THE INTERNET had one of its larger wobbles yesterday, as a tiny fault forced huge swathes of websites offline.

The problem seemed to stem from Cloudflare, the Google-backed reverse-proxy designed to protect websites from nasties, where a Border Gateway Protocol (BGP) routing leak caused some high profile sites to hit the deck yesterday lunchtime (UK time)….

https://www.theinquirer.net/inquirer/news/3077891/cloudflare-blames-widespread-internet-borkage-on-verizon-and-noction

It’s been a rough week for security issues at Dell. A serious security vulnerability in the company’s SupportAssist software was disclosed by cybersecurity firm SafeBreach, and revealed to effect not only Dell machines but also other OEMs which used the rebranded software on their computers. Dell swiftly released a patch for the vulnerability which was made available on Friday. If you have a Dell machine, you should update it straight away…

https://www.digitaltrends.com/web/dell-supportassist-second-vulnerability/

The revelation that a Raspberry Pi helped enable an April 2018 hack of JPL arrived courtesy of the U.S. Office of the Inspector General (OIG) on June 18. OIG said in its report that JPL “has experienced several notable cybersecurity incidents that have compromised major segments of its IT network” in the last decade, with the April 2018 hack being “used to steal approximately 500 megabytes of data from one of its major mission systems.”..

https://www.tomshardware.com/news/nasa-hacked-raspberry-pi-cyber-security,39690.html

A new phishing campaign is underway that pretends to be a list undelivered email being held for you on your Outlook Web Mail service. Users are then prompted to decide what they wish to do with each mail, with the respective links leading to a fake login form…

https://www.bleepingcomputer.com/news/security/new-phishing-scam-asks-you-to-manage-your-undelivered-email/

A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan to scan for Docker hosts with exposed APIs.
Threat actors are using the popular Shodan search engine to find Docker hosts and abuse them in a crypojacking campaign. Attackers leverage self-propagating Docker images infected with Monero miners and scripts that use of Shodan to find other vulnerable installs and compromise them…

https://securityaffairs.co/wordpress/86417/malware/cryptojacking-campaign-docker.html