(g+) Open Compute Project: Gegen den Lock-in

Offene Standards und Kollaboration im Data Center? Das ist das Ziel der Open Compute Project Foundation (OCP), sie möchte damit einen Beitrag zur Vereinheitlichung von Hardware und zur Steigerung der Effizienz leisten. Von Erik Bärwaldt (Cloud Computin…

Offene Standards und Kollaboration im Data Center? Das ist das Ziel der Open Compute Project Foundation (OCP), sie möchte damit einen Beitrag zur Vereinheitlichung von Hardware und zur Steigerung der Effizienz leisten. Von Erik Bärwaldt (Cloud Computing, IBM)

Framework 13 AMD-7040-Serie: Wenn nur die vielen Probleme nicht wären

Ich habe mir einen Framework-13-Laptop gekauft und finde ihn toll – trotz der Schwierigkeiten, auf die ich beim Arbeiten gestoßen bin. Und das waren ehrlich gesagt eine ganze Menge. Ein Erfahrungsbericht von Zach Silveira (Notebook, Computer)

Ich habe mir einen Framework-13-Laptop gekauft und finde ihn toll - trotz der Schwierigkeiten, auf die ich beim Arbeiten gestoßen bin. Und das waren ehrlich gesagt eine ganze Menge. Ein Erfahrungsbericht von Zach Silveira (Notebook, Computer)

Feel-good story of the week: 2 ransomware gangs meet their demise

One is fatally hacked, the other shut down in international police dragnet.

A ransom note is plastered across a laptop monitor.

Enlarge (credit: Getty Images)

From the warm-and-fuzzy files comes this feel-good Friday post, chronicling this week’s takedown of two hated ransomware groups. One vanished on Tuesday, allegedly after being hacked by a group claiming allegiance to Ukraine. The other was taken out a day later thanks to an international police dragnet.

The first group, calling itself Trigona, saw the content on its dark web victim naming-and-shaming site pulled down and replaced with a banner proclaiming: “Trigona is gone! The servers of Trigona ransomware gang has been infiltrated and wiped out.” An outfit calling itself Ukrainian Cyber Alliance took credit and included the tagline: “disrupting Russian criminal enterprises (both public and private) since 2014.”

Poor operational security

A social media post from a user claiming to be a Ukrainian Cyber Alliance press secretary said his group targeted ransomware groups partly because they consider themselves out of reach of Western law enforcement.

Read 11 remaining paragraphs | Comments

Okta says hackers breached its support system and viewed customer files

Hackers obtained valid credentials, but Okta doesn’t say how.

A cartoon man runs across a white field of ones and zeroes.

Enlarge (credit: Getty Images)

Identity and authentication management provider Okta said hackers managed to view private customer information after gaining access to credentials to its customer support management system.

“The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases,” Okta Chief Security Officer David Bradbury said Friday. He suggested those files comprised HTTP archive, or HAR, files, which company support personnel use to replicate customer browser activity during troubleshooting sessions.

“HAR files can also contain sensitive data, including cookies and session tokens, that malicious actors can use to impersonate valid users,” Bradbury wrote. “Okta has worked with impacted customers to investigate, and has taken measures to protect our customers, including the revocation of embedded session tokens. In general, Okta recommends sanitizing all credentials and cookies/session tokens within a HAR file before sharing it.”

Read 7 remaining paragraphs | Comments