CVE-2021-22205: How to determine if a self-managed instance has been impacted https://forum.gitlab.com/t/cve-2021-22205-how-to-determine-if-a-self-managed-instance-has-been-impacted/60918
Any time you have a VPC, you’ll likely need some way to gain access to the resources within the VPC from your local box. Typically, the way to do that is to run a bastion (or jumpbox) which you and your team can SSH into. The downside is that you are exposing an entry point into your network that is accessible by multiple people and running 24×7. And depending on how you manage permissions, you may not be able to restrict access to the box via IAM. Obviously, this is not ideal.
Luckily, we have Fargate.
With Fargate, we no longer need to maintain permanent bastion instances—we can create bastions when needed and tear them down when no longer in use. We can lock down bastion instances to an individual user both in terms of SSH keys and IP address. And we can restrict access via IAM to both the API used to manage bastions and to which SSH keys are used to log into an instance.
All in all, we save on infrastructure spend while reducing our attack surface.
This looks like an intriguing solution to a problem that has bothered me for years. Running sshd provides an attack surface for bad actors just because it’s there. Ideally you should never expose the ssh port to the public network, even if it is well secured. Bastion hosts are a well known solution to this but one that is often not implemented for one reason or another. Turning it inot a service seems like a good idea.
If you installed PEAR PHP in the last 6 months, you may be infected | Ars Technica https://arstechnica.com/information-technology/2019/01/pear-php-site-breach-lets-hackers-slip-malware-into-official-download/
The Verge: Gmail’s biggest redesign is now live. http://google.com/newsstand/s/CBIw1bDMpDg
“Drupalgeddon2” touches off arms race to mass-exploit powerful Web servers | Ars Technica https://arstechnica.com/information-technology/2018/04/drupalgeddon2-touches-off-arms-race-to-mass-exploit-powerful-web-servers/
The Verge: Intel is offloading virus scanning to its GPUs to improve performance and battery life. http://google.com/newsstand/s/CBIwsJv92jY
Installation of Lemur Certificate Manager on Ubuntu :: HowtoForge https://www.howtoforge.com/tutorial/installation-and-usage-of-lemur-certificate-manager-on-ubuntu/
Fossbytes: Kali Linux 2018.1 Released For Ethical Hackers — Download ISO And Torrent Files Here. https://fossbytes.com/kali-linux-2018-1-released-download-features/
Backdoor in Captcha Plugin Affects 300K WordPress Sites https://www.wordfence.com/blog/2017/12/backdoor-captcha-plugin/
How to Back Up Your Computer | The Wirecutter http://m.thewirecutter.com/blog/how-to-back-up-your-computer/