Wordpress – Another Version Of Mother http://www.anotherversionofmother.com/ Sat, 24 Sep 2022 14:18:42 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://www.anotherversionofmother.com/wp-content/uploads/2021/06/icon.png Wordpress – Another Version Of Mother http://www.anotherversionofmother.com/ 32 32 Burlingame ‘stays the course’ to defeat Chase County 26-24 in Regional Game of the Week https://www.anotherversionofmother.com/burlingame-stays-the-course-to-defeat-chase-county-26-24-in-regional-game-of-the-week/ Sat, 24 Sep 2022 10:54:52 +0000 https://www.anotherversionofmother.com/burlingame-stays-the-course-to-defeat-chase-county-26-24-in-regional-game-of-the-week/ The Burlingame Bearcats earned a hard-fought 26-24 victory over the Chase County Bulldogs in the regional game of the week on Friday night. The first half would see four lead changes, with Chase County finding the end zone less than 60 seconds into the game thanks to a 62-yard touchdown by senior quarterback Mitch Budke. […]]]>

The Burlingame Bearcats earned a hard-fought 26-24 victory over the Chase County Bulldogs in the regional game of the week on Friday night.

The first half would see four lead changes, with Chase County finding the end zone less than 60 seconds into the game thanks to a 62-yard touchdown by senior quarterback Mitch Budke. The Bulldogs added two more scores, both from Budke on the ground, including a seven-yard touchdown with one second left in the second quarter.

Burlingame scored three times in the first with a three-yard touchdown by senior quarterback Colby Middleton, a 14-yard touchdown pass from Middleton to second Dane Winters and a 79-yard kickoff return by the senior Matthew Heckman. After leading 24-20 at halftime, Chase County failed to find the end zone in the second half and Burlingame scored the only touchdown on a nine-yard run from Middleton midway through the fourth.

Middleton finished the night with 169 total rushing yards. He says it was a tough night on both sides of the ball.


Burlingame head coach Jeff Slater said his team “stayed the course” late in the game.

Budke scored all three of Chase County’s touchdowns on the night and led his team with 268 total rushing yards.

With the win, Burlingame moved to 4-0 while Chase County fell to 3-1.

Zone scores:
Madison 46 Maranatha Academy 0
Lyndon 28 Cair Paravel 24
Colony Crest 46 Hartford 0
Lebo 54 St. Paul 6
Marmaton Valley 58 Swan Marsh Valley 12
Olpe 27 Pleasanton 0

Jayhawk-Linn 64 Northern Heights 8.
Northern Heights played Friday night’s game under a new head coach. Northern Heights announced that Todd Callahan had stepped down for personal reasons and Peyton Heins took over as head coach for the remainder of the season.

Mission Valley 24 Valley Falls 16
Osage City 45 Eureka 16
Council Grove 20 Humboldt 14
Burlington 45 Prairie View 32
Waverly 55 Lost Springs in the Center 26
Wetmore 59 South Coffey County 6.

]]>
15-year-old unpatched Python bug potentially impacts +350,000 projectsSecurity Affairs https://www.anotherversionofmother.com/15-year-old-unpatched-python-bug-potentially-impacts-350000-projectssecurity-affairs/ Thu, 22 Sep 2022 13:28:44 +0000 https://www.anotherversionofmother.com/15-year-old-unpatched-python-bug-potentially-impacts-350000-projectssecurity-affairs/ Over 350,000 Open Source Projects Could Potentially Be Affected by 15-Year-Old Unpatched Python Vulnerability Over 350,000 open source projects may potentially be affected by an unpatched Python vulnerability, tracked as CVE-2007-4559 (CVSS score: 6.8), discovered 15 years ago. The issue is a directory traversal vulnerability that resides in the ‘extract’ and ‘extractall’ functions of the […]]]>

Over 350,000 Open Source Projects Could Potentially Be Affected by 15-Year-Old Unpatched Python Vulnerability

Over 350,000 open source projects may potentially be affected by an unpatched Python vulnerability, tracked as CVE-2007-4559 (CVSS score: 6.8), discovered 15 years ago.

The issue is a directory traversal vulnerability that resides in the ‘extract’ and ‘extractall’ functions of the tarfile module in Python. A remote user-assisted attacker can trigger the issue to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, an issue related to CVE-2001-1267.

“While investigating an unrelated vulnerability, Trellix Advanced Research Center came across a vulnerability in Python’s tarfile module. Initially, we thought we had found a new zero-day vulnerability. By digging into the problem, we realized that it was in fact CVE-2007-4559.” read it Publish released by security company Trellix. “The vulnerability is a path traversal attack in the extract and extract functions of the tarfile module that allows an attacker to overwrite arbitrary files by appending the sequence “..” to filenames in a TAR archive .”

Experts pointed out that the issue was underestimated, it initially received a CVSS score of 6.8, however, in most cases an attacker exploits this issue to gain code execution from writing of the file. Trellix shared a PoC video that demonstrates how to achieve code execution by exploiting universal radio pirate:

https://www.youtube.com/watch?v=jqs8S51_FRg

An attacker can exploit the flaw by uploading a specially crafted tar file that allows escaping the directory to which a file should be extracted and executing code.

“For an attacker to take advantage of this vulnerability, they must append “..” with the operating system separator (“/” or “”) in the file name to escape the directory the file is supposed to be in. be checked out. Python’s tarfile module allows us to do exactly this:” the post continues.

Creation of a malicious archive (Source Trellix)

“The tarfile module allows users to add a filter that can be used to analyze and modify a file’s metadata before it is added to the tarball. This allows attackers to create their exploits with as little as the 6 lines of code above.

The researchers built Creosote, a Python script that recursively traverses directories looking for .py files and then parsing them once found. The script is used to automatically check repositories for vulnerability. Creosote outputs the list of files that may contain vulnerabilities, sorting them into 3 categories according to the confidence level (Vulnerable, Probably Vulnerable, Potentially Vulnerable).

Trellix added that using the Creosote revealed the existence of a vulnerability in the free and open-source scientific environment Spyder Python IDE Polemarch.

“As demonstrated above, this vulnerability is incredibly easy to exploit, requiring little or no knowledge of complex security topics.” concludes the report. “Due to this fact and the prevalence of the vulnerability in the wild, Python’s tarfile module has become a huge Supply Chain threatens infrastructure around the world.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases hacking, Python)





]]>
Yoast SEO 19.7 causes fatal errors and website crashes https://www.anotherversionofmother.com/yoast-seo-19-7-causes-fatal-errors-and-website-crashes/ Tue, 20 Sep 2022 17:38:39 +0000 https://www.anotherversionofmother.com/yoast-seo-19-7-causes-fatal-errors-and-website-crashes/ Yoast SEO WordPress plugin version 19.7 was discovered to contain a conflict with other plugins, which resulted in fatal errors on websites. This is the third time this year that a conflict with another plugin has caused a Yoast update to fail. Luckily, Yoast investigated the reports and quickly released a new update which fixed […]]]>

Yoast SEO WordPress plugin version 19.7 was discovered to contain a conflict with other plugins, which resulted in fatal errors on websites.

This is the third time this year that a conflict with another plugin has caused a Yoast update to fail.

Luckily, Yoast investigated the reports and quickly released a new update which fixed the issue.

WordPress Fatal Error

There are several causes of fatal error, but in this situation it was caused by a Yoast SEO update where the coding conflicted with another plugin.

This can happen because two plugins try to do something but one essentially overrides the other or stops working.

A metaphor for a plug-in conflict might be two cars going in opposite directions on a single road.

Ideally, a plugin takes into account in its coding other plugins, especially the most common ones, so that none of the plugins tries to do something that prevents other plugins from doing their job.

This is exactly what happened with the Yoast 19.7 update.

Yoast 19.7 had a conflict with other plugins (or custom coding) that change the admin login URL.

Changing the login URL is a security measure designed to trick hacker software that automatically navigates to the default URL for administrator logins and attempts to guess login password credentials.

Yoast Announces Update Bug

Yoast was 100% transparent about the bug and posted a tweet that told users what was going on.

Yeast tweeted:

“After the release of Yoast SEO 19.7, we were informed that this version causes a fatal error when used in combination with plugins or code that changes the default WordPress login URL.

We have identified the problem and are working on a solution.

One of the changes introduced with Yoast 19.7 (according to the Yoast plugin development changelog) was an improvement to how Yoast handles fatal errors by preventing it from running in the login page.

“Improves fatal error handling in the front-end by preventing Yoast SEO from running in the login page, allowing users to access their dashboard.”

Could that have been the cause?

Why do fatal errors occur with plugins?

Plugin conflicts are not exclusive to Yoast. It’s just more noticeable when it happens to Yoast because their user base is in the millions.

However, this is the third time this year that a fatal error plugin conflict has been associated with a Yoast plugin update this year.

Yoast SEO Plugin founder Joost De Valk explained in a tweet that it is not always possible to account for the thousands of plugins in the WordPress ecosystem with which a coding conflict could arise.

He tweeted:

“This is the kind of #WordPress plugin conflict situation that I literally don’t know how to prevent from happening.

Over 60,000 plugins: how to test your plugin against all of them.

If anyone has any good ideas, I’m all ears”

Joost too tweeted that Yoast always tests its plugin updates before they are released with most of the most popular plugins.

“We’re testing against the bigger ones, not caring so much, but a few small ones together still cause enough headaches.”

He continued:

“…it’s never fun when you break stuff. We test very rigorously and always things pass. Creating plugins for a large number of users is “just” difficult.

Solution offered in a few hours

Yoast released a new update within two hours of announcing that they had identified a bug in the update and were working on a fix.

Recommended action to take

Yoast has released a new update, version 19.7.1. The Yoast Development Changelog Reported:

“Fixes a bug where a fatal error would be generated in combination with certain plugins that change the standard login page URL.”

Yoast SEO plugin users may consider updating to the latest version of Yoast, version 19.7.1


Featured image by Shutterstock/Asier Romero

]]>
Experts warn of critical flaws in Flexlan devices that provide WiFi on planesSecurity Affairs https://www.anotherversionofmother.com/experts-warn-of-critical-flaws-in-flexlan-devices-that-provide-wifi-on-planessecurity-affairs/ Mon, 19 Sep 2022 05:07:05 +0000 https://www.anotherversionofmother.com/experts-warn-of-critical-flaws-in-flexlan-devices-that-provide-wifi-on-planessecurity-affairs/ Researchers have discovered two critical vulnerabilities (CVE-2022-36158 and CVE-2022-36159) in Flexlan devices that provide WiFi on airplanes. Necrum Security Labs researchers have discovered a few critical vulnerabilities, tracked as CVE-2022-36158 and CVE-2022-36159, affecting Contec Flexlan FXA3000 and FXA2000 series LAN devices. The FXA3000 and FXA2000 series are access points manufactured by the Japanese company Contec […]]]>

Researchers have discovered two critical vulnerabilities (CVE-2022-36158 and CVE-2022-36159) in Flexlan devices that provide WiFi on airplanes.

Necrum Security Labs researchers have discovered a few critical vulnerabilities, tracked as CVE-2022-36158 and CVE-2022-36159, affecting Contec Flexlan FXA3000 and FXA2000 series LAN devices.

The FXA3000 and FXA2000 series are access points manufactured by the Japanese company Contec and comply with the IEEE 802.11n/a/b/g wireless standard.

These devices are installed in aircraft to provide internet connectivity to passengers, the above vulnerabilities can be exploited by an attacker to compromise the in-flight entertainment system and potentially conduct other malicious activities.

“Our wireless products, the FLEXLAN FX3000/2000 series, have been found to have a firmware vulnerability.
There are possibilities of data plagiarism, tampering and destroying the system with malicious programs if
this vulnerability has been exploited by malicious attackers. read it advisory edited by Contec. “We have a private web page for developers to run system commands, which is not linked to any other web configuration page. There are possibilities for data plagiarism, tampering, system destruction and malware execution if this vulnerability is exploited by malicious attackers who can access this private web page (with password information) .

The issues affect Contec FLEXLAN FXA3000 series devices from version 1.15.00 and below and
FLEXLAN FXA2000 series devices from version 1.38.00 and below.

The CVE–2022–36158 The flaw is a hidden system command webpage that was discovered by reverse engineering the firmware used by the device. The page was not listed in the Wireless LAN Manager interface, it can allow running Linux commands on the device with root privileges, accessing all system files and opening the telnet port.

“[CVE-2022-36158] – Hidden system command web page.
After reverse engineering the firmware, we discovered that a hidden, unlisted page in the Wireless LAN Manager interface allows running Linux commands on the device with root privileges. From there we had access to all system files, but we could also open the telnet port and have full access to the device. » reads the Publish published by Necrum Security Labs.

The second vulnerability (CVE–2022–36159) binds the use of hardcoded weak cryptographic keys and backdoor accounts. Experts have discovered a shadow file containing the hash of root and user users.

“[CVE-2022-36159] – Use of weak hardcoded cryptographic keys and backdoor account. During our investigation, we also discovered that the /etc/shadow file contains the hash of two users (root and user) which only took us a few minutes to retrieve through a brute force attack. continues the researchers. “The problem is that the device owner can only change the account user’s password from the web admin interface, because the root account is reserved for Contec, probably for purposes of maintenance. This means that an attacker with the hard-coded root password can access all FXA2000 and FXA3000 series devices.

The post published by the experts shows how to exploit the flaws, it also includes recommendations to fix them.

The researchers recommend changing the account user password from the web administration interface and removing the hidden engineering web page from devices in production.

Experts recommend randomly generating a different password for each device.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases hacking, Log4Shell)




]]>
Lefsetz Letter » Blog Archive » Inventory https://www.anotherversionofmother.com/lefsetz-letter-blog-archive-inventory/ Fri, 16 Sep 2022 23:31:21 +0000 https://www.anotherversionofmother.com/lefsetz-letter-blog-archive-inventory/ That’s what they call concert tickets. You put on a show and the tickets are in stock. And all summer we’ve been talking about Springsteen tickets, flex-priced, four-figures, but the rest of the shows? Live Nation, a public company, produced fantastic numbers. Business has been more than healthy, but moving forward? My eye caught this […]]]>

That’s what they call concert tickets. You put on a show and the tickets are in stock. And all summer we’ve been talking about Springsteen tickets, flex-priced, four-figures, but the rest of the shows?

Live Nation, a public company, produced fantastic numbers. Business has been more than healthy, but moving forward?

My eye caught this article on the front page of today’s “Wall Street Journal”:

“From scarcity to glut: Scotts Miracle-Gro is buried in fertilizers – Scotts ramped up production during the pandemic, then consumers shifted and retailers cut orders, leaving a pile of inventory. It’s now trying to to go through.” : https://on.wsj.com/3RRr3fI

This story has been in the business press for a few months now. How these companies produced so many products and the public didn’t want to buy them.

There are various factors. People were stuck at home during the pandemic and now they are not. I’m sure you’ve heard of the disaster that has become Peleton. Not that it wasn’t predictable. If you don’t have an idle exercise machine at home, you’ve never bought one, and many haven’t! People get excited at first, then their interest wanes, and then they don’t even realize they’ve quit. They take a day off, then two, then they get out of the routine and they have a new clothes rack. I mean, how big was the market for Peleton initially? Watch all advertising on GoPro. As if everyone needed it. Now the stock is at 90%. Give the company some credit, it’s getting into services, but… it will never reach the heights that investors dream of. Again, professional investors enter the ground floor and can make a profit on the spread long before the hoi polloi realize their mistake.

So there are too many clothes, there seems to be too much of everything except cars. Companies couldn’t keep up with the demand, they ramped up production and then found that people were no longer interested. Will the same thing happen in the concert business?

Here is the relevant passage from the WSJ article:

“Versions of this story are playing out across industries, where makers of everything from clothing to kitchen appliances have gone from trying to catch up with demand to bowing under the weight of their own inventory, in a few weeks. Today, many companies are cutting jobs, shutting down factories and working to undo many other measures they took to ensure they would have enough product to sell.

In a few weeks!

If you’re an insider, you know that the past year has been full of ups and downs in terms of ticket sales. What I mean is they move, then they stop moving, then they start again… Are we ready for a slowdown?

There is another article I read today:

“Is there room for another great music festival in SoCal? Primavera Sound is about to find out”: https://lat.ms/3qH8aQK

The “Los Angeles Times” is famous for its headline changes, if you google it, the headline is: “Primavera Sound Debuts in LA Amid Shaky Festival Market – Launching a Music Festival Is Risky, but between inflation and an oversaturated market, the next LA edition of Primavera Sound faces…”

Headwinds, because I wasn’t even aware of it! And awareness is the first obstacle.

Then there is the bill, the price and the location.

If you read this story, you’ll find that true story insiders also know that many festivals canceled for stated reasons were really canceled because they couldn’t move tickets. A festival is an investment, both for the promoter and for the spectator. Not only is the question how much we need, but the price. Festival costs are high for audiences, even those that don’t require long distance accommodation and transportation, I mean how much are you going to pay to stay with the unwashed for days?

Historically, some acts are recession proof. Definitely those with hot records right now. Then you have the superstars… But the superstars have existed, a lot of people have already seen them. As for the smaller bands, who go up to bigger buildings, which aren’t guaranteed to sell out… their hardcore fans need to see them, but anyone can pass when it’s deemed too expensive.

And as with the products the WSJ reports on, there was an absence, now there is an overabundance. There were no shows, now there are too many. And a lot of tickets were sold before the pandemic, these shows are playing now, so what’s next?

Doesn’t look so bright, you don’t have to wear shades.

As for the prices… In the LAT article, there is reference to the fact that people are waiting for the costs to come down! Below face value, when scalpers, whether professional or amateur, need to get rid of THEIR inventory!

Gigs are a matter of disposable income. Gig prices continue to rise, if only for another reason that costs are rising. Is there a time when people stay at home? I think so. I’m not saying the business becomes a dumpster fire, I’m just saying some people will get hurt.

And the concert business is opaque, almost all show business is. They don’t want you to know because it’s all about image with talent.

And there are no guarantees, concert organizers don’t know that, they always take risks. And they certainly don’t know what’s going to happen after the first of the year.

And the answer to the LAT writer is that LA is a walk-in city. No, historically that is not true. However, urban acts historically do more walk-in business. In truth, the public is guarded. The mania is gone. People have blown, they have no idea what awaits them either. Inflation rebounded, mortgages rose to 6%. If you have money, you are afraid, if you don’t…

]]>
Akamai has mitigated a new DDoS attack recordSecurity Affairs https://www.anotherversionofmother.com/akamai-has-mitigated-a-new-ddos-attack-recordsecurity-affairs/ Thu, 15 Sep 2022 21:34:32 +0000 https://www.anotherversionofmother.com/akamai-has-mitigated-a-new-ddos-attack-recordsecurity-affairs/ Akamai announced that it recently blocked a new record-breaking Distributed Denial of Service (DDoS) attack. On Monday, September 12, 2022, Akamai neutralized the largest DDoS attack to ever hit any of its European customers. Malicious traffic peaked at 704.8 Mpps and appears to be from the same threat actor behind the previous record Akamai blocked […]]]>

Akamai announced that it recently blocked a new record-breaking Distributed Denial of Service (DDoS) attack.

On Monday, September 12, 2022, Akamai neutralized the largest DDoS attack to ever hit any of its European customers. Malicious traffic peaked at 704.8 Mpps and appears to be from the same threat actor behind the previous record Akamai blocked in July that hit the same customer.

The following table comparing the two massive DDoS attacks, it is possible to verify that while in July the number of cumulative attacks was 75, in September it rose to 201.

July attack September attack
peak pps 659.6 Mpps 704.8 Mpps
Cumulative attacks 75 201
Targeted IPs 512 1813
Vector UDP UDP
Distribution 1 slot 6 pitches
Date of attack July 21, 2022 September 12, 2022
Main scouring locations HKG, LON, TYO HKG, TYO, LON

Unlike the attack in July, this time the attackers launched the attack against six data center locations from Europe to North America.

“On Monday, September 12, 2022, Akamai successfully detected and mitigated the largest DDoS attack ever against a European customer on the Prolexic platform, with attack traffic surging to 704.8 Mpps in an aggressive attempt to cripple business operations of the organization. ” reads the analysis published by Akamai. “The attackers’ command and control system was quick to activate the multicast attack, which grew in 60 seconds from 100 to 1,813 active IPs per minute. These IP addresses were distributed across eight separate subnets in six separate locations.

Akamai applauded its customer’s approach to mitigating DDoS attacks, after July’s attack it had secured all of its 12 data centers.

“Having a proven DDoS mitigation strategy and platform in place is imperative to protecting your business from downtime and disruption,” the security firm concludes.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases hacking, hacking)




]]>
How to design a website – Forbes Advisor https://www.anotherversionofmother.com/how-to-design-a-website-forbes-advisor/ Tue, 13 Sep 2022 16:00:01 +0000 https://www.anotherversionofmother.com/how-to-design-a-website-forbes-advisor/ While you can customize your website to suit your unique needs or style, there are specific actions that anyone wanting to design a website should take. Follow carefully to know how to design a website, from defining the purpose of your website, choosing a website design platform, designing the architecture, filling in the necessary content […]]]>

While you can customize your website to suit your unique needs or style, there are specific actions that anyone wanting to design a website should take. Follow carefully to know how to design a website, from defining the purpose of your website, choosing a website design platform, designing the architecture, filling in the necessary content and launching your website.

1. Define the purpose of the site

To design a website that gives the expected results, you will have to define what you want from it. Think about why you are designing the website: who your audience is and what you are targeting. Are you trying to get downloads, sales, bookings, appointments, engagements or even a larger audience?
It is essential that you fully understand the purpose of the intended website. Knowing this will help you adopt the right content strategy and guide you in choosing the right platform, theme and page architecture.

2. Choose your platform

Once you’ve noted down why you’re building a website, you can check out website builders. These do-it-yourself (DIY) tools will help you create a website yourself, even if you don’t know a single line of code. And there are those designed for specific purposes, like e-commerce, blogging, and portfolios.

Website builders include customizable templates for adding your text and images, and many also take care of domain registration and hosting. But you will have to use the drag and drop interface to design each website page yourself. So choose the one that suits the purpose of your site.

3. Bring your brand elements together

Elements are details like colors, fonts, and images that bring your website together. So, when designing your site, consider your brand identity.

Start with the color scheme, working with a primary color and one or two complementary colors. Then choose a text style that matches your brand. For example, serif symbolizes formality and authority, sans serif, modernism and writing, creativity.

Also add images to capture users’ attention, but make sure they are relevant and of high quality so that they can make a good impression on users.

4. Select a template or theme

Next, choose a theme or template, which matches your site layout, i.e. how images, text, and buttons appear on your site. Themes are pre-designed layouts to help you design your site, even as a beginner.

Most platforms come with a range of templates divided into categories, and each category has built-in features relevant to a specific industry. So preview them to choose the most relevant one for your site.

Note that if you choose to build your website with WordPress, you will need to obtain web hosting from a third-party hosting provider, such as Bluehost or Hostinger, and install WordPress. With this, you will be able to access your WordPress admin dashboard, install a theme, and import demo content for premium themes.

5. Map your site

To aid in design, visualize which pages will appear on your site and how they will relate to each other. For example, knowing how many pages will be on your website, their content, and the general layout means you will have a guide to work with when you start designing each part.

6. Design each element of the site

With your template or theme and your website card, the next step is to start designing each element of the site, such as your menu (or site navigation), header and footer, search bar and any additional items you want. site to have. Using elements like the following will structure your website, making it easier to navigate.

  • Menu: This element displays the articles featured on your website. Make sure it is accessible on all pages and only displays a few items. You don’t want to group visitor screens.
  • Header and footer: These elements improve user engagement. The header should include features like the navigation menu and your logo, which you want visitors to find quickly. A footer should offer more information, such as contact details and terms of use.
  • Search bar: Use a magnifying glass or a box, but place it prominently on each page. The upper left or upper right corner is often best.

7. Personalize your web pages

Your content depends on the purpose of your site, so you can modify it according to your needs. However, every website should have the following web pages.

  • Home page : Every visitor lands here, so it’s a good place to summarize your website. Include your logo, your company name, what readers should expect from you, and a navigation menu that makes it easy to navigate your site. Make sure this page is organized and eye-catching.
  • Product or service page: This page should tell visitors what you are offering them and allow them to make a purchase. For an e-commerce site, create a page for displaying the catalog and another to present each item in detail.
  • About the page: This page should introduce you to visitors, tell your story, communicate your values ​​and highlight what differentiates you from other brands.
  • Blog: If you intend to use blogging as a content marketing strategy, you should create this page, which will display excerpts from published blog posts. Users can then click on the one that interests them.
  • Contact page: Let website visitors know how they can reach you. This can be done through phone calls, emails or social media platforms. Additionally, you can include your physical address, live chat widget, and contact form.

Other pages you can add:

  • Custom 404 page: When visitors land on a page that doesn’t exist on your website, you should direct them to a page displaying “Error 404”. You can further customize yours to include your logo, a link to your homepage, or a light message: “Congratulations! You have found our error page!
  • FAQs: This page is dedicated to answering common questions that may be on the minds of visitors. This way, website visitors won’t need to contact you.
  • Testimonials: Here’s your chance to blow your trumpet. Include reviews from past clients about how you’ve helped them. Also display trustmarks that have given you awards or written about you.

8. Test and launch your website

Before your site goes live, test load time, content readability, links and mobile responsiveness, contact form, and anything else that may affect the user experience. Ask family members and coworkers to give feedback on your website design. If there are no issues, go ahead and publish your site.

Also, keep updating your website based on its performance, trends, and ongoing business operations.

9. Optimize your content

After designing and launching your website, you should plan to optimize your site for a smooth user experience. Here’s what you can do.

  • Mobile responsiveness: Most website templates are now mobile-friendly: your content is reformatted to fit different screen sizes. However, for more security, consider activating a mobile application. You can test your website on browsers like Safari or even Google Chrome on iPhones and Android phones.
  • Internet connection: Internal links allow users and search engines to see you as an authority in your industry. They also keep people on your site, so use hyperlinks to direct users to other relevant web pages.
  • Media optimization: To avoid poor rankings, higher bounce rates, lower clicks, and longer load times, work on your media files. Make sure they aren’t too big and that you don’t have too many photos or videos on each page. Also, only feature relevant images and videos.
  • Search Engine Optimization (SEO): SEO is about tweaking content such as images and texts to increase the number of people on your website. Examples of such optimization actions are adding alt texts to images and using readable URLs.

Best tools to design a website

To find and customize the texts, shapes, colors and images needed to design the sections and pages of your website, you will need certain applications and tools. With these tools, you can create the best designs without having to start from scratch.

  • Website builders: You’ll need a website builder, such as Squarespace or Wix, with the features required to design the website you love.
  • Design tools: A design tool such as Cloth is good for graphic design and photo editing. Expert Marketplaces: Marketplaces like Fiverr and Upwork host several expert web designers who can help you with design tasks.
  • Logo designers: This tool is necessary if you haven’t designed your company logo yet and want to do it alongside your website design process. Examples are Logo maker and Adobe Express Logo Maker.
  • Photo apps: Use photo apps like Stockphoto.com and Unsplash to find visually appealing images to accompany your texts.

]]>
Iran-linked APT42 is behind more than 30 spy attacks https://www.anotherversionofmother.com/iran-linked-apt42-is-behind-more-than-30-spy-attacks/ Sun, 11 Sep 2022 13:32:37 +0000 https://www.anotherversionofmother.com/iran-linked-apt42-is-behind-more-than-30-spy-attacks/ Iran-linked APT42 (formerly UNC788) is believed to be behind more than 30 cyber espionage attacks against activists and dissidents. Experts attribute more than 30 cyber espionage attacks against activists and dissidents to Iran-linked APT42 (formerly UNC788). The campaigns have been running since 2015 and aim to carry out information-gathering and surveillance operations against individuals and […]]]>

Iran-linked APT42 (formerly UNC788) is believed to be behind more than 30 cyber espionage attacks against activists and dissidents.

Experts attribute more than 30 cyber espionage attacks against activists and dissidents to Iran-linked APT42 (formerly UNC788).

The campaigns have been running since 2015 and aim to carry out information-gathering and surveillance operations against individuals and organizations of strategic interest to Tehran. Mandiant researchers pointed out that APT42 operates on behalf of the Islamic Revolutionary Guard Corps (IRGC) Intelligence Organization (IRGC-IO).

APT42’s TTPs overlap with another Iran-linked APT group tracked as APT35 (aka “Charming Kitten”, “Phosphorus”, Newscaster and Ajax Security Team) which made headlines in 2014 when the iSight experts have published a report describing the most elaborate Internet espionage campaign organized by Iranian hackers using social media.

Microsoft has been tracking threat actors since at least 2013, but experts believe the cyber espionage group has been active since at least 2011.

The APT group previously targeted medical research organizations in the United States and Israel in late 2020, and to target academics in the United States, France and the Middle East region in 2019.

They also have previously targeted human rights activists, the media industry and interfered in the US presidential elections.

APT42 focuses on highly targeted spear phishing and social engineering techniques. Its operations broadly fall into three categories, credential harvesting, surveillance operations, and malware deployment.

“Mandiant has observed over 30 confirmed targeted APT42 operations spanning these categories since early 2015. The total number of APT42 intrusion operations is almost certainly much higher due to the group’s high operational tempo, visibility gaps caused in part through the group’s targeting of personal email accounts. and country-focused efforts, and numerous open-source industry reports of threat clusters likely associated with APT42. read it report edited by Mandiant.

APT42’s activity varies with changing Iranian government priorities and interests, including campaigns pursuing domestic and foreign opposition groups ahead of an Iranian presidential election. Mandiant researchers point out that APT42 reacts quickly to geopolitical changes by adjusting its operations.

“In May 2017, APT42 targeted the senior leadership of an Iranian opposition group operating from Europe and North America with spear phishing emails mimicking legitimate Google correspondence.” reads the report published by Mandiant. “The emails contained links to fake Google Books pages that redirected to login pages designed to steal credentials and two-factor authentication codes.”

The surveillance operations carried out by the APT group concerned the distribution of Android malware such as VINETHORN and PINEFLOWER. The attack chain begins with text messages sent to the victims, the malicious code makes it possible to spy on the recipients by recording audio and telephone calls, harvesting multimedia content and text messages and tracking geolocations.

In September 2021, the Iran-Linked group compromised a European government email account and used it to send a phishing email to nearly 150 email addresses associated with individuals or entities employed or affiliated with the civil society, government or intergovernmental organizations around the world. The bait email embedded a Google Drive link to a malicious macro document leading to TAMECAT, a PowerShell backdoor.

“The group has shown its ability to quickly shift its operational focus as Iran’s priorities change over time with changing national and geopolitical conditions. We assess with great confidence that APT42 will continue to perform cyber espionage and surveillance operations aligned with Iran’s evolving operational requirements for intelligence gathering. conclude the researchers.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases hacking, APT42)












]]>
WordPress.com Defies Marked Increase in Russian Takedown Requests – WP Tavern https://www.anotherversionofmother.com/wordpress-com-defies-marked-increase-in-russian-takedown-requests-wp-tavern/ Fri, 09 Sep 2022 21:16:44 +0000 https://www.anotherversionofmother.com/wordpress-com-defies-marked-increase-in-russian-takedown-requests-wp-tavern/ Automatique published its semi-annual report on transparency this week, which highlights the various requests for information and withdrawal received in the services of the company. Historically, Automattic has used these reports as an opportunity to publicly reaffirm its commitment to actively push back against requests that violate users’ freedom of expression and to call attention […]]]>

Automatique published its semi-annual report on transparency this week, which highlights the various requests for information and withdrawal received in the services of the company.

Historically, Automattic has used these reports as an opportunity to publicly reaffirm its commitment to actively push back against requests that violate users’ freedom of expression and to call attention to abusive takedown requests. In 2014, the company opened up its DMCA takedown process documents to help others implement their own processes. Past Transparency Reports have included information on intellectual property disputes, IRUs (Dedicated Government Internet Reference Unit Reports), National Security Letters, Government Information Requests, and other issues related to Hosted Content.

In 2021, Automattic released a unified landing page for WordPress.com and Tumblr’s Transparency Reports, now hosted on the same site, aimed at making data easier to navigate and compare. In the future, this may include other company products like Day One and Pocket Casts, as relevant requests come in.

The most recent report for the first half of 2022, includes information on Russian censorship requests received by WordPress.com.

“Over the past six months, following the Russian invasion of Ukraine, we have seen a marked increase in the number of takedown requests targeting content critical of the Russian government and its associates,” said WordPress.com Community Guardian Stephen McLeod. said Blythe. He cited specific examples relating to the Russian invasion of Ukraine:

  • Fundraising for Ukrainian Aid
  • Telling the story of Russia with a perspective on what led to the war in Ukraine
  • Allegations of criminal activity by Russian oligarchs and their personal ties to Putin
  • Publication of comments by former Russian soldiers who were critical of the military involvement in Ukraine

“In all of these cases, given our concerns about access to critical information from Russia and the implications for freedom of expression, we have decided that we will not geoblocks the content in question,” Blythe said.

The report also included information on how Automattic resolved IP blocks from two major ISPs in Colombia, after the country blocked Tumblr without disclosing the reason. Colombia’s Ministry of Technologies and Communications had blocked the service after discovering a spam blog on the network. Despite the fact that Automattic had already deleted the blog, the process of unblocking Tumblr took months.

“Situations like these are not uncommon and, as the example above shows, the issue of online government censorship or regional platform blocks cannot be reflected solely by the number of takedown requests received,” Blythe said. “As a result, we are committed to continuously reviewing and expanding the information we are able to share in our Transparency Report.”

]]>
Experts have spotted a new stealth Linux malware called ShikitegaSecurity Affairs https://www.anotherversionofmother.com/experts-have-spotted-a-new-stealth-linux-malware-called-shikitegasecurity-affairs/ Wed, 07 Sep 2022 16:39:54 +0000 https://www.anotherversionofmother.com/experts-have-spotted-a-new-stealth-linux-malware-called-shikitegasecurity-affairs/ A new Linux malware dubbed Shikitega leverages a multi-step infection chain to target endpoints and IoT devices. AT&T Alien Labs researchers have discovered a new stealth Linux malware, dubbed Shikitega, that targets endpoints and IoT devices. The malware is distinguished by its multi-step infection chain, threat actors use it to take full control of the […]]]>

A new Linux malware dubbed Shikitega leverages a multi-step infection chain to target endpoints and IoT devices.

AT&T Alien Labs researchers have discovered a new stealth Linux malware, dubbed Shikitega, that targets endpoints and IoT devices. The malware is distinguished by its multi-step infection chain, threat actors use it to take full control of the system and conduct other malicious activities including cryptocurrency mining.

Shikitega is able to download next stage payloads from a C2 server and execute them directly in memory, making it very evasive.

Experts have reported that the malware downloads and runs Metasploit meterpreter “Mettle” to take control of infected machines.

Shikitega exploits vulnerabilities to elevate privileges and maintain persistence, researchers have observed that it uses a polymorphic encoder to evade detection by antivirus engines.

The main malware dropper is a small ELF file (370 bytes in size), while the actual code size is around 300 bytes.

“The malware uses the “Shikata Ga Nai” XOR polymorphic additive feedback encoder, which is one of the most popular encoders used in Metasploit. Using the encoder, the malware cycles through multiple decoding loops, where one loop decodes the next layer, until the final shellcode payload is decoded and executed. read it analysis published by AT&T Alien Labs. “After several decryption loops, the final payload shellcode will be decrypted and executed.”

Once the malware is installed on a targeted host, it downloads and runs the “Courage” meterpreter to maximize control over the system and perform multiple operations.

The findings add to a growing list of Linux malware that has been found in the wild in recent months, including GMP Gate, Symbiote, Syslog, Orbitand Lightning frame.

The malware achieves privilege escalation by exploiting CVE-2021-4034 (aka PwnKit) and CVE-2021-3493. The malware exploits the exploit to download and execute the final stage with root privileges – the malware persistence and payload.

“Threat actors continue to research ways to deliver malware in new ways to stay under the radar and avoid detection. Shiketega malware is delivered in a sophisticated way, it uses a polymorphic encoder and it gradually delivers its payload where each step only reveals a part of the total payload. Additionally, the malware abuses known hosting services to host its command and control servers. Be careful!” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(Security cases hacking, Log4Shell)




]]>