Cool stuff for sale on Ebay! "1216428-301 Lockheed Martin Target ECM Combiner Circuit Card Assembly"
I take it that there are no rules for being a CVE CNA?
Synology is a CNA.
They published a security advisory.
No CVE to be found.
“There is significant public interest in knowing when and on what basis the UK government believes that it can compel a private company to undermine the privacy and security of its customers.”
ORG, Big Brother Watch and Index on Censorship call for the Tribunal into the UK government's secret order for Apple to break encryption to be held in public.
The case happens TOMORROW.
Read more ⬇️
#encryption #e2ee #privacy #security #ukpolitics #ukpol #cybersecurity #apple
"Don't make vulnerability reporters angry" is not high on anybody's list, it seems.
We value your opinion! Please respond to our:
“CVE Data Usage and Satisfaction Survey”
https://forms.office.com/g/hx168RPctg
The CVE Program is requesting feedback from:
* CVE consumers
* Defenders
#cve #vulnerability #vulnerabilitymanagement #cybersecurity
This weekend, talking to a guy who does IT at a Dutch bank.
Me: So everything runs on Azure or AWS these days?
He: Yes
Me: So they can see all the data.
He: No it's on separate servers, on EU soil. That was a thing before we decided to go ahead with this.
Me: So... They can see all the data.
He: No it's encrypted and threw some acronyms at me.
Me: So, you download the data, decrypt it, and work on it?
He: No that's done on the servers.
Me: So... They can see all the data.
the absolute state of infosec vulnerability marketing these days
on further analysis by folks who actually understand the tech it turns out the claimed backdoor isn't a backdoor at all, it isn't even really a security issue, and has been framed in a way that is both disingenuously overhyped and also pretty racist
bravo, folks, really advancing the field
This is something that was occupying my time for some time already and I'm super happy that this research is finally released.
I believe this to be only a second reporting on malware targeting Juniper devices. Following Lumen Technologies blog from last month (but this one related to a different actor and different malware).
This blogs dives into specifics of Veriexec bypass vulnerability used by UNC3886, and details of 6 different backdoors found on Juniper MX devices.
UNC3886 is a very interesting actor that does not shy away from targeting less commonly known technologies like routers, edge devices or hypervisors.
More details here: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers