Jean-Paul de Jong

12 Followers
47 Following
23 Posts
Blockchain CISO, CTO, Developer, White Hat, Technical Architect
Websitehttps://jeanpauldejong.github.io
Twitterhttps://twittodon.com/share.php?t=dejongj&[email protected]

It is good to be selective in choosing your LinkedIn connections. My golden rule has always been: have I worked with or met this person before, and would I work or meet with them again? With SEABORGIUM and TA453 running active spear-phishing campaigns, this is even more important.

The UK National Cyber Security Centre says that Russia-based SEABORGIUM and Iran-based TA453 actors are still using spear-phishing attacks to gather information from targeted organizations and individuals in the UK and elsewhere.

Even though the tactics, techniques, procedures, and targeting profiles are similar, these campaigns are different, and the two groups are not working together.

My top tips for you.
1. Only accept connections from people you actually know.
2. Re-evaluate your list of connections and consider whether each connection is truly part of your network.
3. Check your privacy settings.
4. Trust, but verify!

https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest

#cybersecurity #infosec #spearphishing #linkedin #SEABORGIUM #TA453

SEABORGIUM and TA453 continue their respective spear-phishing campaigns against targets of interest

Activity against targeted organisations and individuals in the UK and other areas of interest.

#circleci bless them, I'm sure its rather busy and its with best intentions. But when asking for the audit logs and you get back a response that says:

"We have revoked all Personal API Tokens that were created prior to the security alert posted on January th, 2022. You will no longer need to manually rotate these tokens. ..."

That is not quite responding to what I asked. Me and our teams all did that ourselves and refreshed. I'd just like to see those audit logs from your systems to see what happened as per the service offering.

Updated as of 10:15 pm ET.

The TL;DR:

#CircleCI Jan 4: Rotate your secrets. All of them.
Users Jan 4-5: ALL of them?!
Company blog post update tonight: All of them. https://www.techtarget.com/searchitoperations/news/252528924/CircleCI-incident-adds-to-SecOps-toil

CircleCI incident adds to SecOps toil

SaaS CI/CD vendor CircleCI urged customers to rotate all secrets data, the latest of several security breaches weighing on SecOps pros charged with responding.

TechTarget
At 8am this morning we were discussing that we could migrate away from CircleCI. By 9am I checked my email and noticed that at 2:40am CircleCI gave us the best reason. #circleci #infosec #HavingABadDay https://circleci.com/blog/announcing-gitlab-support/
Announcing GitLab support on CircleCI

Learn how teams using GitLab SaaS can build, test, and deploy on CircleCI.

CircleCI
Beware of address poising scams - It is pretty active at the moment. See here for a decent article https://support.ledger.com/hc/en-us/articles/8473509294365-Beware-of-address-poisoning-scams #ledger #crypto #cryptoscam #usdc #nft #infosec
Journalist profiles on the Washington Post's website can now include Mastodon links. Here's what it looks like: https://www.washingtonpost.com/people/drew-harwell/