ML
    • Register
    • Login
    • Search
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups

    Miscellaneous Tech News

    News
    78
    7315
    184329
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Danp
      Danp last edited by

      American Dental Association hit by new Black Basta ransomware

      Probably forget to secure their bluetooth 😁

      scottalanmiller 1 Reply Last reply Reply Quote 0
      • scottalanmiller
        scottalanmiller @Danp last edited by

        @Danp said in Miscellaneous Tech News:

        American Dental Association hit by new Black Basta ransomware

        Probably forget to secure their bluetooth 😁

        They were... bracing for this.

        dafyre 1 Reply Last reply Reply Quote 3
        • dafyre
          dafyre @scottalanmiller last edited by

          @scottalanmiller said in Miscellaneous Tech News:

          @Danp said in Miscellaneous Tech News:

          American Dental Association hit by new Black Basta ransomware

          Probably forget to secure their bluetooth 😁

          They were... bracing for this.

          They really need to get things straightened out.

          1 Reply Last reply Reply Quote 0
          • Danp
            Danp last edited by

            I think there's a flossing joke in there somewhere, but I just can't extract it.

            dbeato dafyre 2 Replies Last reply Reply Quote 0
            • dbeato
              dbeato @Danp last edited by

              @Danp braces 😛

              1 Reply Last reply Reply Quote 0
              • dafyre
                dafyre @Danp last edited by

                @Danp said in Miscellaneous Tech News:

                I think there's a flossing joke in there somewhere, but I just can't extract it.

                You should really quit stringing this along.

                1 Reply Last reply Reply Quote 1
                • black3dynamite
                  black3dynamite last edited by

                  Proxmox VE 7.2
                  https://www.proxmox.com/en/training/video-tutorials/item/what-s-new-in-proxmox-ve-7-2

                  scottalanmiller 1 Reply Last reply Reply Quote 1
                  • scottalanmiller
                    scottalanmiller @black3dynamite last edited by

                    @black3dynamite said in Miscellaneous Tech News:

                    Proxmox VE 7.2
                    https://www.proxmox.com/en/training/video-tutorials/item/what-s-new-in-proxmox-ve-7-2

                    Nice. Time to run the updates.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmiller
                      scottalanmiller last edited by

                      Fedora 36 has relelased.

                      1 Reply Last reply Reply Quote 0
                      • nadnerB
                        nadnerB last edited by

                        https://www.itnews.com.au/news/active-directory-defaults-lead-to-no-fix-privesc-vulnerability-579808

                        A security researcher has published a tool that can take advantage of an unfixable security issue that lets attackers escalate their privileges in Windows domains to those of the SYSTEM superuser.

                        nadnerB 1 Reply Last reply Reply Quote 0
                        • nadnerB
                          nadnerB @nadnerB last edited by nadnerB

                          @nadnerB said in Miscellaneous Tech News:

                          https://www.itnews.com.au/news/active-directory-defaults-lead-to-no-fix-privesc-vulnerability-579808

                          A security researcher has published a tool that can take advantage of an unfixable security issue that lets attackers escalate their privileges in Windows domains to those of the SYSTEM superuser.

                          ^That appears to be a little sensationalist.^
                          From the (article) linked GitHub repo:
                          This is essentially a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
                          (Bold added by me)

                          It can be defended against, just not with default settings.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post