Latest Tweets

Latest Ransomware and Zero Day

The Big Feed

  • One of the IT industry’s hottest markets is Open XDR, a hybrid of eXtended (or cross-platform) detection and response.

  • Arevalo pulled off a major upset when he swept from obscurity to win elections last August – Copyright AFP Jim WATSON

  • Releases Packages linux-aws – Linux kernel for Amazon Web Services (AWS) systems linux-aws-6.5 – Linux kernel for Amazon Web Services (AWS) systems Details Lonial Con discovered that the netfilter subsystem in the Linux kernel didnot properly handle element deactivation in certain cases, leading to ause-after-free vulnerability. A local attacker could use this to cause adenial…

  • :uʕd5Xh˖%KaZ`^DLj-L#] {WW .RA^QzlQglľE1F$T LԷܸz#d+|?]3ך’W6&:^D9w/”^0 |E]|zy2ashU’#Z!Q,#m6^hqڋwǾ4gbq}}YiB\kn0 e,qK’.*oqU*\HU#:~:2%V4U#iEkbcxA5ӂfs>sq{FU-ZkNٻ֟͝ɟ’~????&;_s vvLR7)qo? 2qq5/\8aq-xq”x{0ߖ阵 t=.I(JF9ji`HΖ;l9v;;xv [hgmQ9FOԬ#7HOyMaF l ZctItn>xqz&1]mbm~&9bڦ4L$i35^YOSf@Oz=Ai9MsCw۴4z#N=ƘNCNF1 :IHi (dE5k-*ָMȹG\D)9MЖ)0`.G0T䘮 D/$Qܣ,lBMKT4:Υik:3LaEh=1,)gM#m>L\]pgb.:%،BX,D)yt0qIq2r1CHk$Qw1vqz4-jMh_[YEOţOaoMY)ĽhmG”fF0qpa#? l}XιXfؿ)iu0(iUF=(E0G ~43!&0AF_ԅ}*O.%RF’T.j3s)ɰkh2׮0z˼ Rx]o Cys’5%Jj/ “z2RtAʨ@D2)iT?tk%>gtD-‘yHb.ʲ;\F만CvFh%ʻdnC+iH/8y;.TpU= $Eڅ[re`/E>QvʮA*v:PlunM-DThv!T`J@.h[m54q ;iF’&Zk0bVX|x͌g}k^~T?*6wt?}o?77߿oow^e7]cI 8M+qCةqǍpfJ$IEC/e5ӗan?nIUF/VhU>Y/;T(?vU~o*4! y׳P9TjyFm[/1s1C/g/pF=o/pOȨn’` ?Oίq”?Ļۺkǿٰc^.Qx {}3׾m_ჿ_=H|k 0|;/}u5G5sϽOPԂ SYpy[]Q/Tb؊Y

  • Releases Packages Details Ruihan Li discovered that the bluetooth subsystem in the Linux kernel didnot properly perform permissions checks when handling HCI sockets. Aphysically proximate attacker could use this to cause a denial of service(bluetooth communication). (CVE-2023-2002)

  • Releases Packages Details Wenqing Liu discovered that the f2fs file system implementation in theLinux kernel did not properly validate inode types while performing garbagecollection. An attacker could use this to construct a malicious f2fs imagethat, when mounted and operated on, could cause a denial of service (systemcrash). (CVE-2021-44879)

  • The Show Must Go On

    It has been a long time since I last posted on this site. Truth be told it was broken for at least three years. Nothing quite like having some free time to catch up. Honestly, it has been somewhat refreshing getting back into technical work and updating code, researching topics that have been on the…

  • Identity and access management (IAM) remains a chief concern for organizations as workforce mobility, cloud adoption, and reliance on contractors expand the digital attack surface. But increasingly powerful generative AI now promises to reshape IAM, automating secure yet seamless access controls. This guide explores the merging of AI and IAM to safeguard the next-generation workforce.

  • Google started rolling out its new Search Generative Experience (SGE) earlier this month, introducing AI-generated search results on some pages. Unfortunately, it seems the new feature has already hit a few hiccups, as reports indicate it may be promoting scam sites and sites pushing malware in its generated responses.

  • Earlier today, the U.S. and U.K. accused hackers linked to the Chinese state of being behind “malicious” cyber campaigns targeting political figures. The U.K. government also blamed China for a 2021 cyberattack that compromised the personal information of millions of U.K. voters. In response, PBS reports that the U.S. and British government announced sanctions against…

  • MalBot March 26, 2024, 12:20am 1 Data memory-dependent prefetching can enable side-channel extraction of cryptographic secrets.

  • One of the best ways to stay on top of the latest changes and features coming to Windows is to join Microsoft’s Windows Insider Program. This program allows you to choose between a few different channels of updates, giving you access to a slew of new options before they hit the main consumer branch of…

  • Apple released iOS 17.4.1 Thursday, more than two weeks after the company released iOS 17.4. While iOS 17.4 brought new features to your iPhone, like new Stolen Device Protection options and transcripts in Podcasts, iOS 17.4.1 patches two zero-day vulnerabilities on your iPhone.

  • A class-action lawsuit against Apple alleges the tech giant didn’t sufficiently resolve privacy issues raised by its AirTag digital tracking devices, leading to unwanted stalking and abuse.

  • The United States and Britain imposed sanctions on China’s elite hacking units on Monday, accusing Beijing’s top spy agency of a yearslong effort to place malware in America’s electrical grids, defense systems and other critical infrastructure, and of stealing the voting rolls for 40 million British citizens.

  • Digital Identity is the focal point of the latest Westminster Forum policy conference, for which key stakeholders and policymakers in the biometrics and digital ID fields came together to discuss the rollout and use of digital identities and identity verification services in the UK by businesses, public bodies and consumers. Topics ranged from regulatory matters…

  • Skater brand Vans emailed customers last week to tell them about a recent “data incident.”

  • In the event of a security breach, logs play a crucial role in understanding the scope and impact of the attack. By reviewing logs, security teams can determine the timeframe of the breach, the attacker’s actions, and the affected systems or data. This information is essential for effective incident response and recovery… but only if…

  • Last year, the Securities and Exchange Commission (SEC) announced new disclosure rules for publicly traded companies. Regulation S-K Item 106, which mandates cybersecurity disclosures in corporate 10-K filings, sheds light on how companies are navigating regulatory expectations in this digital age. This is the first time companies have been required at scale to report on…