Aggregator
CVE-2024-50191 | Linux Kernel up to 5.15.167/6.1.112/6.6.56/6.11.3 ext4 Privilege Escalation
Xlight FTP Server整数溢出漏洞(CVE-2024-46483)分析与复现
CVE-2024-50175 | Linux Kernel up to 6.6.54/6.10.13/6.11.2 on CSIPHY camss videobuf2-core.c stop_streaming reference count
Apple’s 45-day certificate proposal: A call to action
In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. The Apple proposal will likely go up for a vote among Certification Authority Browser Forum (CA/B Forum) members in the upcoming months. Apple isn’t the first of the big players to suggest such a move. Last year, Google announced its intention to mandate 90-day … More →
The post Apple’s 45-day certificate proposal: A call to action appeared first on Help Net Security.
Win32.Trojan.Japaneno - A full Malware Analysis.
Rekt Raises $1.5M Seed Round Backed By Angels and Community, Following Sell-Out Of Rekt Drinks
Cryptohack Roundup: M2, Metawin Exploits
This week, Metawin hacks, LottieFiles attack, hackers used Ethereum smart contracts to target npm developers, Craig Wright faced contempt of court, Alameda sued KuCoin, Binance sought dismissal of a U.S. Securities and Exchange lawsuit, and Immutable received a Wells Notice.
Breach Roundup: Chinese Cyberespionage Using Open-Source VPN
This week, Chinese spying, Italian hacking scandal, an FBI warning and Okta fixed a bug. Google mandated MFA, zero days in PTZOptics and a Mexican airport didn't pay ransom. Cybercriminals demanded baguettes, breach lettersin Ohio and Germany will shield white hats. The Italian DPA rebuked a bank.
Law Firm Hack Compromises Health System's Patient Data
A hacking incident at Thompson Coburn, a national law firm based in Missouri, has affected an unspecified number of patients of a healthcare sector client, Presbyterian Healthcare Services in New Mexico. But a big unanswered question is whether other clients were affected.
Hacker Claims to Leak Nokia Source Code
Finnish telecommunications equipment manufacturer Nokia is investigating the alleged posting of source code data on a criminal hacking forum. A hacker going by the handle of "IntelBroker" on Thursday posted what he said is a trove of "Nokia-related source code."
ZDI-CAN-25761: Microsoft
ZDI-CAN-25246: Mescius
ZDI-CAN-25397: Mescius
ZDI-CAN-25465: Ashlar-Vellum
Primer on Large Language Model (LLM) Inference Optimizations: 2. Introduction to Artificial Intelligence (AI) Accelerators
Am I Isolated: Open-source container security benchmark
Am I Isolated is an open-source container security benchmark that probes users’ runtime environments and tests for container isolation. The Rust-based container runtime scanner runs as a container, detecting gaps in users’ container runtime isolation. It also provides guidance to improve users’ runtime environments to offer stronger isolation guarantees. “The status quo of containers is that they don’t contain. The lack of container isolation has dire consequences in a cloud native environment, including container escapes, … More →
The post Am I Isolated: Open-source container security benchmark appeared first on Help Net Security.