Over 200,000 MicroTik Routers Worldwide Are Under the Control of Botnet Malware

Over 200,000 MicroTik Routers Worldwide Are Under the Control of Botnet Malware https://ift.tt/7k3apAy Vulnerable routers from MikroTik have been misused to form what cybersecurity researchers have called one of the largest botnet-as-a-service cybercrime operations seen in recent years. According to a new piece of research published by Avast, a cryptocurrency mining campaign leveraging the new-disrupted […]

Corrupted open-source software enters the Russian battlefield

Corrupted open-source software enters the Russian battlefield https://ift.tt/FwnBsK3 It started as an innocent protest. Npm, JavaScript’s package manager maintainer RIAEvangelist, Brandon Nozaki Miller, wrote and published an open-code npm source-code package called peacenotwar. It did little except add a protest message against Russia’s invasion of Ukraine. But then, it took a darker turn: It began […]

Microsoft Security Compliance Toolkit 1.0 (contains also Windows Policy Analyzer)

Microsoft Security Compliance Toolkit 1.0 (contains also Windows Policy Analyzer) https://ift.tt/Iqjh9GJ [German]Microsoft has released the Microsoft Security Compliance Toolkit 1.0 in Nov. 2021. This week I was asked if the Windows Policy Analyzer – a utility for analyzing and comparing Group Policy Objects (GPOs) – which has been available since 2016, is now being phased […]

Why Azure AD Backup is Needed

Why Azure AD Backup is Needed https://ift.tt/psQcGXr In the old days, everyone was doing backups. At least that’s what we all said; there were lots of horror stories about people who didn’t back up important data, or who did backups but neglected to test their restores. The emergence of the cloud promised we wouldn’t have […]

Updated: Kubernetes Hardening Guide

Updated: Kubernetes Hardening Guide https://ift.tt/2KrcxLg Original release date: March 15, 2022 The National Security Agency (NSA) and CISA have updated their joint Cybersecurity Technical Report (CTR): Kubernetes Hardening Guide, originally released in August 2021, based on valuable feedback and inputs from the cybersecurity community.  Kubernetes is an open-source system that automates deployment, scaling, and management […]