PrivacyDigest, to security
@PrivacyDigest@mas.to avatar

OpenAI's GPT-4 can #exploit real #vulnerabilities by reading #security advisories

While some other LLMs appear to flat-out suck
#llm #gpt4 #openai #ai

https://www.theregister.com/2024/04/17/gpt4_can_exploit_real_vulnerabilities/

circl, to infosec
@circl@social.circl.lu avatar

vulnerability-lookup version v0.7.0 has been released.

  • News feed added
  • Support for CSAF sources (CERT Bund, RedHat, Siemens, CISA, CISCO, Nozomi Networks, OpenXchange, SICK)
  • OSSF Malicious packages repository
  • Pagination for recent vulnerabilities (API & Web)

🔗 Source code https://github.com/cve-search/vulnerability-lookup/releases/tag/v0.7.0

🔗 Vulnerability lookup online https://vulnerability.circl.lu/

#cve #vulnerability #vulnerabilities #csaf #infosec

circl, to infosec
@circl@social.circl.lu avatar

TR-82 - backdoor discovered in xz-utils - CVE-2024-3094

🔗 For more information including detection and information about vulnerable distribution https://www.circl.lu/pub/tr-82/

#xz #vulnerability #infosec #backdoor #vulnerabilities #cve20243094

north, to Cybersecurity
@north@xn--8r9a.com avatar

Look, reporters, I'm not going to beg you to cover my , but I'm not above it either.

For the three reporters who have written articles about this, and the one who provided invaluable guidance, my gratitude is endless. This post doesn't apply to you, nor "the feds", the cybersecurity experts, or (including and especially @eff), who were extremely helpful. The rest, however, should take note.

I've willingly laid my neck on a chopping block, unprotected, for over six months.

My outreach has been exhaustive:

• Attempted to engage with over 150 journalists and organizations,
• Coordinated frequently with the Cybersecurity and Infrastructure Security Agency ( or "the feds"),
• Consulted with numerous cybersecurity experts,
• Sought advice from multiple lawyers,
• Spoke with ten state and state court CISOs,
• Attempted to talk to several dozen state and county court clerks and judges,
• Sent emails to every Florida State Senator, State Representative, and Supreme Court justice, and to multiple governors,
• Discussed with the staff of multiple U.S. Senators and U.S. Representatives,
• Contacted twelve vendors and over 40 employees

I've offered to write articles -- for free.

I've had no fewer than eight background checks done on me.

I've been cyberstalked by the Arizona Supreme Court.

I've put my job and my family's livelihood at risk in more ways than one.

I've made a grand total of $0; in fact, I've invested several hundred.

When I'm able to sleep, it's with one eye open, always waiting for "that" knock on the door.

After my first , I prepared for a week to deal with what I expected to be a circus. What I received was one preemptive email from a state court (who was not affected) and one kind person (who is not a ) on the .

I've spent over 900 hours discovering, documenting, reporting, and disclosing vulnerabilities, trying to get this fixed on a mass scale, and attempting to contact the above list. I see no signs of this slowing down any time soon. All of this for what is merely a .

I've done my part. It's time for reporters to step up. The real-world harm these vulnerabilities have caused — and continue to cause — cannot be overstated. The need for widespread awareness and action is urgent.

Context: https://github.com/qwell/disclosures/

Email: north@ꩰ.com
Signal: north.01

mattotcha, to security
@mattotcha@mastodon.social avatar

VMware sandbox escape bugs are so critical, patches are released for end-of-life products
https://arstechnica.com/security/2024/03/vmware-issues-patches-for-critical-sandbox-escape-vulnerabilities/ #security #vulnerabilities #VMwareESXi Workstation, #Fusion #CloudFoundation #end—of—life #patches

danie10, to technology
@danie10@mastodon.social avatar

Your fingerprints can be recreated from the sounds made when you swipe on a touchscreen — Chinese and US researchers show new side channel can reproduce fingerprints to enable attacks

An interesting new attack on biometric security has been outlined by a group of researchers from China and the US. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Fi ...continues

See https://gadgeteer.co.za/your-fingerprints-can-be-recreated-from-the-sounds-made-when-you-swipe-on-a-touchscreen-chinese-and-us-researchers-show-new-side-channel-can-reproduce-fingerprints-to-enable-attacks/

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

Effective patch management goes beyond simple updates.

Learn how a streamlined patch management cycle can minimize vulnerabilities and ensure operational integrity.⤵️

https://hubs.la/Q02kQSkP0

#PatchManagement #Vulnerabilities #Cybersecurity

BenjaminHCCarr, to Amd
@BenjaminHCCarr@hachyderm.io avatar

#AMD discloses slew of high severity #security #vulnerabilities for #Zen systems, from the original Zen chips to the latest #Zen4 #CPU, that attacks #BIOS chips, we finally have a #Zenbleed fix. AMD is patching the vulnerabilities through new versions of #AGESA, for #Zen2-based chips, in particular, many of these new AGESAs also patch Zenbleed, including #Epyc #Server chips https://bit.ly/3I1JKds https://www.tomshardware.com/pc-components/cpus/amd-discloses-slew-of-high-severity-security-vulnerabilities-for-zen-chips-that-attack-bios-chips-updates-aim-to-patch-bugs-finally-fix-zenbleed

simontsui, to random

Recorded Future has an 18 page report on Ransomware Exploitation of vulnerabilities for the past six years (2017). Here are the key findings:

  • Ransomware groups alone in exploiting three or more vulnerabilities exhibit a clear targeting focus, which defenders can use to prioritize security measures. For example, CL0P has uniquely and infamously focused on file transfer software from Accellion, SolarWinds, and MOVEit. Other ransomware groups with high levels of unique exploitation exhibit similar patterns.
  • All of the vulnerabilities ransomware groups have targeted most widely are in software frequently used by major enterprises and can be easily exploited via penetration testing modules or single lines of curl code. These vulnerabilities are ProxyShell (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207), ZeroLogon (CVE-2020-1472), Log4Shell (CVE-2021-44228), CVE-2021-34527, and CVE-2019-19781.
  • Vulnerabilities requiring unique or custom vectors to exploit (for example, malicious files using particular forms of compression) are more likely to be exploited by only one or two groups.
  • Ransomware operators and affiliates are highly unlikely to discuss specific vulnerabilities, but the cybercriminal ecosystem that supports them has discussed publicly known vulnerabilities andproducts as targets of interest for exploitation

🔗 https://www.recordedfuture.com/patterns-targets-ransomware-exploitation-vulnerabilities-2017-2023

#recordedfuture #ransomware #cybercrime #threatintel #cyberthreatintelligence #vulnerabilities

raptor, to random

This project looks very cool (and useful)!

The Garden is a collection of HTTP and configured to be composable, along with scripts to interact with them in a way that makes finding much much easier.

https://github.com/narfindustries/http-garden

For some cool demos of the stuff that you can find with the HTTP Garden, check out our 2024 talk.

https://invidious.slipfox.xyz/watch?v=aKPAX00ft5s&t=2h19m0s

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Critical vulnerability affecting most Linux distros allows for bootkits - Enlarge

Linux developers are in the process of patching a hig... - https://arstechnica.com/?p=2001542

cybersecboardrm, to Cybersecurity
itnewsbot, to security
@itnewsbot@schleuss.online avatar

As if two Ivanti vulnerabilities under explot wasn’t bad enough, now there are 3 - Enlarge (credit: Getty Images)

Mass exploitation began over th... - https://arstechnica.com/?p=2001230 #vulnerabilities #exploitation #security #biz#ivanti #vpns

nono2357, to random
raptor, to jenkins
jos1264, to random
@jos1264@social.skynetcloud.site avatar
raptor, to random
krelnik, to node

Study finds a ton of unmaintained packages in #npm but an #OpenSource tool to find them in your project has been released. #security #SupplyChain #vulnerabilities https://blog.aquasec.com/deceptive-deprecation-the-truth-about-npm-deprecated-packages

raptor, to security

Excellent #security research work and blog post by @quarkslab 🔥

#PixieFail: Nine #vulnerabilities in #Tianocore's EDK II #IPv6 network stack

https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html

Congrats to @4Dgifts who’s #stillhacking after so many years. Inspiring 🙏

itnewsbot, to security
@itnewsbot@schleuss.online avatar

New UEFI vulnerabilities send firmware devs across an entire ecosystem scrambling - Enlarge (credit: Nadezhda Kozhedub)

UEFI firmware from five of... - https://arstechnica.com/?p=1996543 #vulnerabilities #pixiefail #security #exploits #biz#uefi

happygeek, to infosec

Happy New Year. Happy New Google Chrome Zero-Day.

By me at Forbes: The first exploited Chrome zero-day lands in 2024. That didn’t take long…

#infosec #google #chrome #zeroday #vulnerabilities

https://www.forbes.com/sites/daveywinder/2024/01/17/first-new-google-hack-attack-warning-for-2024-update-chrome-now/

nono2357, to LLMs

LVE Repository - Like but for
A project documenting and tracking and exposures of large language models (LVEs)
https://lve-project.org/index.html

jos1264, to random
@jos1264@social.skynetcloud.site avatar
BishopFox, to infosec

SonicWall next-gen firewall (NGFW) series 6 and 7 devices are affected by 2 DoS #vulnerabilities that can lead to remote code execution (RCE): #CVE-2022-22274 and CVE-2023-0656. Bishop Fox research revealed that these issues are fundamentally the same, but exploitable at different HTTP URI paths. Read more & download our test script at our blog.

https://bfx.social/47Hcdzj

#SonicWall #infosec #exploitdevelopment

video/mp4

hnsec, to random

Happy new year! 🥂

We've published a new article on the @hnsec blog: “A collection of weggli patterns for C/C++ vulnerability research”, in which @raptor shares his experience with #weggli and provides patterns that cover common C/C++ #vulnerabilities.

https://security.humanativaspa.it/a-collection-of-weggli-patterns-for-c-cpp-vulnerability-research

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • megavids
  • InstantRegret
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ethstaker
  • osvaldo12
  • modclub
  • normalnudes
  • provamag3
  • tester
  • anitta
  • Leos
  • lostlight
  • All magazines