Aggregator
CVE-2025-21885 | Linux Kernel up to 6.12.17/6.13.5 bnxt_re denial of service (Nessus ID 236983 / WID-SEC-2025-0649)
CVE-2025-21888 | Linux Kernel up to 6.12.17/6.13.5 __mlx5_ib_dereg_mr privilege escalation (Nessus ID 236874 / WID-SEC-2025-0649)
CVE-2025-21883 | Linux Kernel up to 6.6.80/6.12.17/6.13.5 sriov_numvfs ice_ena_vfs PF1_PCI use after free (Nessus ID 234058 / WID-SEC-2025-0649)
CVE-2025-21890 | Linux Kernel up to 6.12.17/6.13.5 /include/linux/skbuff.h idpf_rx_rsc privilege escalation (Nessus ID 234058 / WID-SEC-2025-0649)
Former Trenchant exec pleads guilty to selling cyber exploits to Russian broker
Canada says hacktivists breached water and energy facilities
NDSS 2025 – Securing BGP ASAP: ASPA And Other Post-ROV Defenses Session 1B: Internet Security
Authors, Creators & Presenters: Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), Reynaldo Morillo (University of Connecticut), Arvind Kasiliya (University of Connecticut), Bing Wang (University of Connecticut), Amir Herzberg (University of Connecticut)
PAPER
Securing BGP ASAP: ASPA and other Post-ROV Defenses
Before the adoption of Route Origin Validation (ROV), prefix and subprefix hijacks were the most effective and common attacks on BGP routing. Recent works show that ROV adoption is increasing rapidly; with sufficient ROV adoption, prefix and subprefix attacks become ineffective. We study this changing landscape and in particular the Autonomous System Provider Authorization (ASPA) proposal, which focuses on route leakage but also foils some other attacks. Using recent measurements of real-world ROV adoption, we evaluate its security impact. Our simulations show substantial impact: emph{already today}, prefix hijacks are less effective than forged-origin hijacks, and the effectiveness of subprefix hijacks is much reduced. Therefore, we expect attackers to move to forged-origin hijacks and other emph{post-ROV attacks}; we present a new, powerful post-ROV attack, emph{spoofing}. We present extensive evaluations of different post-ROV defenses and attacks. Our results show that ASPA significantly protects against post-ROV attacks, even in partial adoption. It dramatically improves upon the use of only ROV or of BGPsec, Path-End, OTC, and EdgeFilter. BGP-iSec has even better protection but requires public-key operations to export/import announcements. We also present ASPAwN, an extension that further improves ASPA's performance. Our results show that contrary to prior works [74], [95], ASPA is effective even when tier-1 ASes are not adopting, hence motivating ASPA adoption at edge and intermediate ASes. On the other hand, we find that against emph {accidental} route leaks, the simpler, standardized OTC mechanism is as effective as ASPA.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.
The post NDSS 2025 – Securing BGP ASAP: ASPA And Other Post-ROV Defenses Session 1B: Internet Security appeared first on Security Boulevard.
Radar
You must login to view this content
Survey Surfaces Rise in Email Security Incidents Tied to Ransomware
A survey of 2,000 senior security decision-makers published this week finds more than three quarters (78%) work for organizations that experienced an email security breach in the past 12 months. Conducted by the market research firm Vanson Bourne on behalf of Barracuda Networks, the survey also finds that on average the cost of recovering from..
The post Survey Surfaces Rise in Email Security Incidents Tied to Ransomware appeared first on Security Boulevard.
Nitrogen
You must login to view this content