Happy Holidays to my oncall buddies today. I wish you all a quiet and uneventful shift.
The slides for the keynote our Cristofaro Mune(@pulsoid) has given at @h2hconference
"False Injections: Tales of Physics, Misconceptions and Weird Machines" are now available here:
Enjoy!
In light of the Crowdstrike outage over 5 months ago, what specific changes has your organization made to your enterprise security program? What changes to policies, procedures, training, alerting, testing, and your written IRP have you made? Please share!
European Space Agency's official web shop was hacked as it started to load a piece of JavaScript code that generates a fake Stripe payment page at checkout.
Announcing #CodeQL Community Packs
https://github.blog/security/vulnerability-research/announcing-codeql-community-packs/
Maybe we should stop calling them *Notifications* and instead refer to *Interruptions*.
"Working on some stuff so I've turned off interruptions for a while."
"Right on."
ā” A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.
An uploaded file could turn into malicious JSP codeāresulting in remote code execution.
Ā» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Ā» Java users: Incorrect configurations = higher risk.
Ā» Severity? CVE-2024-50379 scored a 9.8 on CVSS!
Details here š https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
Near as I can tell, the activity around the #Struts2 bug,
CVE-2024-53677, is just ham-handed runs of some generalized PoC, and nobody's actually exploiting this yet (since exploitation would be very application/path specific).
Most of the news last week was all "exploitation happening, patch and rewrite everything now!" but not seeing any reports of successful (or even possibly successful) this morning.
Tell me I'm wrong!
(The PoC identified by SANS at https://isc.sans.edu/diary/31520 isn't specific to some particular application -- it's on the user to define upload_endpoint
and assumes no auth or session or anything.)
Using @voooooogel control vector library to backdoor a model so that it introduces command injection vulnerabilities rather than using safer subprocess methods
Hi all. In order to make the Defensive Security Podcast content a bit more approachable and easier to navigate, I've created a playlist of individual stories/segments we cover here: https://www.youtube.com/playlist?list=PLzHXsgtVDQEq9JiCbwJojE4nd9dRVAT5l
Note: I've only gone back 4 episodes, but will be doing this for all episodes going forward.
Happy holidays!
I started keeping a log of the serious attempts I've made to use generative AI for things (mostly coding-related). I've been bucketing them as successes or failures, along with the date and models used.
From the past several months, I'm up to 9 failures and 3 successes. I'll share this list some day.
When these systems have been successful, it's pretty neat. However, the successes I've seen have been for easy things, and the failures have mostly been time-sucks for me.
I feel like a heretic saying this (I'm a Principal Machine Learning Engineer), but I am not seeing a net benefit from using generative AI in my own work!