Let’s mix things up a bit this week, just for fun. Here goes! Enable BitLocker Silently using Autopilot and Intune (TechNuggets) How to Install and Uninstall KernelCare (Linux Journal) 5 Firewall Best Practices Every Business Should Implement (TechGenix) Tips for Overcoming Hybrid Cloud Disaster Recovery Challenges (DataCenter Knowledge) How to install and edit desktop files […]
Windows News
BetaNews tells us that Microsoft is bringing an “amazing new Privacy Auditing feature to Windows 11“. The new feature which is called Privacy Auditing will inform you about which apps have accessed sensitive devices like your camera or microphone, and also when they accessed those devices. Another new feature that Microsoft is working on for […]
Avos Ransomware Group Expands with New Attack Arsenal
Description Avos is a ransomware group first identified in 2021 initially targeting Windows machines. More recently, a new ransomware variant of AvosLocker, named after the group, is also targeting Linux environments. Well-funded and financially motivated, Avos has been active since June 2021 and follows the ransomware-as-a-service (RaaS) model, an affiliate program to recruit potential partners. […]
ToddyCat: Unveiling an Unknown APT Actor Attacking High-Profile Entities in Europe and Asia
Description ToddyCat is a relatively new APT actor, its main distinctive signs are two formerly unknown tools called ‘Samurai backdoor’ and ‘Ninja Trojan’. The group started its activities in December 2020, compromising selected Exchange servers in Taiwan and Vietnam using an unknown exploit that led to the creation of a well-known China Chopper web shell, […]
What is it About Samsung M8 Smart Monitor
The Verge had written a comprehensive write up and review on the how it stacks up against competition and should you get it. Please click on this link for the full article
Telegram’s Premium subscription is here and it costs US$4.99 / month
By Emma Roth After announcing Telegram Premium earlier this month, the messaging app has finally rolled out the paid tier, which gives users access to extra features for US$4.99 / month (via TechCrunch). All the features are outlined in a post on Telegram’s blog, with some of its bigger draws including faster downloads and a larger maximum file upload […]
iOS 16 will let you bypass CAPTCHAs on some apps and websites
By Mitchell Clark When iOS 16 comes out later this fall, you may notice that you don’t have to deal with as many annoying CAPTCHAs asking you to slide a puzzle piece or distinguish between a hill and a mountain. That’s because Apple’s introducing a feature for its iPhones and Macs called Automatic Verification, which let […]
Tips and Tutorials
A bunch of PowerShell tips and tutorials: PowerShell First-Timers (The Lonely Administrator) Top PowerShell commands you just have to try (onMSFT) PowerShell Profile Files: Getting Started (Windows OS Hub) Using PowerShell to manage password resets in Windows domains (BleepingComputer) How To Use a For Each Loop in PowerShell (ITProToday) Update all PowerShell Modules with one […]
Windows news
Nothing much of interest to us regarding Windows unless you like tabs in File Explorer or spend a lot of time working with Notepad (BetaNews). Neither of these improvements interest us much so time to move on. Wait just a minute! If you’ve been in a panic over the Follina Windows zero-day vulnerability, you’ll be […]
‘Syslogk’, Linux Kernel Rootkit Found in Wild
Syslogk Rootkit is heavily based on Adore-Ng, a relatively old, open-source, well-known kernel rootkit for Linux, but incorporates new functionalities making the user-mode application and the kernel rootkit hard to detect. Avast names this rootkit ‘Syslogk’, due to how it ‘reveals’ itself when specially crafted data is written to the file /proc/syslogk. https://community.riskiq.com/article/b0394a31
Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect Linux Threat
Symbiote is a new Linux malware Intezer discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD (T1574.006), and […]
Monkeypox Phishing: Outbreak Becomes Latest Lure
Cofense’s Phishing Defense Center (PDC) has seen attempts to deceive enterprise staff with a series of monkeypox themed phishing emails. As this rare infection spreads around the globe and gains media attention, attackers are likely to continue tweaking their tactics. https://community.riskiq.com/article/9cd0632c
RiskIQ: Suspicious File Hosted on Discord’s CDN
On June 16, 2022, RiskIQ detected a malicious .zip file hosted on Discord’s Content Delivery Network (CDN). The .zip file dropped an executable which appears to download another payload hosted at a Middle Eastern energy company’s website which was likely compromised in early June 2022. https://community.riskiq.com/article/2ba978c0 DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach […]
Phishing Domains Mimic Fortinet
RiskIQ: Phishing Domains Mimic Fortinet A suspicious domain mimicking Fortinet is currently hosted on an IP that has been previously flagged as a BUMBLEBEE command and control (C2) server.
Upcoming webcasts, events and conferences..
Got an event, conference or webcast you want announced in our newsletter? Email us! June 8 – Live Demo: Ridiculously Easy Security Awareness Training and Phishing (KnowBe4) June 8 – Webcast: Threat Spotlight: Cloud-Native Ransomware (SANS) June 9 – Webinar: Tools for Better Network Monitoring and Observability(NetworkComputing) June 21-23 – Data Center Week, a 3-day online event produced by Endeavor Business Media’s […]
Sales Intelligence Tools: Helping You Boost Your Revenue
In this article, I describe sales intelligence tools and how they’re used in business. After this, I review some of the top sales intelligence tools. Read more… https://techgenix.com/top-sales-intelligence-tools/?utm_source=email&utm_medium=tgnewsletter&utm_campaign=tgweekly-220607&hq_e=el&hq_m=2201571&hq_l=13&hq_v=ae19da069f
Proxy Servers vs Firewalls: What’s the Difference?
Proxy servers and firewalls are the most commonly used first-line defenses to prevent attacks. While both share similar use cases and applications, they have some…
What is Business VPN
This article describes what a business VPN is and includes details of key features you should consider when purchasing one. We look at the benefits of using a business VPN and the two use cases for business VPNs; remote access and site-to-site private networks.
Traditional Firewall vs Next-Generation Firewall (NGFW): Which One Is Better for Your Organization?
Read this article to learn more about traditional firewalls and next-generation firewalls and how they differ from each other. This article also explains the process you must take to choose a firewall that best fits your organization’s needs.
MacBook Air M2 (2022), the next chapter in MacBook Air
The new MacBook Air M2 (2022) looks so good that you’re going to wonder if you should pay for a MacBook Pro. Compared to the previous MacBook Air M1, you get a more powerful M2 chip, bigger and brighter 13.6-inch display and improved 1080p webcam in an extremely portable design that’s 20% smaller than the previous […]