Using Free Let’s Encrypt SSL/TLS Certificates with NGINX
Using Free Let’s Encrypt SSL/TLS Certificates with NGINX
WARMCOOKIE One Year Later: New Features and Fresh Insights
The WARMCOOKIE backdoor continues to evolve, with ongoing updates and new infections observed. Recent developments include new handlers for executing various file types, a string bank for defense evasion, and code optimizations. A campaign ID field has been added, providing context for operators. Infrastructure analysis reveals a default SSL certificate potentially used for WARMCOOKIE back-ends. Despite disruption attempts, the backdoor remains active in malvertising and spam campaigns. The malware's selective usage and continuous updates suggest its persistence as a threat, highlighting the need for enhanced organizational protection measures.
Pulse ID: 68e377d0b3f8991035cc2a27
Pulse Link: https://otx.alienvault.com/pulse/68e377d0b3f8991035cc2a27
Pulse Author: AlienVault
Created: 2025-10-06 08:03:28
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #Bank #CyberSecurity #InfoSec #Malvertising #Malware #OTX #OpenThreatExchange #RAT #SSL #Spam #bot #AlienVault
Lance o seu site com domínio .PT gratuito e apoio técnico dedicado na Host TugaTech
🔗 https://tugatech.com.pt/t72191-lance-o-seu-site-com-dominio-pt-gratuito-e-apoio-tecnico-dedicado-na-host-tugatech
#ecommerce #google #https #navegador #online #portugal #segurança #sem #servidores #SSL #velocidade #web #WordPress
OpenSSL 3.6 Officially Released with LMS Signature Verification Support, More
Tu souhaites lancer ton site web sans te prendre la tête
https://tozounoir.zouluvo.com/tu-souhaites-lancer-ton-site-web-sans-te-prendre-la-tete/
#hébergement #siteweb #blog #boutiqueenligne #portfolio #WordPress #création #domaine #serveur #rapide #sécurité #SSL #support #nomdedomaine #CMS #ecommerce #webmaster #serveurweb #performance #tutoriel #plugin #thème #gestion #sauvegarde #installation #optimisation #lancement #marketing #trafic #référencement #hebergeur
Надо же, до людей стало доходить. Прямо как в анекдоте про индейца и отсутствие четвёртой стены.
Нюанс в том, что часть этих серверов Cloudflare или же GFE располагаются поближе к пользователям — у ваших интернет провайдерах, на бэкбонах в точках обмена трафиком. Т.е. фактически, к ним можно подвести каналы СОРМ — прямое управление и мониторинг с пульта ФСБ.
Однако, ни Cloudflare ни Google на такое идти не хотят и потому будут подвергаться прессингу госрегуляторами. Поскольку никто и никогда из службистов не потерпит того, чтобы хостинг провайдеры могли подглядывать в чужой трафик (своих клиентов), для извлечения прибыли. Однако, выдавали доступ к этому лишь службистам альянса «пяти глаз». Одновременно отказывая службистам тех стран, на рынке которых работают — на гражданах которых зарабатывают.
#TLS #SSL #security #privacy
RE: https://mastodon.social/users/pojntfx/statuses/115266889590878748
Update on Ongoing Akira Ransomware Campaign
The Akira ransomware campaign targeting SonicWall SSL VPN accounts has intensified since July 2025, with new infrastructure observed as recently as September 20. Threat actors are exploiting previously exfiltrated credentials, including those with OTP MFA, likely related to CVE-2024-40766. The attacks are characterized by extremely short dwell times, sometimes as brief as 55 minutes from access to encryption. The campaign is affecting various industries and organization sizes, suggesting opportunistic mass exploitation. Key recommendations include resetting SSL VPN and Active Directory credentials, implementing SonicWall's security measures, blocking VPN access from suspicious IPs and ASNs, updating to SonicOS 7.3.0, and deploying additional security monitoring tools.
Pulse ID: 68d74d70a57d9bf9567fcfcc
Pulse Link: https://otx.alienvault.com/pulse/68d74d70a57d9bf9567fcfcc
Pulse Author: AlienVault
Created: 2025-09-27 02:35:28
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Akira #CyberSecurity #ESET #Encryption #InfoSec #MFA #OTX #OpenThreatExchange #RAT #RansomWare #SSL #VPN #bot #AlienVault
Qui pourrais m'aider à configurer le SSL et zone DNS pas à pas sous OVH, je n'y arrive pas du tout, mes sous domaines pointent bien vers les containers docker, mais rien ne fonctionne pour avoir un https et un certificat valide... #help #ovh #aide #besoindaide #ssl
@cloudflare how about you close up shot, #RogueISP?
Not to mention I won't forgive nor forget your collection of #credentials you're #phishing with your #SSL-#MITM and you having hosted #KiwiFarms as well #Daesh #Propaganda whilst #bootlicking #Russia.
Kindly just cease any business.
Thanks!
SSL-Zertifikat im IIS installieren – so einfach geht’s
Mir fällt immer wieder auf: Viele haben mit dem Thema „SSL-Zertifikat im IIS“ bisher kaum Berührungspunkte gehabt. Dabei ist der Ablauf eigentlich überschaubar, wenn man die richtigen Schritte kennt. Genau deshalb möchte ich dir hier Schritt für Schritt zeigen, wie es funktioniert. Ich ...
https://www.cleveradmin.de/blog/2025/09/ssl-zertifikat-im-iis-installieren/
#Windows #iis #pfx #SSL #webhosting #windowsserver #zertifikat
Help, I need a code signing certificate that won't bankrupt me.
Three years ago, I paid $100 for a three-year code signing certificate. I've signed all my open-source projects' releases with it. Now that it's renewal time, Certera (SignMyCode.com) wants almost $700 for the same three-year certificate (excluding the mandatory HSM purchase, which I am totally on board with).
I write silly C and PowerShell code, and I timestamp my signatures so that they're perpetually valid. My PowerShell Gallery stuff, as well as binaries of aprs-weather-submit on Windows and macOS, are all signed and hashed (but not notarized by Apple, because that's another $99 a year for something that feels done unless Bob Bruninga's followers are thinking about APRS 2.0).
If I can't find a solution, anything I write or update in the future will have to be released as unsigned unless I half-ass something (like the Notepad++ developer using self-signed certs -- semi-dangerously clever). $100 every three years, fine. $700 every three years, and I'll do it if my three fans click my Buy Me A Coffee link over and over.
Is there any CA out there that will offer open-source, not-for-profit developers like me a chance to get globally-trusted code signing certificates? I don't think SigStore ever took off (sadly), and even if it did, I don't think it's part of the Microsoft Authenticode program.
#CodeSigning #SSL #TLS #certificates #Certera #SoftwareDevelopment #C #PowerShell #PowerShellGallery #AmateurRadio #HamRadio #APRS #APRS-Weather-Submit #GitHub #security #developer #Windows #macOS #Linux #Authenticode #DevSecOps #DevOps
Since today, every time you renew your https-certificates (assuming via letsencrypt, which is most of it), it will be, for a very small part, work due to code I wrote. Sure, a very insignificant piece, but still, I am proud of it. Securing the internet, one patch at a time!
https://github.com/letsencrypt/boulder/releases/tag/v0.20250922.0
https://github.com/letsencrypt/boulder/pull/8374
#letsencrypt, #https, #security #infosec #tls #ssl #opensource #freesoftware
https://www.youtube.com/watch?v=XPFBPNCFItE
New in SecPoint® Protector™ V67: Let’s Encrypt SSL Certificates
Now you can automatically request, install, and renew free SSL certificates directly from Let’s Encrypt – built right into the Protector.
Always up-to-date security
Hassle-free automatic renewals
Trusted by browsers worldwide
This makes securing your Protector’s web interface easier and safer than ever.
https://www.secpoint.com/protector.html
#CyberSecurity #SecPoint #Protector #Firewall #NetworkSecurity #SSL #LetsEncrypt
Unmasking Akira: The ransomware tactics you can't afford to ignore
The Akira ransomware group has been targeting UK businesses since 2023, primarily affecting retail, finance, manufacturing, and medical sectors. Their tactics include exploiting SSL VPNs, using double extortion, and focusing on financial gain. Key observations from 2023-2025 include initial access through VPN exploitation, discovery tools like Netscan and Advanced Port Scanner, privilege escalation via Veeam vulnerabilities, lateral movement through RDP and SSH, and exfiltration using tools like WinSCP and FileZilla. Akira targets backup systems, encrypts virtual disks and physical devices, and publishes stolen data on a Tor-based website. The group's activities show similarities to the Conti cybercrime organization, indicating possible links between them.
Pulse ID: 68d102f951065675d59e9f7a
Pulse Link: https://otx.alienvault.com/pulse/68d102f951065675d59e9f7a
Pulse Author: AlienVault
Created: 2025-09-22 08:04:09
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Akira #CyberCrime #CyberSecurity #Extortion #FileZilla #ICS #InfoSec #Manufacturing #OTX #OpenThreatExchange #RAT #RDP #RansomWare #SSH #SSL #UK #VPN #WinSCP #bot #AlienVault