Garmin is reportedly being asked to pay a $10 million ransom to free its systems from a cyberattack that has taken down many of its services for two days.
The navigation company was hit by a ransomware attack on Thursday, leaving customers unable to log fitness sessions in Garmin apps and pilots unable to download flight plans for aircraft navigation systems, among other problems. The company’s communication systems have also been taken offline, leaving it unable to respond to disgruntled customers.
Garmin employees have told BleepingComputer that the company was struck down by the WastedLocker ransomware.
One of the reasons to use password managers such as LastPass with 2Factor authentication. They allow you to have long, secure passwords.
Our friend Rick Frey has updated his Mikrotik Firewall script. You can find it here
You will need a fairly beefy router to run all of this. If you are an enterprise this will be very handy for protecting your corporate network. If you are an ISP I would pick and choose some of the parts which apply to you. Your infrastructure should already be on non accessible IP space so the need for this big of a firewall should not be necessary
Just a little firewall switch today. Netgate firewall appliance switched out to replace some old Cisco ASAs.
Some of you may have noticed a new menu item pop up in winbox labeled dot1x
Dot1x is implementation of IEEE 802.1X standard in RouterOS. Main purpose is to provide port-based network access control using EAP over LAN also known as EAPOL. 802.1X consists of a supplicant, an authenticator and an authentication server (RADIUS server). Currently both authenticator and supplicant sides are supported in RouterOS. Supported EAP methods for supplicant are EAP-TLS, EAP-TTLS, EAP-MSCHAPv2 and PEAPv0/EAP-MSCHAPv2.
Looking at how to use this?
Great read on OpenPGP
In the last week of June 2019 unknown actors deployed a certificate spamming attack against two high-profile contributors in the OpenPGP community (Robert J. Hansen and Daniel Kahn Gillmor, better known in the community as “rjh” and “dkg”). This attack exploited a defect in the OpenPGP protocol itself in order to “poison” rjh and dkg’s OpenPGP certificates. Anyone who attempts to import a poisoned certificate into a vulnerable OpenPGP installation will very likely break their installation in hard-to-debug ways.