Aggregator
SecWiki News 2025-10-26 Review
更多最新文章,请访问SecWiki
首日赛况!第九届XCTF国际网络攻防联赛总决赛激战启幕
Album#6 - Voodoo
Library of Leaks (泄露数据图书馆)
ToolShell, Zingdoor и ShadowPad: как одна уязвимость SharePoint привела к волне кибератак по всему миру
Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks
Welcome to this week’s edition of the Cybersecurity Newsletter, where we dissect the latest threats, vulnerabilities, and disruptions shaping the digital landscape. As organizations navigate an increasingly complex threat environment, staying ahead of emerging risks has never been more critical. This week, we’re zeroing in on major incidents that underscore the fragility of cloud infrastructure, […]
The post Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks appeared first on Cyber Security News.
香港中文大学信息工程系|薛棣文老师招收安全/网络/测量 方向博士生/RA/访问学者
NDSS 2025 – Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth
Authors, Creators & Presenters: Maximilian von Tschirschnitz (Technical University of Munich), Ludwig Peuckert (Technical University of Munich), Moritz Buhl (Technical University of Munich), Jens Grossklags (Technical University of Munich)
Session 1A, PAPER Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth
Previous works have shown that Bluetooth is susceptible to so-called Method Confusion attacks. These attacks manipulate devices into conducting conflicting key establishment methods, leading to compromised keys. An increasing amount of security-sensitive applications, like payment terminals, organizational asset tracking systems and conferencing technologies now rely on the availability of a technology like Bluetooth. It is thus an urgent goal to find and validate a mitigation to these attacks or to provide an appropriate replacement for Bluetooth without introducing additional requirements that exclude device or user groups. Despite recent solution proposals, existing threat models overlook certain attack vectors or dismiss important scenarios and consequently suffer under new variants of Method Confusion. We first propose an extended threat model that appreciates the root issue of Method Confusion and also considers multiple pairing attempts and one-sided pairings as security risks. Evaluating existing solution proposals with our threat model, we are able to detect known Method Confusion attacks, and identify new vulnerabilities in previous solution proposals. We demonstrate the viability of these attacks on real-world Bluetooth devices. We further discuss a novel solution approach offering enhanced security, while maintaining compatibility with existing hardware and Bluetooth user behavior. We conduct a formal security proof of our proposal and implement it on commonplace Bluetooth hardware, positioning it as the currently most promising update proposal for Bluetooth.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.
The post NDSS 2025 – Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth appeared first on Security Boulevard.
Брак программиста длится годы. Женщины-шпионы ведут «сексуальную войну» для кражи его секретов
Hackers steal Discord accounts with RedTiger-based infostealer
Everest
You must login to view this content
日本向国际空间站发射新型货运飞船 HTV-X
双星系统发现三颗类地行星
Нейтронные звёзды упёрлись в предел: три Солнца в 20 километрах — дальше только коллапс
美国初创公司推广 996 工作制
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 68
Конец эпохи эффективных санкций? КНДР украла $2,8 млрд в крипте с начала 2024 года
INC
You must login to view this content