55 private links
Glowworm Attack: recovering sound by analyzing optical emanations from a device's power indicator LED.
This post explains how attackers can abuse middleboxes and censorship infrastructure for DoS amplification attacks over TCP.
An empirical study of vulnerabilities in cryptographic libraries.
»While cynics are probably correct (for now) that we probably can't shut down every avenue for compromise, there's good reason to believe we can close down a vector for 0-interaction compromise. And we should try to do that.«
MITRE 2021 Common Weakness Enumeration (CWE) Top 25 list.
Ghidra is a software reverse engineering (SRE) framework by the NSA.
Among other improvements, mitmproxy now supports TLS-over-TLS, HTTP/2 - HTTP/1 interopatibility, and host header-based proxying.
»A massive REvil ransomware attack affects multiple managed service providers and over a thousand of their customers through a reported Kaseya supply-chain attack.«
Google announced »a simple, unified schema for describing vulnerabilities precisely. «
what
is a python-based identification tool for text and files.
»VPNs are entirely based on trust. «
»ALPACA is an Application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session.«
Post on how the integration of password managers into other applications, especially web browsers, increases the attack surface significantly.
A vCenter pre-auth remote code execution vulnerability with a severity rating of 9.8 out of 10 is under active exploitation.
This post introduces the isolation feature in Firefox and describes how to enable it in the different Firefox versions before the official release later this year.
OpenSCAP is a popular implementation of the Security Content Automation Protocol (SCAP) for automated vulnerability management and compliance evaluation.
Vulnerabilities found in the file-sharing tool croc.
The FBI actively removes backdoors from the hacked Microsoft Exchange servers.
In this post, the author shows that replacing C/C++ with safer languages is not an all-or-nothing task and suggests prioritizing systematically.
»BleedingTooth is a set of zero-click vulnerabilities in the Linux Bluetooth subsystem that can allow an unauthenticated remote attacker in short distance to execute arbitrary code with kernel privileges on vulnerable devices.«