Summary

Total Articles Found: 23

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • In epic hack, Signal developer turns the tables on forensics firm Cellebrite
  • >20,000 Linksys routers leak historic record of every device ever connected
  • Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak
  • Zero-day attackers deliver a double dose of ransomware—no clicking required
  • The wave of domain hijackings besetting the Internet is worse than we thought
  • Unexpected protection added to Microsoft Edge subverts IE security
  • Google tells users of some Android phones: Nuke voice calling to avoid infection
  • Android-Based Sony Smart-TVs Open to Image Pilfering
  • Wi-Fi Chip Vulnerability
  • Thangrycat: A Serious Cisco Vulnerability

New Open SSH Vulnerability

Published: 2024-07-03 15:27:11

Popularity: 19

Author: Bruce Schneier

Keywords:

  • Uncategorized
  • SSH
  • vulnerabilities
  • LLM Says: ""Security Alert!""

    It’s a serious one: The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration. […] This vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access. It could facilitate network propagation, allowing attackers to use a compromised system as a foothold to traverse and exploit other vulnerable systems within the organization...

    ...more

    Data Exfiltration Using Indirect Prompt Injection

    Published: 2023-12-22 12:05:29

    Popularity: 9

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • ChatGPT
  • LLM
  • vulnerabilities
  • Interesting attack on a LLM: In Writer, users can enter a ChatGPT-like session to edit or create their documents. In this chat session, the LLM can retrieve information from sources on the web to assist users in creation of their documents. We show that attackers can prepare websites that, when a user adds them as a source, manipulate the LLM into sending private information to the attacker or perform other malicious activities. The data theft can include documents the user has uploaded, their chat history or potentially specific private information the chat model can convince the user to divulge at the attacker’s behest...

    ...more

    New Bluetooth Attack

    Published: 2023-12-08 12:05:19

    Popularity: 20

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • authentication
  • Bluetooth
  • cyberattack
  • man-in-the-middle attacks
  • secrecy
  • vulnerabilities
  • New attack breaks forward secrecy in Bluetooth. Three news articles: BLUFFS is a series of exploits targeting Bluetooth, aiming to break Bluetooth sessions’ forward and future secrecy, compromising the confidentiality of past and future communications between devices. This is achieved by exploiting four flaws in the session key derivation process, two of which are new, to force the derivation of a short, thus weak and predictable session key (SKC). Next, the attacker brute-forces the key, enabling them to decrypt past communication and decrypt or manipulate future communications...

    ...more

    Security Risks of New .zip and .mov Domains

    Published: 2023-05-19 11:11:52

    Popularity: 24

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • cybersecurity
  • Google
  • phishing
  • vulnerabilities
  • Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability.

    ...more

    Google tells users of some Android phones: Nuke voice calling to avoid infection

    Published: 2023-03-17 20:26:26

    Popularity: 336

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • android
  • baseband
  • Samsung
  • volte
  • vulnerabilities
  • wifi calling
  • If your device runs Exynos chips, be very, very concerned.

    ...more

    VMware patches vulnerability with 9.8/10 severity rating in Cloud Foundation

    Published: 2022-10-28 18:41:57

    Popularity: 7

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploit
  • patches
  • vmware
  • vulnerabilities
  • NSX-V appliance, which VMware no longer supports, also affected and patched.

    ...more

    Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks

    Published: 2022-07-19 20:13:27

    Popularity: 66

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • global positioning system
  • GPS
  • vulnerabilities
  • China-based Micodus has yet to patch critical vulnerabilities in MV720 GPS tracker.

    ...more

    Critical Zoom vulnerabilities fixed last week required no user interaction

    Published: 2022-05-26 00:10:27

    Popularity: 58

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploits
  • patches
  • vulnerabilities
  • zoom
  • If you're machine failed to get them automatically, you're not alone.

    ...more

    Zero-Click iMessage Exploit

    Published: 2021-09-17 11:09:27

    Popularity: 13

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • Apple
  • exploits
  • patching
  • spyware
  • vulnerabilities
  • LLM Says: "Sneaky hack"

    Citizen Lab released a report on a zero-click iMessage exploit that is used in NSO Group’s Pegasus spyware. Apple patched the vulnerability; everyone needs to update their OS immediately. News articles on the exploit.

    ...more

    Cobalt Strike Vulnerability Affects Botnet Servers

    Published: 2021-08-11 11:42:27

    Popularity: None

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • patching
  • penetration testing
  • vulnerabilities
  • LLM Says: ""Server hack alert""

    Cobalt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to automate their own attacks. Researchers have found a vulnerability in the product. The main components of the security tool are the Cobalt Strike client — also known as a Beacon — and the Cobalt Strike team server, which sends commands to infected computers and receives the data they exfiltrate. An attacker starts by spinning up a machine running Team Server that has been configured to use specific “malleability” customizations, such as how often the client is to report to the server or specific data to periodically send...

    ...more

    China Taking Control of Zero-Day Exploits

    Published: 2021-07-14 11:04:46

    Popularity: 5

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • China
  • cybersecurity
  • cyberweapons
  • disclosure
  • vulnerabilities
  • zero-day
  • LLM Says: "Red flag waving"

    China is making sure that all newly discovered zero-day exploits are disclosed to the government. Under the new rules, anyone in China who finds a vulnerability must tell the government, which will decide what repairs to make. No information can be given to “overseas organizations or individuals” other than the product’s manufacturer. No one may “collect, sell or publish information on network product security vulnerabilities,” say the rules issued by the Cyberspace Administration of China and the police and industry ministries. This just blocks the cyber-arms trade. It doesn’t prevent researchers from telling the products’ companies, even if they are outside of China...

    ...more

    Tesla Remotely Hacked from a Drone

    Published: 2021-05-04 14:41:45

    Popularity: 65

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • cars
  • drones
  • hacking
  • vulnerabilities
  • Wi-Fi
  • LLM Says: "Drone hack attack"

    This is an impressive hack: Security researchers Ralf-Philipp Weinmann of Kunnamon, Inc. and Benedikt Schmotzle of Comsecuris GmbH have found remote zero-click security vulnerabilities in an open-source software component (ConnMan) used in Tesla automobiles that allowed them to compromise parked cars and control their infotainment systems over WiFi. It would be possible for an attacker to unlock the doors and trunk, change seat positions, both steering and acceleration modes — in short, pretty much what a driver pressing various buttons on the console can do. This attack does not yield drive control of the car though...

    ...more

    In epic hack, Signal developer turns the tables on forensics firm Cellebrite

    Published: 2021-04-21 19:30:08

    Popularity: 3439

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • Tech
  • Cellebrite
  • exploits
  • forensic software
  • vulnerabilities
  • Widely used forensic software can be exploited to infect investigators' computers.

    ...more

    Bluetooth Vulnerability: BIAS

    Published: 2020-05-26 11:54:47

    Popularity: 106

    Author: Bruce Schneier

    Keywords:

  • authentication
  • Bluetooth
  • impersonation
  • security engineering
  • vulnerabilities
  • wireless
  • LLM Says: "Blues get hacked"

    This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices. The Bluetooth standard includes a legacy authentication procedure and a secure authentication procedure, allowing devices to authenticate to each other using a long term key. Those procedures...

    ...more

    Wi-Fi Chip Vulnerability

    Published: 2020-03-03 12:43:15

    Popularity: 194

    Author: Bruce Schneier

    Keywords:

  • encryption
  • hacking
  • hardware
  • patching
  • vulnerabilities
  • Wi-Fi
  • LLM Says: ""Hack alert""

    There's a vulnerability in Wi-Fi hardware that breaks the encryption: The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter a chipmaker Cypress acquired in 2016. The affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, and Wi-Fi routers from Asus and Huawei, as well as the Raspberry Pi 3. Eset, the security...

    ...more

    Thangrycat: A Serious Cisco Vulnerability

    Published: 2019-05-23 16:52:31

    Popularity: 147

    Author: Bruce Schneier

    Keywords:

  • Cisco
  • hardware
  • vulnerabilities
  • LLM Says: "pwned 💻"

    Summary: Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module. First commercially introduced in 2013, Cisco Trust Anchor module (TAm) is a proprietary hardware security module used in a wide range of Cisco products, including enterprise routers, switches and firewalls. TAm is the root of trust that underpins all other Cisco security and trustworthy...

    ...more

    >20,000 Linksys routers leak historic record of every device ever connected

    Published: 2019-05-18 11:45:24

    Popularity: 1565

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploits
  • Linksys
  • privacy
  • routers
  • security
  • vulnerabilities
  • Linksys said it fixed flaw in 2014. Researcher Troy Mursch disagrees.

    ...more

    Serial publisher of Windows 0-days drops exploits for 2 more unfixed flaws

    Published: 2019-05-23 00:41:04

    Popularity: None

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • 0day
  • exploits
  • microsoft
  • vulnerabilities
  • Windows
  • zeroday
  • SandboxEscaper has published 7 such exploits to date, 3 in the past 24 hours.

    ...more

    Stolen NSA hacking tools were used in the wild 14 months before Shadow Brokers leak

    Published: 2019-05-07 06:14:49

    Popularity: 1033

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • apt3
  • buckeye
  • exploits
  • National Security Agency
  • NSA
  • shadow brokers
  • vulnerabilities
  • Already criticized for not protecting its exploit arsenal, the NSA has a new lapse.

    ...more

    Zero-day attackers deliver a double dose of ransomware—no clicking required

    Published: 2019-04-30 19:50:10

    Popularity: 953

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • exploits
  • malware
  • oracle
  • ransomware
  • vulnerabilities
  • WebLogic
  • High-severity hole in Oracle WebLogic under active exploit for 9 days. Patch now.

    ...more

    Android-Based Sony Smart-TVs Open to Image Pilfering

    Published: 2019-04-25 21:13:31

    Popularity: 304

    Author: Tara Seals

    Keywords:

  • IoT
  • Vulnerabilities
  • Android
  • bravia
  • photo sharing plus
  • sony smart tvs
  • vulnerabilities
  • wifi passwords
  • A pair of bugs would allow attackers to compromise the WiFi password of a TV and the multimedia stored inside it.

    ...more

    Unexpected protection added to Microsoft Edge subverts IE security

    Published: 2019-04-19 12:20:14

    Popularity: 360

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • EDGE
  • exploits
  • internet explorer
  • vulnerabilities
  • Windows
  • Permissions that Edge added to downloaded files break important security feature.

    ...more

    The wave of domain hijackings besetting the Internet is worse than we thought

    Published: 2019-04-17 15:00:58

    Popularity: 822

    Author: Dan Goodin

    Keywords:

  • Biz & IT
  • Policy
  • dns hijacking
  • domain name system
  • exploits
  • vulnerabilities
  • Despite widespread attention since January, DNS campaign shows no signs of abating.

    ...more

    end