shellsharks, to infosec
@shellsharks@shellsharks.social avatar

There's A LOT going on (analysis, discussion, vendor notices, etc...) related to the ongoing xz/liblzma compromise so I created a "link roundup" which centralizes and buckets a lot of the awesome links and threads I've seen flying around.

https://shellsharks.com/xz-compromise-link-roundup

I will try to keep this up-to-date (ish) for a few days while things are hot but I make no promises beyond that.

#cve20243094 #xz #xzbackdoor #xzorcist #supplychainattack #xz4shell #infosec #cybersecurity

rugk, to infosec German
@rugk@chaos.social avatar

Note on all the #xz drama, there are some technical solutions for such #supplychainattack that can make such an attack way harder, at least to hide the code in tarballs etc.

https://slsa.dev/ e.g. is a solution. Combined with reproducible builds, it ensures that a software artifact is built exactly from the source given in a source repository, with the possibility to prove that and no way for any maintainer to tamper with (in the highest level).

#slsa #infosec #security #linux #backdoor

itnewsbot, to security
@itnewsbot@schleuss.online avatar

GitHub besieged by millions of malicious repositories in ongoing attack - Enlarge (credit: Getty Images)

GitHub is struggling to contain... - https://arstechnica.com/?p=2006797 #supplychainattack #repositories #security #biz#github

lesley, to random
@lesley@mastodon.gamedev.place avatar

Random #pldev and #packagemanager idea: In the build system, developers should explicitly grant permission for packages to execute risky tasks like accessing the filesystem or network. This includes all transitive dependencies. By doing so, any suspicious behavior introduced by updates to dependencies or their dependencies would be apparent.

I am certainly a noob in this area and are not certain whether this can be an effective strategy to mitigate #supplychainattack

marcel, to random German
@marcel@waldvogel.family avatar

Hach, die neutrale, zurückhaltende Schweiz. Und so praktisch, wenn man fragwürdige Geschäfte weiss waschen will.

Nein, ausnahmsweise ist nicht von Finanz- oder Rohstoffgeschäften die Rede, sondern von .

Die @woz deckt in ihrer heutigen Ausgabe einiges auf, was ein internationales Recherchekollektiv in langer Arbeit zusammengetragen hat.

Die -Allianz nutzt die Schweiz als Basis für ihre «EU-based and regulated» . 🧵
https://www.woz.ch/2340/ueberwachung/die-predator-files/!SQSEPFPJ45YS

marcel,
@marcel@waldvogel.family avatar

Noch mehr #Spyware dieses Wochenede. Was ist denn aktuell gerade los?

Hier ein modifiziertes #Android vorinstalliert irgendwo in der Produktionskette, das auf Kommandos aus der Ferne horcht. #SupplyChainAttack
https://arstechnica.com/security/2023/10/thousands-of-android-devices-come-with-unkillable-backdoor-preinstalled/

jbzfn, to random
@jbzfn@mastodon.social avatar

😶 We've learned nothing from the SolarWinds hack
➥ cyrnel

"Given its high profile, I'm shocked to report that I feel very little has been learned from that attack.

To me, the hack was a wake-up call about how the way we install and run software is insecure by design and needs a rework, maybe using capabilities-based security. But all I hear about is a bunch of solutions that kinda miss the point. "

https://legacy.cyrnel.net/solarwinds-hack-lessons-learned/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • InstantRegret
  • rosin
  • modclub
  • Youngstown
  • khanakhh
  • Durango
  • slotface
  • mdbf
  • cubers
  • GTA5RPClips
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • JUstTest
  • magazineikmin
  • osvaldo12
  • tester
  • tacticalgear
  • ethstaker
  • Leos
  • thenastyranch
  • everett
  • normalnudes
  • anitta
  • provamag3
  • cisconetworking
  • lostlight
  • All magazines