The blockchain is not the end of the security process – UPDATED

This post was originally made on 30 March 2022 web3 (with a lowercase “w” of course) and its use of blockchain for better cybersecurity seems like a good idea. However here is another “profitable” cyber-attack on the technology – exploiting the processes to get into the secure systems. Ethereum sidechain …

Be very careful when you log-in online – things may not be what they seem

Social Engineering and Email Cyber Security Training

This browser-in-the-browser (BitB) is a technique for deceiving the user into thinking they are using a legitimate online login screen, such as when you log in to Microsoft 365 or Google Workspace. This browser-in-the-browser attack is perfect for phishing • The Register Behold, a password phishing site that can trick …

Dirty Pipe – the next in what is becoming a procession of Linux vulnerabilities and this one is bad

Linux

This is a high-severity vulnerability in the Linux kernel that could allow untrusted users root access. Linux has been bitten by its most high-severity vulnerability in years | Ars Technica Linux distributions patch kernel privilege escalation flaw • The Register Dirty Pipe has been listed among the most serious Linux threats …