Posts
2529
Following
647
Followers
1459
"I'm interested in all kinds of astronomy."
repeated

Two days ago, NIST finalized three post-quantum cryptography standards. Today, we are announcing an open-source Rust implementation of one of these standards, SLH-DSA, now available in RustCrypto! https://blog.trailofbits.com/2024/08/15/we-wrote-the-code-and-the-code-won/

0
3
0
repeated

NEW: Every Pixel phone released since 2017 has a hidden Verizon app, "Showcase.apk," with deep system access that has an unpatched flaw. Google's response to the vulnerability caused Palantir to ditch Android altogether. @lhn has the scoop: https://www.wired.com/story/google-android-pixel-showcase-vulnerability/

3
3
0
repeated

the most recent hackerone issue was filed because the user googled "[another project] bug bounty program", clicked the first link (to 's bug-bounty) and entered an issue about a completely different project...

3
1
0
repeated

Long thread ahead about training a classifier of "good/batch matches" for .

So, the whole idea that I have been working on for quite some time already to try to, somehow, improve matching in Diaphora is the following: Train a model to better determine if a pair of functions in two binaries (ie, a match between a function A in binary X, and function B in binary Y) is correct or not.

1
1
0
repeated

Did someone already create a tarpit that targets the AI scraping bots?

0
1
0
Who volunteer to dress up as standing lamps for AlligatorCon?

#JeSuisLampshade
1
1
3
repeated

Just learned that in French cybersecurity threats are called "cybermenace" and I will only be using this term from now on

0
1
0
repeated

Mixing watering hole attacks with history leak via CSS https://adepts.of0x.cc/css-history-leaks/

0
1
0
repeated

I’m in shock

0
2
0
repeated
repeated

The folks from Xiaomi didn't pick up their Pwnie for Lamest Vendor Response, so we're keeping it safe for them until they decide to come accept it.

1
3
0
repeated
Edited 10 months ago

Ivanti security advisories: August Security Update
Today, fixes have been released for the following solutions: Ivanti Neurons for ITSM, Ivanti Avalanche and Ivanti Virtual Traffic Manager (vTM).

The concerning CVEs:

  • CVE-2024-7569 (9.6 critical) An information disclosure vulnerability in Ivanti ITSM on-prem and Neurons for ITSM
  • CVE-2024-7593 (9.8 critical) authentication bypass in Ivanti vTM (PUBLICLY DISCLOSED)
    • "We are not aware of any customers being exploited by this vulnerability at the time of disclosure. However, a Proof of Concept is publicly available"

"We have no evidence of these vulnerabilities being exploited in the wild. These vulnerabilities do not impact any other Ivanti products or solutions."

See related Bleeping Computer reporting: Ivanti warns of critical vTM auth bypass with public exploit

0
2
0
[RSS] Talos discovers 11 vulnerabilities between Microsoft, Adobe software disclosed on Patch Tuesday

https://blog.talosintelligence.com/talos-discovers-11-vulnerabilities-between-microsoft-adobe-software-disclosed-on-patch-tuesday/
0
0
0
repeated

Palo Alto Networks security advisories:

"Palo Alto Networks is not aware of any malicious exploitation of this issue."

1
1
0
SolarWinds fixes critical RCE bug affecting all Web Help Desk versions

https://www.bleepingcomputer.com/news/security/solarwinds-fixes-critical-rce-bug-affecting-all-web-help-desk-versions/

This is CVE-2024-28986, pre-auth Java deserialization

h/t @Viss
0
0
1
[RSS] Microsoft Windows CLIPSP.SYS License Update Field Type 0xCC out-of-bounds read vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1971
0
0
0
[RSS] Microsoft CLIPSP.SYS License Update out-of-bounds read vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1988
0
0
0
Show older