates @Dashrender
      last edited by

      @Dashrender said in Miscellaneous Tech News:

      @scottalanmiller said in Miscellaneous Tech News:

      @Dashrender said in Miscellaneous Tech News:

      @stacksofplates said in Miscellaneous Tech News:

      For almost two years, Microsoft officials botched a key Windows defense, an unexplained lapse that left customers open to a malware infection technique that has been especially effective in recent months.

      Microsoft officials have steadfastly asserted that Windows Update will automatically add new software drivers to a blocklist designed to thwart a well-known trick in the malware infection playbook. The malware technique—known as BYOVD, short for "bring your own vulnerable driver"—makes it easy for an attacker with administrative control to bypass Windows kernel protections. Rather than writing an exploit from scratch, the attacker simply installs any one of dozens of third-party drivers with known vulnerabilities. Then the attacker exploits those vulnerabilities to gain instant access to some of the most fortified regions of Windows.

      It turns out, however, that Windows was not properly downloading and applying updates to the driver blocklist, leaving users vulnerable to new BYOVD attacks.

      https://arstechnica.com/information-technology/2022/10/how-a-microsoft-blunder-opened-millions-of-pcs-to-potent-malware-attacks/

      OK that's definitely bad that they don't block it - but since you're an admin - why do you even care? the article says that the attacker is starting as a local admin.

      Installers are typically local admins.

      let me ask this another way.
      Yes - it's bad that MS isn't blocking something they said they would.

      But does that make the situation any worse than it would really be if they did?

      the attacker already has local admin - why would they need to install a driver that has vulnerabilities when they already have full local admin control - what advantage do they get they didn't already have?

      Because they’re mostly things like automated installs. It’s not like someone is sitting at the keyboard as a bad actor. It’s an email with an attachment for a doc that when Sally opens it installs a valid signed driver that is vulnerable.

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @stacksofplates
        last edited by

        @stacksofplates said in Miscellaneous Tech News:

        @Dashrender said in Miscellaneous Tech News:

        @scottalanmiller said in Miscellaneous Tech News:

        @Dashrender said in Miscellaneous Tech News:

        @stacksofplates said in Miscellaneous Tech News:

        For almost two years, Microsoft officials botched a key Windows defense, an unexplained lapse that left customers open to a malware infection technique that has been especially effective in recent months.

        Microsoft officials have steadfastly asserted that Windows Update will automatically add new software drivers to a blocklist designed to thwart a well-known trick in the malware infection playbook. The malware technique—known as BYOVD, short for "bring your own vulnerable driver"—makes it easy for an attacker with administrative control to bypass Windows kernel protections. Rather than writing an exploit from scratch, the attacker simply installs any one of dozens of third-party drivers with known vulnerabilities. Then the attacker exploits those vulnerabilities to gain instant access to some of the most fortified regions of Windows.

        It turns out, however, that Windows was not properly downloading and applying updates to the driver blocklist, leaving users vulnerable to new BYOVD attacks.

        https://arstechnica.com/information-technology/2022/10/how-a-microsoft-blunder-opened-millions-of-pcs-to-potent-malware-attacks/

        OK that's definitely bad that they don't block it - but since you're an admin - why do you even care? the article says that the attacker is starting as a local admin.

        Installers are typically local admins.

        let me ask this another way.
        Yes - it's bad that MS isn't blocking something they said they would.

        But does that make the situation any worse than it would really be if they did?

        the attacker already has local admin - why would they need to install a driver that has vulnerabilities when they already have full local admin control - what advantage do they get they didn't already have?

        Because they’re mostly things like automated installs. It’s not like someone is sitting at the keyboard as a bad actor. It’s an email with an attachment for a doc that when Sally opens it installs a valid signed driver that is vulnerable.

        Exactly. Automated or confused users OR, don't forget, confused DEVELOPERS. It's not hard to get legit software, especially closed source, to think that MS signed drivers are safe (as that's the whole idea of the system is that everyone can trust them because MS is vouching for them) and trigger that they be installed, bypassing the expected security system.

        travisdh1T 1 Reply Last reply Reply Quote 1
        • travisdh1T
          travisdh1 @scottalanmiller
          last edited by

          @scottalanmiller said in Miscellaneous Tech News:

          @stacksofplates said in Miscellaneous Tech News:

          @Dashrender said in Miscellaneous Tech News:

          @scottalanmiller said in Miscellaneous Tech News:

          @Dashrender said in Miscellaneous Tech News:

          @stacksofplates said in Miscellaneous Tech News:

          For almost two years, Microsoft officials botched a key Windows defense, an unexplained lapse that left customers open to a malware infection technique that has been especially effective in recent months.

          Microsoft officials have steadfastly asserted that Windows Update will automatically add new software drivers to a blocklist designed to thwart a well-known trick in the malware infection playbook. The malware technique—known as BYOVD, short for "bring your own vulnerable driver"—makes it easy for an attacker with administrative control to bypass Windows kernel protections. Rather than writing an exploit from scratch, the attacker simply installs any one of dozens of third-party drivers with known vulnerabilities. Then the attacker exploits those vulnerabilities to gain instant access to some of the most fortified regions of Windows.

          It turns out, however, that Windows was not properly downloading and applying updates to the driver blocklist, leaving users vulnerable to new BYOVD attacks.

          https://arstechnica.com/information-technology/2022/10/how-a-microsoft-blunder-opened-millions-of-pcs-to-potent-malware-attacks/

          OK that's definitely bad that they don't block it - but since you're an admin - why do you even care? the article says that the attacker is starting as a local admin.

          Installers are typically local admins.

          let me ask this another way.
          Yes - it's bad that MS isn't blocking something they said they would.

          But does that make the situation any worse than it would really be if they did?

          the attacker already has local admin - why would they need to install a driver that has vulnerabilities when they already have full local admin control - what advantage do they get they didn't already have?

          Because they’re mostly things like automated installs. It’s not like someone is sitting at the keyboard as a bad actor. It’s an email with an attachment for a doc that when Sally opens it installs a valid signed driver that is vulnerable.

          Exactly. Automated or confused users OR, don't forget, confused DEVELOPERS. It's not hard to get legit software, especially closed source, to think that MS signed drivers are safe (as that's the whole idea of the system is that everyone can trust them because MS is vouching for them) and trigger that they be installed, bypassing the expected security system.

          I've seen that done by developers way to often.
          b8e34e81-c9a2-4a63-a301-4c4c5b300e96-image.png

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @travisdh1
            last edited by

            @travisdh1 said in Miscellaneous Tech News:

            @scottalanmiller said in Miscellaneous Tech News:

            @stacksofplates said in Miscellaneous Tech News:

            @Dashrender said in Miscellaneous Tech News:

            @scottalanmiller said in Miscellaneous Tech News:

            @Dashrender said in Miscellaneous Tech News:

            @stacksofplates said in Miscellaneous Tech News:

            For almost two years, Microsoft officials botched a key Windows defense, an unexplained lapse that left customers open to a malware infection technique that has been especially effective in recent months.

            Microsoft officials have steadfastly asserted that Windows Update will automatically add new software drivers to a blocklist designed to thwart a well-known trick in the malware infection playbook. The malware technique—known as BYOVD, short for "bring your own vulnerable driver"—makes it easy for an attacker with administrative control to bypass Windows kernel protections. Rather than writing an exploit from scratch, the attacker simply installs any one of dozens of third-party drivers with known vulnerabilities. Then the attacker exploits those vulnerabilities to gain instant access to some of the most fortified regions of Windows.

            It turns out, however, that Windows was not properly downloading and applying updates to the driver blocklist, leaving users vulnerable to new BYOVD attacks.

            https://arstechnica.com/information-technology/2022/10/how-a-microsoft-blunder-opened-millions-of-pcs-to-potent-malware-attacks/

            OK that's definitely bad that they don't block it - but since you're an admin - why do you even care? the article says that the attacker is starting as a local admin.

            Installers are typically local admins.

            let me ask this another way.
            Yes - it's bad that MS isn't blocking something they said they would.

            But does that make the situation any worse than it would really be if they did?

            the attacker already has local admin - why would they need to install a driver that has vulnerabilities when they already have full local admin control - what advantage do they get they didn't already have?

            Because they’re mostly things like automated installs. It’s not like someone is sitting at the keyboard as a bad actor. It’s an email with an attachment for a doc that when Sally opens it installs a valid signed driver that is vulnerable.

            Exactly. Automated or confused users OR, don't forget, confused DEVELOPERS. It's not hard to get legit software, especially closed source, to think that MS signed drivers are safe (as that's the whole idea of the system is that everyone can trust them because MS is vouching for them) and trigger that they be installed, bypassing the expected security system.

            I've seen that done by developers way to often.
            b8e34e81-c9a2-4a63-a301-4c4c5b300e96-image.png

            In theory as a dev you are supposed to be able to rely on the IT team. If IT is okay with Windows, then you are kind of stuck.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller
              last edited by

              Ubuntu now available for real world RISC-V devices!

              https://liliputing.com/now-you-can-run-ubuntu-on-a-risc-v-computer-that-costs-less-than-20/

              1 Reply Last reply Reply Quote 1
              • JaredBuschJ
                JaredBusch
                last edited by

                Japanese fund secures 1 trillion yen to buy Toshiba

                TOKYO (Kyodo) -- A Japanese investment fund has secured about 1 trillion yen ($6.8 billion) to buy out Toshiba Corp. and notified the embattled conglomerate that the amount was offered by a group of more than 10 Japanese companies, a source familiar with the matter said Monday.

                But Japan Industrial Partners Inc. failed to meet Toshiba's request to submit a letter of loan commitments from major banks by Monday, the source said, leaving uncertain whether funds can be guaranteed for the takeover estimated at some 2.2 trillion yen in total.

                Japan Industrial Partners, which leads a consortium that Toshiba designated the preferred bidder for the potential buyout, appears to be basing its total cost estimate on share price, as the figure equals the company's market capitalization, the source said.

                In early October, Toshiba selected the consortium as the preferred bidder over Japan Investment Corp., a state-backed fund seeking to team up with Bain Capital for the buyout.

                Toshiba has been struggling to recover from problems such as a window-dressing scandal and a massive loss in U.S. nuclear power business that surfaced in the 2010s.

                1 Reply Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  AMD Genoa announced...

                  https://www.nextplatform.com/2022/11/10/amd-genoa-epyc-server-cpus-take-the-heavyweight-title/

                  travisdh1T 1 Reply Last reply Reply Quote 0
                  • travisdh1T
                    travisdh1 @scottalanmiller
                    last edited by

                    @scottalanmiller said in Miscellaneous Tech News:

                    AMD Genoa announced...

                    https://www.nextplatform.com/2022/11/10/amd-genoa-epyc-server-cpus-take-the-heavyweight-title/

                    AMD, turning it up to 11!

                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @travisdh1
                      last edited by

                      @travisdh1 said in Miscellaneous Tech News:

                      @scottalanmiller said in Miscellaneous Tech News:

                      AMD Genoa announced...

                      https://www.nextplatform.com/2022/11/10/amd-genoa-epyc-server-cpus-take-the-heavyweight-title/

                      AMD, turning it up to 11!

                      No kidding. Too bad these are so big I'll never need one of my own. But hopefully the datacenters see these rolling in soon.

                      travisdh1T 1 Reply Last reply Reply Quote 1
                      • travisdh1T
                        travisdh1 @scottalanmiller
                        last edited by

                        @scottalanmiller said in Miscellaneous Tech News:

                        @travisdh1 said in Miscellaneous Tech News:

                        @scottalanmiller said in Miscellaneous Tech News:

                        AMD Genoa announced...

                        https://www.nextplatform.com/2022/11/10/amd-genoa-epyc-server-cpus-take-the-heavyweight-title/

                        AMD, turning it up to 11!

                        No kidding. Too bad these are so big I'll never need one of my own. But hopefully the datacenters see these rolling in soon.

                        Some of the press releases have confirmed the big providers already have them in use, so yes, they're already being deployed.

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-takes-down-teams-exchange-online-outlook/?mibextid=Zxz2cZ

                          T 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            GoTo (Formerly known as LastPass) has customer accounts breached...

                            https://thehackernews.com/2023/01/lastpass-parent-company-goto-suffers.html

                            dbeatoD 1 Reply Last reply Reply Quote 0
                            • dbeatoD
                              dbeato @scottalanmiller
                              last edited by

                              @scottalanmiller Well GoTo owns Logmein and Lastpass so both products were breached one way or the other.

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @dbeato
                                last edited by

                                @dbeato said in Miscellaneous Tech News:

                                @scottalanmiller Well GoTo owns Logmein and Lastpass so both products were breached one way or the other.

                                LogMeIn was the company, they rebranded to GoTo.

                                LastPass isn't owned by GoTo, but used to be. There shouldn't be any crossover. Breaching LastPass' stuff wouldn't imply that GoTo was breached too.

                                1 Reply Last reply Reply Quote 0
                                • T
                                  Texkonc @scottalanmiller
                                  last edited by

                                  @scottalanmiller said in Miscellaneous Tech News:

                                  https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-takes-down-teams-exchange-online-outlook/?mibextid=Zxz2cZ

                                  They had an issue on Friday that affected people with GEO blocking......After research we found some of the IP's trying to respond were based in India. Unblocking India from GEO fixed it. I imagine companies that are government or companies based in the UK would be able to sue the pants off them.

                                  1 Reply Last reply Reply Quote 1
                                  • scottalanmillerS
                                    scottalanmiller
                                    last edited by

                                    India blacks out Internet for Punjab for fourth straight day:

                                    https://edition.cnn.com/2023/03/20/india/india-separatist-manhunt-internet-shutdown-intl-hnk/index.html

                                    27 million people in Internet blackout.

                                    1 Reply Last reply Reply Quote 0
                                    • dafyreD
                                      dafyre
                                      last edited by

                                      Nextcloud 26 is out. (I didn't even realize 25 had been released, lol).

                                      https://nextcloud.com/blog/hub-4-pioneers-ethical-ai-integration-for-a-more-productive-and-collaborative-future/

                                      Seems like a lot of glitzy stuff has been added.

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @dafyre
                                        last edited by

                                        @dafyre said in Miscellaneous Tech News:

                                        Nextcloud 26 is out. (I didn't even realize 25 had been released, lol).

                                        https://nextcloud.com/blog/hub-4-pioneers-ethical-ai-integration-for-a-more-productive-and-collaborative-future/

                                        Seems like a lot of glitzy stuff has been added.

                                        Nice, I need to check out the latest.

                                        AdamFA dafyreD 2 Replies Last reply Reply Quote 0
                                        • AdamFA
                                          AdamF @scottalanmiller
                                          last edited by

                                          This might just spark my interest to give Nextcloud a try again. Years ago, I gave up on self hosting my photos because it just wasn't "wife approved" enough for me. It was clunky and didn't "just work". So I chose to just go with auto backup with Amazon Prime Photos. That has been OK, but I do have to pay for it. My new idea to prove out is:

                                          Have an app on iOS that automatically syncs all of our photos to a local server in my house. (I don't care what that is....nextcloud, something else that's better, whatever) Then nightly, sync that with Backblaze B2.

                                          This seems like a simple concept, but years ago, it just wasn't user (wife) friendly. Maybe with the new release of nextcloud, this will be better?

                                          scottalanmillerS dafyreD 3 Replies Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @AdamF
                                            last edited by

                                            @AdamF said in Miscellaneous Tech News:

                                            That has been OK, but I do have to pay for it.

                                            FOr this I use Flickr. Way better than Amazon Photos.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 367
                                            • 368
                                            • 369
                                            • 370
                                            • 371
                                            • 372
                                            • 373
                                            • 369 / 373
                                            • First post
                                              Last post