24 Followers
90 Following
103 Posts
Systems Engineer. Been at this stuff for over 20 years now. Posting about tech, infosec, vegan food, books, tv and movies.
linksskipbarker.com
Ubuntu infrastructure has been down for more than a day
The outage has hampered communication concerning a critical vulnerability that gives root.
https://arstechnica.com/security/2026/05/ubuntu-infrastructure-has-been-down-for-more-than-a-day/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

New #Ringspace release! A bug fix in multiple sites on the same database joining the same ring led to a solution to a long-standing problem: ring key rotation! Now, when a ring has to rotate keys, it can issue new invite codes to member rings, which will handle ring rotation upon redemption.

https://codeberg.org/mttaggart/ringspace/releases/tag/v0.2.6

v0.2.6 - mttaggart/ringspace

Important updates to the invite redemption process! Now a database hosting multiple sites on the same ring will not break when the second site joins the ring. Also, as a result of the fix, we have an interesting solution for a long-standing problem: ring key rotation. Now, when a ring needs to ro...

Codeberg.org

The threat actor cluster UNC6692 is bypassing traditional email filters by impersonating IT help desk personnel directly on Microsoft Teams. 
The attack starts with "email bombing" to overwhelm the victim, followed by a Teams message offering "support" that tricks users into installing a malicious browser extension called SNOWBELT.

https://www.bleepingcomputer.com/news/security/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/

#InfoSec #CyberSecurity #MicrosoftTeams #Malware #UNC6692

Threat actor uses Microsoft Teams to deploy new “Snow” malware

A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named 'Snow' which includes a browser extension, a tunneler, and a backdoor.

BleepingComputer

41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023.

https://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/

Former ransomware negotiator pleads guilty to BlackCat attacks

41-year-old Angelo Martino, a former employee of cybersecurity incident response company DigitalMint, has pleaded guilty to targeting U.S. companies in BlackCat (ALPHV) ransomware attacks in 2023.

BleepingComputer
Microsoft Locks Out VeraCrypt And WireGuard Devs, Blames Verification Process https://packetstorm.news/news/view/41127 #news
Microsoft locks out VeraCrypt and WireGuard devs, blames verification process

: No emails, no warnings, no humans – just bots, catch-22s, and a 60-day appeals queue

The Register

“Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks.

Tracked as CVE-2026-35616, the flaw is an improper access control vulnerability that allows unauthenticated attackers to execute code or commands via specially crafted requests.”

#fortinet #emergencypatch

https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/

New FortiClient EMS flaw exploited in attacks, emergency patch released

Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks.

BleepingComputer

When I use a rolling TOTP just after it expired but it still works due to the server side tolerance window.

#InfoSec #CyberSec #SysAdmin

Umm... I got nothing against 1password, but LastPass...

"Services like 1Password and LastPass have excellent security..."

https://www.androidpolice.com/open-source-android-apps-that-prove-nobody-should-pay-for-subscriptions/

#wtf #lastpass

CISA just confirmed a nasty Windows SMB bug (CVE-2025-33073) is being actively exploited.

It lets an attacker gain SYSTEM privileges by tricking a machine into connecting to a bad SMB server.

All Windows Server versions, Win10, and Win11 are affected. A patch was released in June 2025.

CISA has officially added it to their must-patch (KEV) list.

#CyberSecurity #Windows #CVE #PatchNow

https://www.bleepingcomputer.com/news/security/cisa-high-severity-windows-smb-flaw-now-exploited-in-attacks/

#CyberSecurity #InfoSec #CVE #Windows #SMB #CISA #Vulnerability

CISA: High-severity Windows SMB flaw now exploited in attacks

CISA says threat actors are now actively exploiting a high-severity Windows SMB privilege escalation vulnerability that can let them gain SYSTEM privileges on unpatched systems.

BleepingComputer