Malware Devil

Monday, March 1, 2021

Universal Health Services Suffered $67 Million Loss Due to Ransomware Attack

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: “The truth behind Stonehenge….”
image

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-22114
PUBLISHED: 2021-03-01

Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So …

CVE-2021-25914
PUBLISHED: 2021-03-01

Prototype pollution vulnerability in ‘object-collider’ versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.

CVE-2020-36240
PUBLISHED: 2021-03-01

The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVE-2018-25004
PUBLISHED: 2021-03-01

A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.

CVE-2021-25829
PUBLISHED: 2021-03-01

An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.

The post Universal Health Services Suffered $67 Million Loss Due to Ransomware Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/universal-health-services-suffered-67-million-loss-due-to-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=universal-health-services-suffered-67-million-loss-due-to-ransomware-attack

New Jailbreak Tool Works on Most iPhones

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: “The truth behind Stonehenge….”
image

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-22114
PUBLISHED: 2021-03-01

Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So …

CVE-2021-25914
PUBLISHED: 2021-03-01

Prototype pollution vulnerability in ‘object-collider’ versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.

CVE-2020-36240
PUBLISHED: 2021-03-01

The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVE-2018-25004
PUBLISHED: 2021-03-01

A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.

CVE-2021-25829
PUBLISHED: 2021-03-01

An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.

The post New Jailbreak Tool Works on Most iPhones appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/new-jailbreak-tool-works-on-most-iphones/?utm_source=rss&utm_medium=rss&utm_campaign=new-jailbreak-tool-works-on-most-iphones

Passwords, Private Posts Exposed in Hack of Gab Social Network

The Distributed Denial of Secrets group claim they have received more than 70 gigabytes of data exfiltrated from social media platform Gab.
Read More

The post Passwords, Private Posts Exposed in Hack of Gab Social Network appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/passwords-private-posts-exposed-in-hack-of-gab-social-network/?utm_source=rss&utm_medium=rss&utm_campaign=passwords-private-posts-exposed-in-hack-of-gab-social-network

Hackable; How to do Application Security Right – Ted Harrington – ASW #141

In looking at how to do application security right we talk about understanding the difference between defining types of security testing and the goals that security testing should be aiming for. Plus, we highlight how doing security right also means shifting left in terms of addressing security issues in the design phase. And throughout all this is the importance of being able to communicate security principles and how your design and testing reduces risk.

Register for the DevSecOps eSummit for which Ted will be a panelist:

https://onlinexperiences.com/Launch/QReg.htm?ShowUUID=5673DA7C-B8C2-4A3E-B675-C6BBF45DC04F

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw141

The post Hackable; How to do Application Security Right – Ted Harrington – ASW #141 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/hackable-how-to-do-application-security-right-ted-harrington-asw-141/?utm_source=rss&utm_medium=rss&utm_campaign=hackable-how-to-do-application-security-right-ted-harrington-asw-141

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

This is about the Security Operations Center (SOC). And automation. And of course SOC automation.

Let’s start from a dead-obvious point: you cannot and should not automate away all people from your SOC today. Or, as my esteemed colleague said, “Stop Trying To Take Humans Out Of Security Operations.”

Despite this point being dead-obvious today, I want to present a few arguments to further support it — it will be clear why in the end…

We need humans because the attackers are humans with their own creativity, irrationality, weirdness, etc. As one vendor once said, “you have an adversary problem, not a malware problem.” We need to hunt and not rely solely on automated systems for things like detection — hence humans are a must. This side of the argument boils down to “we need humans because the attackers are [also human].” This argument is also enhanced by arguments “why robots suck for security” and all that.

So good automation is a “force multiplier,” not a force replacer. Admittedly, some tasks — like data enrichment — are better done by machines, and humans can — and should — be rid of them. The point is to remove some tasks from humans and not to remove the humans from the SOC [entirely].

Furthermore, bad automation kills. This is due to a perennial problem that also plagues the use of ML/AI in security: garbage in — garbage out. This problem is further boosted with the fact that today’s automation logic (whether for detection or remediation) is just not smart enough for the complex world of IT around it. So, neither the data quality, nor the algorithms measure up. This is all true, while “cybersecurity is the most intellectually demanding profession on the planet.”

ED209, the most famous “failure of security automation” from Robocop (1990)

So. Convinced? Sure. But let’s continue on our journey…

All the while, there are more and more voices for more automation. Their logic is also very understandable. We need automation, because we need to scale better and go faster, we have too much data, alerts, signals, threats, etc. There is much to be said about the value of various forms of automation in security (in general) and in security operations (in particular).

However, as I said above, to keep the discussion sane we always remind ourselves that trying to take the humans out of SOC is more or less insane.

Still with me? OK, but now you’d be somewhat surprised where our journey will suddenly turn…

Now, go and imagine the following scenarios:

  • You face the attacker in possession of a machine that can auto-generate reliable zero day exploits and then use them (an upgraded version of what was the subject of 2016 DARPA Grand Challenge)
  • You face the attackers who use worms for everything, and these are not the dumb 2003 worms, but these are coded by the best of the best of the offensive “community”
  • Your threat assessment indicates that “your” attackers are adopting automation faster than you are and the delta is increasing (and the speed of increase is growing).

Would you still say the same? Would you still give the same advice? All these are very hypothetical in 2021, to be sure, but what about 2025? 2030? 2035?

Frankly, you can cheat and say “the middle way is the way: humans need to work with machines.” And things would feel nice for a moment, until you realize this is what chess players said sometime after their first rout in 1997. There was a concept of human+machine chess that looked really awesome in 1998–2015, but then was quickly and mercilessly killed by the improving neural networks. Naturally, one may counter that chess is mathematically solvable while information security is not (by a wide, wide, wide margin). Sure, this argument holds water …today.

Conclusion

Today, I will still also say “Stop Trying To Take Humans Out Of Security Operations” but somewhere in the very back of my mind, a scary and cold uncoiling worm of doubt is born …

Thanks to Brandon Levene for a great discussion and some text contributed to this post.

Thanks to Dave Aitel for the disruptive ideas that triggered me to write this.


Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait… was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait… appeared first on Security Boulevard.

Read More

The post Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait… appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait/?utm_source=rss&utm_medium=rss&utm_campaign=stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait

Tom Cruise is a Fake. For Real This Time.

Something I’ve always known about Tom Cruise is that he is a fake. Literally. He is a paid actor, who makes a living from being a fake. He is highly paid because apparently his fakes are so good. Now comes a stark warning that evidence has been found of Tom Cruise, the fake, being faked. … Continue reading Tom Cruise is a Fake. For Real This Time.

The post Tom Cruise is a Fake. For Real This Time. appeared first on Security Boulevard.

Read More

The post Tom Cruise is a Fake. For Real This Time. appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/tom-cruise-is-a-fake-for-real-this-time/?utm_source=rss&utm_medium=rss&utm_campaign=tom-cruise-is-a-fake-for-real-this-time

BSides Calgary 2020 – Kurt Pomeroy’s ‘How To Successfully Transition From It Generalist To Penetration Tester’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Kurt Pomeroy’s ‘How To Successfully Transition From It Generalist To Penetration Tester’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Kurt Pomeroy’s ‘How To Successfully Transition From It Generalist To Penetration Tester’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/bsides-calgary-2020-kurt-pomeroys-how-to-successfully-transition-from-it-generalist-to-penetration-tester/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-kurt-pomeroys-how-to-successfully-transition-from-it-generalist-to-penetration-tester

Matt Kelly’s Radical Compliance

via the inimitable Matt Kelly a RadicalCompliance !

via the inimitable Matt Kelly a RadicalCompliance!

Permalink

The post Matt Kelly’s Radical Compliance appeared first on Security Boulevard.

Read More

The post Matt Kelly’s Radical Compliance appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/matt-kellys-radical-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=matt-kellys-radical-compliance

DoD: Get Started With a CMMC Self-Assessment Now | Apptega

The U.S. Department of Defense (DoD) recommends prime contractors and subcontractors in the Defense Industrial Base (DIB) prepare for Cybersecurity Maturity Model Certification (CMMC) requirements in contracts now even though no organizations are yet accredited to conduct official certification assessments.

The post DoD: Get Started With a CMMC Self-Assessment Now | Apptega appeared first on Security Boulevard.

Read More

The post DoD: Get Started With a CMMC Self-Assessment Now | Apptega appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/dod-get-started-with-a-cmmc-self-assessment-now-apptega/?utm_source=rss&utm_medium=rss&utm_campaign=dod-get-started-with-a-cmmc-self-assessment-now-apptega

Europe is the Top Fraud Attacking Region of 2020

Europe displaced Asia to emerge as the overall top attacking region of 2020. Plunging economies and financial hardships in Europe forced a large number of desperate people towards fraud in order to make ends meet The coronavirus pandemic has damaged the global economy and caused financial hardships to millions of people around the globe. People […]

The post Europe is the Top Fraud Attacking Region of 2020 appeared first on Security Boulevard.

Read More

The post Europe is the Top Fraud Attacking Region of 2020 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/europe-is-the-top-fraud-attacking-region-of-2020/?utm_source=rss&utm_medium=rss&utm_campaign=europe-is-the-top-fraud-attacking-region-of-2020

Defending online anonymity and speech with Eva Galperin: Lock and Code S02E03

This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we talk to Eva Galperin, director of cybersecurity for Electronic Frontier Foundation, about the importance of protecting online anonymity and speech.

In January, the New York Times exposed a public harassment campaign likely waged by one woman against the family of her former employer. Decades after being fired, the woman allegedly wrote dozens of fraudulent posts across the Internet, ruining the family’s reputation and often slipping past any repercussions.

Frequently, the websites that hosted this content refused to step in. And, in fact, depending on what anyone posts on major websites today, those types of refusals are entirely within a company’s right.

These stories frequently produce reactionary “solutions” to the Internet–from proposals to change one foundational law to requiring individuals to fully identify themselves for every online conversation. Those solutions, however, can often harm others, including government whistleblowers, human rights activists working against oppressive governments, and domestic abuse survivors.

Tune in to hear about the importance of online anonymity for domestic abuse survivors and why changing one key Internet law will not actually fix the problems we have today, on the latest episode of Lock and Code, with host David Ruiz.

You can also find us on the Apple iTunes store, Spotify, and Google Podcasts, plus whatever preferred podcast platform you use.

We cover our own research on:

Other cybersecurity news

Stay safe, everyone!

The post Defending online anonymity and speech with Eva Galperin: Lock and Code S02E03 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/defending-online-anonymity-and-speech-with-eva-galperin-lock-and-code-s02e03/?utm_source=rss&utm_medium=rss&utm_campaign=defending-online-anonymity-and-speech-with-eva-galperin-lock-and-code-s02e03

Wizards 2020: Celebrating a community of innovators!

Wizards is a global ideation program that allows Akamai employees to submit their innovative ideas and contribute to the business transformation of Akamai. The program has been running for eight years and has received more than 5000 idea submissions. We are proud that Akamai products like Page Integrity and Enterprise Threat Protector were once ideas on the Wizards portal, as were more than 45 other successful suggestions.

The post Wizards 2020: Celebrating a community of innovators! appeared first on Security Boulevard.

Read More

The post Wizards 2020: Celebrating a community of innovators! appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/wizards-2020-celebrating-a-community-of-innovators/?utm_source=rss&utm_medium=rss&utm_campaign=wizards-2020-celebrating-a-community-of-innovators

CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own

The CISO must interact with many different groups within the company. These groups differ in the amount of business acumen and technical depth necessary. The CISO must have self-awareness of how to approach each of these different types of stakeholders, as well as ensuring appropriate self-care is taken to limit burnout, stress and anxiety.

The post CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own appeared first on Security Boulevard.

Read More

The post CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/ciso-stories-podcast-without-building-a-ciso-eq-you-may-be-on-your-own/?utm_source=rss&utm_medium=rss&utm_campaign=ciso-stories-podcast-without-building-a-ciso-eq-you-may-be-on-your-own

Fun with DNS over TLS (DoT), (Mon, Mar 1st)

Going back a few weeks, we discussed how DNS over HTTPS (DoH) works (https://isc.sans.edu/forums/diary/Fun+with+NMAP+NSE+Scripts+and+DOH+DNS+over+HTTPS/27026/)  – very much as an unauthenticated API over HTTPS.  But DNS over TLS (DoT) has been with us for a fair bit longer (May 2016), why haven’t we heard about it so much?

After wrestling with it for a bit, I can tell you why!

DoH is easy to work with, since we have so many HTTPS tools at our disposal.  Plus DoH was first implemented in browsers, and the browser developers *live* in HTTPS, so DoH is a cake-walk for them.  DNSSEC is basically plain old unencrypted DNS, but with signature records.

DoT on the other hand is a whole ‘nother beast.  It’s still basic DNS, but encapsulated in TLS.  So to make DoT calls we need a toolset to create TLS packets, then send and validate them using the certificate at the server side.  So the first tool that came to my mind of course was scapy, but read on, I used an easier method ..

To allow all of the mentioned DNS protocols to live on one server, DoT lives on tcp/853.  This makes for an easy NMAP scan if you’re looking for this service.  NMAP tags the port correctly, but an NMAP version scan (-sV) won’t identify  the DoT service.  It will however find some critical strings in the fingerprint, things like “DNSVersionBindReqTCP” and “DNSStatusRequestTCP” – so a version scan will validate the service enough for your eyes to see it, without calling it out definitively.  You can also of course validate the certificate on port tcp/853 using NMAP’s ssl-cert.nse script or openssl:

nmap -p853 –script ssl-cert 8.8.8.8

Starting Nmap 7.80 ( https://nmap.org ) at 2021-03-01 07:55 Eastern Standard Time

Nmap scan report for 8.8.8.8

Host is up (0.012s latency).

 

PORT    STATE SERVICE

853/tcp open  domain-s

| ssl-cert: Subject: commonName=dns.google/organizationName=Google LLC/stateOrProvinceName=California/countryName=US

| Subject Alternative Name: DNS:dns.google, DNS:*.dns.google.com, DNS:8888.google, DNS:dns.google.com, DNS:dns64.dns.google, IP Address:2001:4860:4860:0:0:0:0:64, IP Address:2001:4860:4860:0:0:0:0:6464, IP Address:2001:4860:4860:0:0:0:0:8844, IP Address:2001:4860:4860:0:0:0:0:8888, IP Address:8.8.4.4, IP Address:8.8.8.8

| Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US

| Public Key type: rsa

| Public Key bits: 2048

| Signature Algorithm: sha256WithRSAEncryption

| Not valid before: 2021-01-26T08:54:07

| Not valid after:  2021-04-20T08:54:06

| MD5:   9edd 82e5 5661 89c0 13a5 cced e040 c76d

|_SHA-1: 2e80 c54b 0c55 f8ad 3d61 f9ae af43 e70c 1e67 fafd

Nmap done: 1 IP address (1 host up) scanned in 24.43 seconds

Me, I took the easy way out for DoT queries and installed the knot-dnsutils (sudo apt-get install knot-dnsutils), which installs kdig to do all the heavy lifting for me.  As the name implies, kdig does just about everything that dig does, but for this task gives you parameters to make DoT queries.

So an A record query over DoT from kdig looks just very much like DOS query outpuyt from dig:

$ kdig @dns.google.com +tls-ca  isc.sans.edu A

;; TLS session (TLS1.3)-(ECDHE-X25519)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM)

;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 57540

;; Flags: qr rd ra; QUERY: 1; ANSWER: 2; AUTHORITY: 0; ADDITIONAL: 1

 

;; EDNS PSEUDOSECTION:

;; Version: 0; flags: ; UDP size: 512 B; ext-rcode: NOERROR

;; PADDING: 391 B

;; QUESTION SECTION:

;; isc.sans.edu.                IN      A

;; ANSWER SECTION:

isc.sans.edu.           4       IN      A       45.60.103.34

isc.sans.edu.           4       IN      A       45.60.31.34

 

;; Received 468 B

;; Time 2021-03-01 04:58:51 PST

;; From 8.8.8.8@853(TCP) in 38.9 ms

Note all the TLS session info at the top, and the port number in the last line.

As you’d expect, if you’re just after answers you can use the +short parameter:

# kdig @dns.google.com +tls-ca +short www.coherentsecurity.com AAAA

robvandenbrink.github.io.

.. yup, I host my website on github, handiest github feature ever (ok, maybe not the handiest, but still pretty darned handy)

Other handy parameters in kdig?

  • Just as in dig, you can always tack on the “-d” parameter for debug output
  • +tls-hostname can be used to over-ride the server name during TLS negotiation.  This means you can even use the server’s IP address when you use this parameter.
  • Related to tls-hostname, +tls-sni adds the Server Name Indication field to the request

Without constructing the TLS packet, how can I use DoT in an NMAP script?  I again took the easy way out and used kdig, in combination with the lua command os.execute.  Yup, in the time honoured tradition of coding laziness I shelled out and executed the matching OS command!  In the DoH script I wrote I did a quick check to make sure that the host was running HTTP services on port 443 with “shortport.http”.  In the DoT script I changed this, to ensure that TLS is running on the scanned port, using the “shortport.ssl” check.  An example scan is shown below:

$ nmap -p853 –script dns-dot.nse 8.8.8.8 –script-args target=www.cisco.com,query=AAAA

Starting Nmap 7.80 ( https://nmap.org ) at 2021-03-01 05:13 PST

Nmap scan report for dns.google (8.8.8.8)

Host is up (0.017s latency).

 

PORT    STATE SERVICE

853/tcp open  domain-s

| dns-dot:

|   www.cisco.com.akadns.net.

|   wwwds.cisco.com.edgekey.net.

|   wwwds.cisco.com.edgekey.net.globalredir.akadns.net.

|   e2867.dsca.akamaiedge.net.

|   2607:f798:d04:189::b33

|_  2607:f798:d04:191::b33

 

Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

You can find the DoT script here: https://github.com/robvandenbrink/dns-dot . Because is calls kdig, you’ll need the knot-dnsutils package installed before this script will run.  If you’re interested in combining NMAP scans with different OS commands you’re welcome to review the source code and use whatever you need!

Do you have a handy nmap script that uses os.execute to do the “behind the scenes” work?  Please, share a link in our comment form!

 

References:
DoT RFD: https://tools.ietf.org/html/rfc7858

Usage Profiles for DNS over TLS and DNS over DTLS: https://tools.ietf.org/html/rfc8310

knot-dnsutils: https://www.knot-dns.cz/

 

===============
Rob VandenBrink
rob<at>coherentsecurity.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Fun with DNS over TLS (DoT), (Mon, Mar 1st) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/01/fun-with-dns-over-tls-dot-mon-mar-1st/?utm_source=rss&utm_medium=rss&utm_campaign=fun-with-dns-over-tls-dot-mon-mar-1st

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...