bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

250
active users

#sbblogwatch

0 posts0 participants0 posts today
Richi Jennings<p>Larry’s PR angels desperately dance on the head of a pin.</p><p><a href="https://vmst.io/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> is now admitting that, yes, an <a href="https://vmst.io/tags/OracleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OracleCloud</span></a> service was breached—or so we’re told by deep throat sources. This is, of course, despite last week’s vehement denials.</p><p>Yet it’s still not official. And Oracle seems to be justifying its previous denial with a semantic sleight-of-hand worthy of Bill Clinton. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we see men tic.</p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/04/oracle-cloud-breach-redux-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/04/</span><span class="invisible">oracle-cloud-breach-redux-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Larry Ellison’s PR pukes desperately follow the script.</p><p>A hacker claims to have breached <a href="https://vmst.io/tags/OracleCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OracleCloud</span></a> Infrastructure (OCI), stealing 6,000,000 records. But <a href="https://vmst.io/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a> Corp. says that’s not true.</p><p>However, many customers confirmed the data is genuine. Several researchers point to a four-year-old critical vulnerability as the hacker’s entry point. But still Oracle keeps up the pretense.</p><p>“There has been no breach,” the PR flaks cry. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we cry too. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/03/oracle-cloud-breach-deny-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">oracle-cloud-breach-deny-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Personal genomics firm tells customers your data is safe—but few will trust the loss-making biotech pioneer.</p><p>CEO Anne Wojcicki has quit <a href="https://vmst.io/tags/23andMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>23andMe</span></a>. The board wouldn’t let her take it private. And now the company is heading into <a href="https://vmst.io/tags/bankruptcy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bankruptcy</span></a> protection, raising concerns about privacy, potential government access to the data and the company’s future business practices under new owners.</p><p>Should you be worried about your genetics ending up in the wrong hands? In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we are. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/03/23andme-bankrupt-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">23andme-bankrupt-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>No, Elon — X DDoS was NOT by Ukraine</p><p><a href="https://vmst.io/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> marks the botnet: <a href="https://vmst.io/tags/Outage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Outage</span></a> outrage was a Ukrainian cyberattack, implies our favorite African billionaire comedy villain.</p><p>The social media platform formerly known as <a href="https://vmst.io/tags/Twitter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Twitter</span></a> went offline earlier this week. It was swamped by wave after wave of distributed denial of service attacks (DDoS). Now-owner <a href="https://vmst.io/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ElonMusk</span></a> (pictured) has been telling everyone the <a href="https://vmst.io/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> traffic came from Ukraine.</p><p>O RLY? That’s “garbage,” say experts. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we never stopped calling it Twitter. </p><p>@TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/03/elon-musk-x-ddos-ukraine-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">elon-musk-x-ddos-ukraine-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>‘Ban These Chinese Routers NOW,’ Cries House Committee<br>TP-Link in crosshairs, along with other brands.</p><p><a href="https://vmst.io/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> consumer-grade networking gear is a dangerous <a href="https://vmst.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> threat, argue these fine gentlemen. Rep. Raja Krishnamoorthi (D-Illinois), Rob Joyce (former NSA director of cybersecurity) and Rep. John Moolenaar (R-Michigan) have hatched a plan to eradicate TP-Link routers and other plastic pigs from our homes.</p><p><a href="https://vmst.io/tags/TPLINK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLINK</span></a> on the other hand, is spitting feathers, arguing it’s not been a “Chinese” company for years. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we get familiar with <a href="https://vmst.io/tags/OpenWRT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenWRT</span></a>. </p><p><a href="https://securityboulevard.com/2025/03/krishnamoorthi-joyce-moolenaar-tp-link-china-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">krishnamoorthi-joyce-moolenaar-tp-link-china-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>End-to-end <a href="https://vmst.io/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> battle continues.</p><p><a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> appeals a United Kingdom government order to create a back door in the <a href="https://vmst.io/tags/iCloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iCloud</span></a> storage service. As we learned last month, those pesky Brits are demanding Apple break its end-to-end encryption, also known as Advanced Data Protection (<a href="https://vmst.io/tags/ADP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ADP</span></a>).</p><p>(We only know this because secret sources spoke to Tim Bradshaw and Lucy Fisher. Said secret sources revealed the secret complaint to the UK’s Investigatory Powers Tribunal, appealing the secret order—in secret.)</p><p>As always with attempts to break <a href="https://vmst.io/tags/E2EE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>E2EE</span></a>, the math ain’t mathing. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we worry about dumb pols: <a href="https://securityboulevard.com/2025/03/apple-appeals-uk-adp-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/03/</span><span class="invisible">apple-appeals-uk-adp-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs.</p><p>Academic researchers discovered a vuln chain in Apple’s <a href="https://vmst.io/tags/FindMy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindMy</span></a>’ network. Dubbed <a href="https://vmst.io/tags/nRootTag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nRootTag</span></a>, it allows hackers to track any Bluetooth device without the owner’s knowledge.</p><p>Breaking news: <a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> has finally begun to partially patch the flaws, but only in *some* OS versions. Researchers warn a full fix “will take years,” in part because you can’t update the <a href="https://vmst.io/tags/AirTag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AirTag</span></a>​s themselves. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we disable dental protocols. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/02/nroottag-apple-find-my-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/02/</span><span class="invisible">nroottag-apple-find-my-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a> <a href="https://vmst.io/tags/AAPL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AAPL</span></a></p>
Richi Jennings<p>iPhone app sends unencrypted data to China—and Android app appears even worse.</p><p><a href="https://vmst.io/tags/DeepSeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepSeek</span></a> has yet another <a href="https://vmst.io/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> palaver. Researchers say its <a href="https://vmst.io/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> apps are horribly insecure. Outdated encryption, hardcoded keys and plain-text chattiness are just three of the problems they found.</p><p>And now, <a href="https://vmst.io/tags/Congress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Congress</span></a> wants to ban the app—just like they did to TikTok. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we ignore previous instructions. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/02/deepseek-ai-app-security-privacy-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/02/</span><span class="invisible">deepseek-ai-app-security-privacy-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Stop using this <a href="https://vmst.io/tags/healthcare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>healthcare</span></a> equipment, say Cybersecurity &amp; Infrastructure Security Agency and Food &amp; Drug Administration.</p><p>These <a href="https://vmst.io/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> patient monitors have at least three <a href="https://vmst.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> vulnerabilities: Contec’s CMS8000 and its badge engineered clones, such as the Epsimed MN-120. Federal agencies say switch them off (or at least get ’em off the net).</p><p>And one CVE has a critical score, of 9.8. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we dust off the old-skool sphygmomanometer. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/02/contec-epsimed-china-fda-cisa-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/02/</span><span class="invisible">contec-epsimed-china-fda-cisa-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>New York Blood Center Enterprises crippled by <a href="https://vmst.io/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> scrotes unknown.</p><p>Vampire “cyberterrorists” have sucked the life out of <a href="https://vmst.io/tags/NYBCe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NYBCe</span></a>, a nonprofit <a href="https://vmst.io/tags/BloodDonation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BloodDonation</span></a> organization. Supplies to more than 400 hospitals are now at risk.</p><p>It’s no joke. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we’re full to the brim with righteous indignation. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/01/nybc-blood-ransomware-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/01/</span><span class="invisible">nybc-blood-ransomware-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Richi Jennings<p>Want more <a href="https://vmst.io/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> bugs? “You’re gonna be in a great mood all day.”</p><p><a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a>’s latest three generations of <a href="https://vmst.io/tags/ARM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARM</span></a> ISA chips have a pair of <a href="https://vmst.io/tags/Spectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spectre</span></a>-like vulnerabilities. But, unlike other <a href="https://vmst.io/tags/SpeculativeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpeculativeExecution</span></a> flaws, this one seems like the real deal: It could actually be exploited to steal your private info. “Four or five seconds—it’s done!”</p><p><a href="https://vmst.io/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a>’s known about at least one of the bugs for TEN months. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we wonder why Tim’s crew did nothing about it. @TheFuturumGroup @TechstrongGroup @SecurityBlvd: <a href="https://securityboulevard.com/2025/01/slap-flop-apple-silicon-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/01/</span><span class="invisible">slap-flop-apple-silicon-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a> $AAPL</p>
Richi Jennings<p><a href="https://vmst.io/tags/NAS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NAS</span></a> maker does a <a href="https://vmst.io/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a>⁠—cleanup on /dev/dsk/c1t2d3s4 please</p><p>Storage queens <a href="https://vmst.io/tags/QNAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QNAP</span></a> squashed some vulns last week, but the cure was worse than the disease. After applying the update, users found they couldn’t log in to their networked disk arrays, nor use many of the products’ features.</p><p>The firm stresses that the problems only affected some of its products. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we’re thankful for small mercies. At @TechstrongGroup⁠’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/11/qnap-bad-patch-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/11/</span><span class="invisible">qnap-bad-patch-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>