Monday, December 30, 2024

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [30 Dec]

Threat of the Week

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it's a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization.


In this week's update, we'll cover the most important developments in cybersecurity. From the latest threats to effective defenses, we've got you covered with clear and straightforward insights. Let's dive in and keep your digital world secure.


⚡ Threat of the Week


Palo Alto Networks PAN-OS Flaw Under Attack — Palo Alto Networks has disclosed a high-severity flaw impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices by sending a specially crafted DNS packet. The vulnerability (CVE-2024-3393, CVSS score: 8.7) only affects firewalls that have the DNS Security logging enabled. The company said it's aware of "customers experiencing this denial-of-service (DoS) when their firewall blocks malicious DNS packets that trigger this issue."


🔔 Top News

  • Contagious Interview Drops OtterCookie Malware — North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. The malware, likely introduced in September 2024, is designed to establish communications with a command-and-control (C2) server using the Socket.IO JavaScript library, and awaits further instructions. It's designed to run shell commands that facilitate data theft, including files, clipboard content, and cryptocurrency wallet keys.

  • Cloud Atlas Continues its Assault on Russia — Cloud Atlas, a hacking of unknown origin that has extensively targeted Russia and Belarus, has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting "several dozen users" in 2024. The attacks employ phishing emails containing Microsoft Word documents, which, when opened, trigger an exploit for a seven-year-old security flaw to deliver the malware. VBCloud is capable of harvesting files matching several extensions and information about the system. More than 80% of the targets were located in Russia. A lesser number of victims have been recorded in Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.

  • Malicious Python Packages Exfiltrate Sensitive Data — Two malicious Python packages, named zebo and cometlogger, have been found to incorporate features to exfiltrate a wide range of sensitive information from compromised hosts. Both the packages were downloaded 118 and 164 times each, before they were taken down. A majority of these downloads came from the United States, China, Russia, and India.

  • TraderTraitor Behind DMM Bitcoin Crypto Heist — Japanese and U.S. authorities officially blamed a North Korean threat cluster codenamed TraderTraitor (aka Jade Sleet, UNC4899, and Slow Pisces) for the theft of cryptocurrency worth $308 million from cryptocurrency company DMM Bitcoin in May 2024. The attack is notable for the fact that the adversary first compromised the system of an employee of Japan-based cryptocurrency wallet software company named Ginco under the pretext of a pre-employment test. "In late-May 2024, the actors likely used this access to manipulate a legitimate transaction request by a DMM employee, resulting in the loss of 4,502.9 BTC, worth $308 million at the time of the attack," authorities said.

  • WhatsApp Scores Legal Victory Against NSO Group — NSO Group has been found liable in the United States after a federal judge in the state of California ruled in favor of WhatsApp, calling out the Israeli commercial spyware vendor for exploiting a security vulnerability in the messaging app to deliver Pegasus using WhatsApp's servers 43 times in May 2019. The targeted attacks deployed the spyware on 1,400 devices globally by making use of a then zero-day vulnerability in the app's voice calling feature (CVE-2019-3568, CVSS score: 9.8).


️🔥 Trending CVEs


Heads up! Some popular software has serious security flaws, so make sure to update now to stay safe. The list includes — CVE-2024-56337 (Apache Tomcat), CVE-2024-45387 (Apache Traffic Control), CVE-2024-43441 (Apache HugeGraph-Server), CVE-2024-52046 (Apache MINA), CVE-2024-12856 (Four-Faith routers), CVE-2024-47547, CVE-2024-48874, and CVE-2024-52324 (Ruijie Networks).


📰 Around the Cyber World

  • ScreenConnect Used to Deploy AsyncRAT — Microsoft has revealed that cybercriminals are leveraging tech support scams to deploy AsyncRAT through the remote monitoring and management (RMM) software ScreenConnect, the first time that ScreenConnect is used to deploy malware, instead of as a persistence or lateral movement tool. The company also said threat actors are using SEO poisoning and typosquatting to deploy SectopRAT, an infostealer used to target browser information and crypto wallets. The disclosure comes as Malwarebytes disclosed that criminals are employing decoy landing pages, also called "white pages," that utilize AI-generated content and are propagated via bogus Google search ads. The scam involves attackers buying Google Search ads and using AI to create harmless pages with unique content. The goal is to use these decoy ads to then lure visitors to phishing sites for stealing credentials and other sensitive data. Malvertising lures have also been used to distribute SocGholish malware by disguising the page as an HR portal for a legitimate company named Kaiser Permanente.

  • AT&T, Verizon Acknowledge Salt Typhoon Attacks — U.S. telecom giants AT&T and Verizon acknowledged that they had been hit by the China-linked Salt Typhoon hacking group, a month after T-Mobile made a similar disclosure. Both the companies said they don't detect any malicious activity at this point, and that the attacks singled out a "small number of individuals of foreign intelligence interest." The breaches  occurred in large part due to the affected companies failing to implement rudimentary cybersecurity measures, the White House said. The exact scope of the attack campaign still remains unclear, although the U.S. government revealed that a ninth telecom company in the country was also a target of what now appears to be a sprawling hacking operation aimed at U.S. critical infrastructure. Its name was not disclosed. China has denied any involvement in the attacks.

  • Pro-Russian Hacker Group Targets Italian Websites — Around ten official websites in Italy were targeted by a pro-Russian hacker group named Noname057(16). The group claimed responsibility for the distributed denial-of-service (DDoS) attacks on Telegram, stating Italy's "Russophobes get a well deserved cyber response." Back in July, three members of the group were arrested for alleged cyber attacks against Spain and other NATO countries. Noname057(16) is one of the many hacktivist groups that have emerged in response to the ongoing conflicts in Ukraine and the Middle East, with groups aligned on both sides engaging in disruptive attacks to achieve social or political goals. Some of these groups are also state-sponsored, posing a significant threat to cybersecurity and national security. According to a recent analysis by cybersecurity company Trellix, it's suspected that there's some kind of an operational relationship between Noname057(16) and CyberArmyofRussia_Reborn, another Russian-aligned hacktivist group active since 2022. "The group has created alliances with many other hacktivist groups to support their efforts with the DDoS attacks," Trellix said. "However, the fact that one of the previous CARR administrators, 'MotherOfBears,' has joined NoName057(16), the continuous forwarding of CARR posts, and previous statements, suggest that both groups seem to collaborate closely, which can also indicate a cooperation with Sandworm Team."

  • UN Approves New Cybercrime Treaty to Tackle Digital Threats — The United Nations General Assembly formally adopted a new cybercrime convention, called the United Nations Convention against Cybercrime, that's aimed at bolstering international cooperation to combat such transnational threats. "The new Convention against Cybercrime will enable faster, better-coordinated, and more effective responses, making both digital and physical worlds safer," the UN said. "The Convention focuses on frameworks for accessing and exchanging electronic evidence, facilitating investigations and prosecutions." INTERPOL Secretary General Valdecy Urquiza said the UN cybercrime convention "provides a basis for a new cross-sector level of international cooperation" necessary to combat the borderless nature of cybercrime.

  • WDAC as a Way to Impair Security Defenses — Cybersecurity researchers have devised a new attack technique that leverages a malicious Windows Defender Application Control (WDAC) policy to block security solutions such as Endpoint Detection and Response (EDR) sensors following a system reboot. "It makes use of a specially crafted WDAC policy to stop defensive solutions across endpoints and could allow adversaries to easily pivot to new hosts without the burden of security solutions such as EDR," researchers Jonathan Beierle and Logan Goins said. "At a larger scale, if an adversary is able to write Group Policy Objects (GPOs), then they would be able to distribute this policy throughout the domain and systematically stop most, if not all, security solutions on all endpoints in the domain, potentially allowing for the deployment of post-exploitation tooling and/or ransomware."


🎥 Expert Webinar

  1. Don't Let Ransomware Win: Discover Proactive Defense Tactics — Ransomware is getting smarter, faster, and more dangerous. As 2025 nears, attackers are using advanced tactics to evade detection and demand record-breaking payouts. Are you ready to defend against these threats? Join the Zscaler ThreatLabz webinar to learn proven strategies and stay ahead of cybercriminals. Don't wait—prepare now to outsmart ransomware.

  2. Simplify Trust Management: Centralize, Automate, Secure — Managing digital trust is complex in today's hybrid environments. Traditional methods can't meet modern IT, DevOps, or compliance demands. DigiCert ONE simplifies trust with a unified platform for users, devices, and software. Join the webinar to learn how to centralize management, automate operations, and secure your trust strategy.


🔧 Cybersecurity Tools

  • LogonTracer is a powerful tool for analyzing and visualizing Windows Active Directory event logs, designed to simplify the investigation of malicious logons. By mapping host names, IP addresses, and account names from logon-related events, it creates intuitive graphs that reveal which accounts are being accessed and from which hosts. LogonTracer overcomes the challenges of manual analysis and massive log volumes, helping analysts quickly identify suspicious activity with ease.

  • Game of Active Directory (GOAD) is a free, ready-to-use Active Directory lab designed specifically for pentesters. It offers a pre-built, intentionally vulnerable environment where you can practice and refine common attack techniques. Perfect for skill-building, GOAD eliminates the complexity of setting up your own lab, allowing you to focus on learning and testing various pentesting strategies in a realistic yet controlled setting.


🔒 Tip of the Week


Isolate Risky Apps with Separate Spaces — When you need to use a mobile app but aren't sure if it's safe, protect your personal data by running the app in a separate space on your phone. For Android users, go to Settings > Users & Accounts and create a Guest or new user profile.


Install the uncertain app within this isolated profile and restrict its permissions, such as disabling access to contacts or location. iPhone users can use Guided Access by navigating to Settings > Accessibility > Guided Access to limit what the app can do. This isolation ensures that even if the app contains malware, it cannot access your main data or other apps.


If the app behaves suspiciously, you can easily remove it from the separate space without affecting your primary profile. By isolating apps you're unsure about, you add an extra layer of security to your device, keeping your personal information safe while still allowing you to use necessary tools.


Conclusion


This week's cybersecurity updates highlight the importance of staying vigilant and prepared. Here are some simple steps to keep your digital world secure:

  • Update Regularly: Always keep your software and devices up-to-date to patch security gaps.

  • Educate Your Team: Teach everyone to recognize phishing emails and other common scams.

  • Use Strong Passwords: Create unique, strong passwords and enable two-factor authentication where possible.

  • Limit Access: Ensure only authorized people can access sensitive information.

  • Backup Your Data: Regularly backup important files to recover quickly if something goes wrong.

By taking these actions, you can protect yourself and your organization from emerging threats. Stay informed, stay proactive, and prioritize your cybersecurity. Thank you for joining us this week—stay safe online, and we look forward to bringing you more updates next week!



Monday, December 23, 2024

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

THN Weekly Recap

The online world never takes a break, and this week shows why. From ransomware creators being caught to hackers backed by governments trying new tricks, the message is clear: cybercriminals are always changing how they attack, and we need to keep up.


Hackers are using everyday tools in harmful ways, hiding spyware in trusted apps, and finding new ways to take advantage of old security gaps. These events aren't random—they show just how clever and flexible cyber threats can be.


In this edition, we'll look at the most important cyber events from the past week and share key takeaways to help you stay safe and prepared. Let's get started.


⚡ Threat of the Week


LockBit Developer Rostislav Panev Charged in the U.S. — Rostislav Panev, a 51-year-old dual Russian and Israeli national, has been charged in the U.S. for allegedly acting as the developer of the now-disrupted LockBit ransomware-as-a-service (RaaS) operation, netting about  $230,000 between June 2022 and February 2024. Panev was arrested in Israel in August 2024 and is currently pending extradition. With the latest development, a total of seven LockBit members have been charged in the U.S. That said, the group appears to be readying a new version, LockBit 4.0, that's scheduled for release in February 2025.


Gartner® Magic Quadrant™ Report


🔔 Top News

  • Lazarus Group Continues to Evolve Tactics — The North Korea-linked Lazarus Group has been observed targeting nuclear engineers with a new modular malware called CookiePlus as part of a long-running cyber espionage campaign dubbed Operation Dream Job. CookiePlus is only the latest manifestation of what security researchers have described as the growing sophistication that threat actors have begun incorporating into their malware and tactics. The variety of TTPs used highlights the versatility and diversity of the hacking group.

  • APT29 Uses Open-Source Tool to Set Up Proxies in RDP Attacks — The Russian state-sponsored group tracked as APT29 has repurposed a legitimate red teaming attack methodology that involves the use of an open-source proxy tool dubbed PyRDP to set up intermediate servers that are responsible for connecting victim machines to rogue RDP servers, deploy additional payloads, and even exfiltrate data. The development illustrates how it's possible for bad actors to accomplish their goals without having to design highly customized tools.

  • Serbian Journalist Targeted by Cellebrite and NoviSpy — An independent Serbian journalist, Slaviša Milanov, had his phone first unlocked by Cellebrite's forensic tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, which comes with capabilities to capture personal data from a target's phone and remotely turn on the phone's microphone or camera. The spyware attacks, detailed by Amnesty International, are the first time two different invasive technologies have been used against civil society members to facilitate the covert gathering of data. Serbia's police characterized the report as "absolutely incorrect."

  • The Mask Makes a Comeback — A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022. The group, first documented by Kaspersky back in early 2014, infected the company with malware such as FakeHMP, Careto2, and Goreto that are designed to harvest files, keystrokes, and screenshots; run shell commands; and deploy more malware. The origins of the threat actor are presently not known.

  • Multiple npm Packages Fall Victim to Supply Chain Attacks — Unknown threat actors managed to compromise three different npm packages, @rspack/core, @rspack/cli, and vant, and push malicious versions to the repository containing code to deploy a cryptocurrency miner on infected systems. Following discovery, respective project maintainers stepped in to remove the rogue versions.


️🔥 Trending CVEs


Some popular software has serious security flaws, so make sure to update now to stay safe. The list includes — CVE-2024-12727, CVE-2024-12728, CVE-2024-12729 (Sophos Firewall), CVE-2023-48788 (Fortinet FortiClient EMS), CVE-2023-34990, (Fortinet FortiWLM), CVE-2024-12356 (BeyondTrust Privileged Remote Access and Remote Support), CVE-2024-6386 (WPML plugin), CVE-2024-49576, CVE-2024-47810 (Foxit Software), CVE-2024-49775 (Siemens Opcenter Execution Foundation), CVE-2024-12371, CVE-2024-12372, CVE-2024-12373 (Rockwell Automation PowerMonitor 1000), CVE-2024-52875 (GFI KerioControl), CVE-2024-56145 (Craft CMS), CVE-2024-56050, CVE-2024-56052, CVE-2024-56054, CVE-2024-56057 (VibeThemes WPLMS), CVE-2024-12626 (AutomatorWP plugin), CVE-2024-11349 (AdForest theme), CVE-2024-51466 (IBM Cognos Analytics), CVE-2024-10244 (ISDO Software Web Software), CVE-2024-4995 (Wapro ERP Desktop), CVE-2024-10205 (Hitachi Ops Center Analyzer), and CVE-2024-46873 (Sharp router).



📰 Around the Cyber World

  • Recorded Future Gets Labeled "Undesirable" in Russia — Russian authorities have tagged U.S. threat intelligence firm Recorded Future as an "undesirable" organization, accusing it of participating in propaganda campaigns and cyberattacks against Moscow. Russia's Office of Prosecutor General also said the company is "actively cooperating" with U.S. and foreign intelligence services to help search, gather, and analyze data on Russian military activities, as well as Ukraine with "unrestricted access" to programs used in offensive information operations against Russia. "Some things in life are rare compliments. This being one," Recorded Future's chief executive, Christopher Ahlberg, wrote on X.

  • China Accuses the U.S. of Conducting Cyber Attacks — The National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT) accused the U.S. government of launching cyber attacks against two Chinese technology companies in a bid to steal trade secrets. CNCERT said one of the attacks, detected in August 2024, singled out an advanced material design and research unit by exploiting a vulnerability in an electronic document security management system to break into the upgrade management server and deliver trojan to over 270 hosts and siphon "a large amount of trade secret information and intellectual property." The second attack, on the other hand, targeted an unnamed high-tech enterprise of smart energy and digital information since May 2023 by weaponizing flaws in Microsoft Exchange Server to plant backdoors with an aim to harvest mail data. "At the same time, the attacker used the mail server as a springboard to attack and control more than 30 devices of the company and its subordinate enterprises, stealing a large amount of trade secret information from the company," CNCERT said. The allegations come in the midst of the U.S. accusing Chinese threat actors like Salt Typhoon of breaching its telecommunication infrastructure.

  • New Android Spyware Distributed via Amazon Appstore — Cybersecurity researchers uncovered a new Android malware that was available for download from the Amazon Appstore. Masquerading as a body mass index (BMI) calculator, the app ("BMI CalculationVsn" or com.zeeee.recordingappz) came with features to stealthily record the screen, as well as collect the list of installed apps and incoming SMS messages. "On the surface, this app appears to be a basic tool, providing a single page where users can input their weight and height to calculate their BMI," McAfee Labs said. "However, behind this innocent appearance lies a range of malicious activities." The app has been taken down following responsible disclosure.

  • HeartCrypt Packer-as-a-Service Operation Exposed — A new packer-as-a-service (PaaS) called HeartCrypt has been advertised for sale on Telegram and underground forums since February 2024 to protect malware such as Remcos RAT, XWorm, Lumma Stealer, and Rhadamanthys. Said to be in development since July 2023, its operators charge $20 per file to pack, supporting both Windows x86 and .NET payloads. "In HeartCrypt's PaaS model, customers submit their malware via Telegram or other private messaging services, where the operator then packs and returns it as a new binary," Palo Alto Networks Unit 42 said, adding it identified over 300 distinct legitimate binaries that were used to inject the malicious payload. It's suspected that the service allows clients to select a specific binary for injection so as to tailor them based on the intended target. At its core, the packer works by inserting the main payload into the binary's .text section and hijacking its control flow in order to enable the execution of the malware. The packer also takes steps to add several resources that are designed to evade detection and analysis, while simultaneously offering an optional method to establish persistence using Windows Registry modifications. "During HeartCrypt's eight months of operation, it has been used to pack over 2,000 malicious payloads, involving roughly 45 different malware families," Unit 42 said.

  • Chinese and Vietnamese-speaking Users Target of CleverSoar Installer — A highly evasive malware installer called CleverSoar is being used to target Chinese and Vietnamese-speaking victims with the Winos 4.0 framework and the Nidhogg rootkit. The malware distribution starts with MSI installer packages that likely impersonate fake software or gaming-related applications, which extract the files and subsequently execute the CleverSoar installer. "These tools enable capabilities such as keystroke logging, data exfiltration, security bypasses, and covert system control, suggesting that the campaign is part of a potentially prolonged espionage effort," Rapid7 said, describing it as an advanced and targeted threat. "The campaign's selective targeting of Chinese and Vietnamese-speaking users, along with its layered anti-detection measures, points to a persistent espionage effort by a capable threat actor." It's suspected that the threat actor is also responsible for other campaigns distributing Winos 4.0 and ValleyRAT.

  • Thousands of SonicWall Devices Vulnerable to Critical Flaws — As many as 119,503 publicly accessible SonicWall SSL-VPN devices are susceptible to serious security flaws (25,485 of critical severity and 94,018 of high severity), with over 20,000 using a SonicOS/OSX firmware version that's no longer supported by the vendor. "The majority of series 7 devices exposed online are impacted by at least one vulnerability of high or critical severity," cybersecurity company Bishop Fox said. A total of 430,363 unique SonicOS/OSX instances have been found exposed on the internet.

  • Industrial Systems Targeted in New Malware Attacks — Siemens engineering workstations (EWS) have been targeted by a malware called Chaya_003 that's capable of terminating the Siemens TIA portal process, alongside those related to Microsoft Office applications, Google Chrome, and Mozilla Firefox. The malware, once installed, establishes connections with a Discord webhook to fetch instructions for carrying out system reconnaissance and process disruption. Forescout said it also identified two incidents in which Mitsubishi EWSs were infected with the Ramnit worm. It's currently not clear if the attackers directly targeted the operational technology (OT) systems or if it was propagated via some other means, such as phishing or compromised USB drives. OT networks have also been increasingly the target of ransomware attacks, with 552 incidents reported in Q3 2024, up from 312 in Q2 2024, per Dragos. No less than 23 new ransomware groups have targeted industrial organizations during the time period. Some of the most impacted verticals included manufacturing, industrial control systems (ICS) equipment and engineering, transportation, communications, oil and gas, electric, and government.

  • Cracked Version of Acunetix Scanner Linked to Turkish IT Firm — Threat actors are selling thousands of credential sets stolen using Araneida, a cracked version of the Acunetix web app vulnerability scanner. According to Krebs on Security and Silent Push, Araneida is believed to be sold as a cloud-based attack tool to other criminal actors. Further analysis of the digital trail left by the threat actors has traced them to an Ankara-based software developer named Altuğ Şara, who has worked for a Turkish IT company called Bilitro Yazilim.


🎥 Expert Webinar

  1. Preparing for the Next Wave of Ransomware in 2025 — Ransomware is getting smarter, using encryption to hide and strike when you least expect it. Are you prepared for what's coming next? Join Emily Laufer and Zscaler ThreatLabz to explore the latest ransomware trends, how attackers use encrypted channels to stay hidden, and smart strategies to stop them. Learn how to protect your organization before it's too late—secure your spot today!

  2. The Enterprise Guide to Certificate Automation and Beyond — Join our live demo to see how DigiCert ONE simplifies trust across users, devices, and software. Discover how to centralize certificate management, automate operations, and meet compliance demands while reducing complexity and risk. Whether for IT, IoT, or DevOps, learn how to future-proof your digital trust strategy. Don't miss out—register now!


🔧 Cybersecurity Tools

  • AttackGen — It is an open-source tool that helps organizations prepare for cyber threats. It uses advanced AI models and the MITRE ATT&CK framework to create incident response scenarios tailored to your organization's size, industry, and selected threat actors. With features like quick templates for common attacks and a built-in assistant for refining scenarios, AttackGen makes planning for cyber incidents easy and effective. It supports both enterprise and industrial systems, helping teams stay ready for real-world threats.

  • Brainstorm — It is a tool that makes web fuzzing more effective by using local AI models alongside ffuf. It analyzes links from a target website and generates smart guesses for hidden files, directories, and API endpoints. By learning from each discovery, it reduces the number of requests needed while finding more endpoints compared to traditional wordlists. This tool is perfect for optimizing fuzzing tasks, saving time, and avoiding detection. It's easy to set up, works with local LLMs like Ollama, and adapts to your target.

  • GPOHunter - This tool helps identify and fix security flaws in Active Directory Group Policy Objects (GPOs). It detects issues like clear text passwords, weak authentication settings, and vulnerable GPP passwords, providing detailed reports in multiple formats. Easy to use and highly effective, GPOHunter simplifies securing your GPOs and strengthening your environment.


🔒 Tip of the Week


Don't Let Hackers Peek into Your Cloud — Cloud storage makes life easier, but it can also expose your data if not secured properly. Many people don't realize that misconfigured settings, like public folders or weak permissions, can let anyone access their files. This is how major data leaks happen—and it's preventable.


Start by auditing your cloud. Tools like ScoutSuite can scan for vulnerabilities, such as files open to the public or missing encryption. Next, control access by only allowing those who need it. A tool like Cloud Custodian can automate these policies to block unauthorized access.


Finally, always encrypt your data before uploading it. Tools like rclone make it simple to lock your files with a key only you can access. With these steps, your cloud will stay safe, and your data will remain yours.


Conclusion


The holidays are a time for celebration, but they're also peak season for cyber risks. Cybercriminals are more active than ever, targeting online shoppers, gift exchanges, and even festive email greetings. Here's how you can enjoy a secure and worry-free holiday:

  • 🎁 Wrap Your Digital Gifts with Security: If you're gifting smart gadgets, set them up with strong passwords and enable updates before wrapping them. This ensures your loved ones start safe from day one.

  • 📦 Track Packages, Not Scammers: Be wary of fake delivery notifications. Use official apps or tracking links from trusted retailers to follow your shipments.

  • ✨ Make Your Accounts Jolly Secure: Use a password manager to update weak passwords across your accounts. A few minutes now can save hours of frustration later.

  • 🎮 Game On, Safely: If new gaming consoles or subscriptions are on your list, make sure to activate parental controls and use unique account details. Gaming scams spike during the holidays.


As we head into the New Year, let's make cybersecurity a priority for ourselves and our families. After all, staying safe online is the gift that keeps on giving.


Happy Holidays, and here's to a secure and joyful season! 🎄🔒




Thursday, December 19, 2024

How 'Post Open' Helps OSS Devs Get Paid: Slashdot’s Interview with Bruce Perens

Slashdot's Interview with Bruce Perens: How He Hopes to Help 'Post Open' Developers Get Paid  

In an exclusive Slashdot interview, Bruce Perens, co-founder of the Open Source Initiative, shares his vision for 'Post Open'—a licensing model designed to help OSS developers get paid by ensuring larger companies contribute their fair share while keeping software free for small users.

Join the discussion at Slashdot.org
SD logo
SourceForge Podcast  

In this episode of the SourceForge Podcast, we speak to Steve Yegge, IC Engineer at Sourcegraph. Steve shares insights on the evolution of programming, the impact of AI-powered coding assistants, and the future of coding with a focus on CHOP (Chat-Oriented Programming)

Watch the podcast here
Podcast image
Popular Projects

project 1 echoes
Echoes it's a radio spectral analysis software for SDR devices, designed for meteor scattering purposes. Used to study natural radio phenomena.

project 2 Iperf 2
Iperf here is a means of measuring networks - capacity & latency (including ECN) over sockets both TCP and UDP. It supports both high impact and low impact techniques to obtain and report network performance.

project 1 Network Security Toolkit (NST)
Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 38 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems.

project 4 MyPhoneExplorer
MyPhoneExplorer is a versatile tool for managing Android devices. It allows contact, calendar, and note syncing, file management, backups, remote control, and screen mirroring.


project 5 OBS Studio
OBS Studios, also known as Open Broadcaster Software, is a free and open source software program for live streaming and video recording.
Editor's Business Software Picks

Below is a diverse set of interesting B2B software vendors that solve unique problems for businesses and have caught our editor's interest:

Bright Data — Optimize your ScrapeOps with the all-in-one scraping infrastructure.

Paccurate — The only 3D parcel packing intelligence platform optimizing directly for cost.

Venn — Secure your BYOD workforce without VDI

Sourcegraph Cody — Write and fix code faster with AI in JetBrains.

Unlocking the Full Potential of Linux's Most Versatile Search Tool  
The grep command, short for "global regular expression print," is one of the most powerful and frequently used tools in Unix and Linux environments. From sifting through log files to finding patterns in text, grep is a Swiss Army knife for system administrators, developers, and data analysts alike. However, many users limit themselves to its basic functionality, unaware of the myriad options that can make it even more effective.

In this article, we will delve into the wide range of grep options and demonstrate how to leverage them to handle complex search tasks efficiently.

Read more at LinuxJournal.
Linux Journal logo


SourceForge Articles and Q&A Sessions

Public Web Data Is The Game-Changer Behind Business Growth

Did you know that 89% of business leaders believe public web data is critical to the global economy? Web data has evolved from being a helpful tool to becoming an indispensable driver of innovation, competitive strategy, and AI development. Decision-makers in large B2B organizations rely on public web data that offers transformative opportunities: uncovering market trends, monitoring competitors, and enhancing AI-driven initiatives. That being said, the path to fully leveraging its potential is not without obstacles. Technical challenges like IP blocking and dynamic content, compliance hurdles, and the need for scalability continue to hinder progress.
Read more on SourceForge.net

AI Translation Tools Show Dramatic Improvement in Cultural Understanding.

The landscape of software localization is undergoing remarkable changes, driven by fast advancements in artificial intelligence. AI translations may have been notorious for missing cultural context, but the latest industry data shows that what used to be a major headache for software localization has become much less of an issue. Tthis detailed survey of over 13,000 respondents, conducted by Lokalise, a leading localization and translation management platform, throughout 2023 and 2024, shows that concerns about AI's ability to capture cultural subtleties have dropped by more than half.
Read more on SourceForge.net


Why Great Intranets Fail and How to Turn Them Around

Intranets are meant to be the lifeblood of internal communication tools and collaboration, yet many companies find that their intranets, no matter how well-intentioned, fail to meet expectations. Why do so many intranet projects fall flat, and more importantly, how can businesses turn them around? Spoiler alert: it's not just about the technology.

We recently sat down with Franz Maruna, Co-Founder of Concrete CMS, to discuss the key issues companies face when implementing intranets and the steps they can take to ensure success. Here's what they had to say about why great intranets fail and what can be done to fix them.
Read more on SourceForge.net

Conferences and Events (Live and Virtual)

FOSDEM 2025 | February 1 - 2, 2025

FOSDEM is a free event for software developers to meet, share ideas and collaborate. Every year, thousands of developers of free and open source software from all over the world gather at the event in Brussels.

OpenSSF Policy Summit DC | March 4, 2025

OpenSSF Policy Summit DC addresses the security challenges for the consumption of Open Source Software (OSS) in critical infrastructure sectors and beyond. The event is hosted by the Open Source Security Foundation (OpenSSF), an initiative of the Linux Foundation.

Visual Studio Live! | March 10 - 14, 2025

The VSLive! Developer Conference has been supporting developers, software architects, and engineers since 1993. Join five days of in-depth education on the .NET Microsoft platform, covering Visual Studio 2022, ASP.NET Core, .NET 8/9, Generative AI, MAUI, JavaScript, TypeScript, Azure, Blazor, and more.

TAP 25: Vacation Rental Conference | February 26 - 28, 2025

TAP brings together professionals from across the short-term rental sector and across the globe, at the same place and same time.
Final Thoughts

If you know someone who is not getting this mailing, encourage them to sign up.

Thanks for being part of the SourceForge community! And, if you need to get in touch directly, feel free to send us an email at CommunityTeam@sourceforge.net.