We've been collecting and mirroring what we can find of public data scrapes of data that has recently gone missing from federal sites or is likely to in the near future. The repos here include public data from CDC, NIH, and NOAA. Be warned that some of these repos are quite large!
Unofficial #PatchTuesday continues with Google Chrome: Stable Channel Update for Desktop
Chrome 133.0.6943.53 (Linux) and 133.0.6943.53/54( Windows, Mac) includes 12 security fixes, 3 are externally reported:
No mention of exploitation.
The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2024! https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
NETGEAR did this earlier than #PatchTuesday on 01 February 2025 but here you go:
Top 10 web hacking techniques of 2024 https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
#PatchTuesday continues with Zyxel: Zyxel security advisory for command injection and insecure default credentials vulnerabilities in certain legacy DSL CPE
Zyxel's security advisory confirms the existence of CVE-2024-40890, CVE-2024-40891, and CVE-2025-0890 affecting end-of-life DSL CPE products. While they link to GreyNoise's blog post, Zyxel does not acknowledge the fact that CVE-2024-40891 (8.8 high) post-auth command injection is a zero-day being exploited in the wild by a Mirai botnet variant. They reiterate that EoL products don’t receive further support and:
"we strongly recommend that users replace them with newer-generation products for optimal protection."
Note: DSL CPE likely stands for Digital Subscriber Line Customer-Premises Equipment cc: @fellows for more Patch Tuesday Madness.
#zyxel #vulnerability #cve #CVE_2024_40891 #zeroday #eitw #activeexploitation #mirai #botnet #infosec #cybersecurity
CISA: CISA Adds Four Known Exploited Vulnerabilities to Catalog
Hot off the press!:
#cisa #cisakev #kev #vulnerability #eitw #activeexploitation #infosec #cybersecurity #knownexploitedvulnerabilitiescatalog
Not that it surprises me, but the "National Cybersecurity Strategy" has disappeared:
https://www.whitehouse.gov/oncd/national-cybersecurity-strategy/
So yeah.
Archive link:
https://web.archive.org/web/20250117195921/https://www.whitehouse.gov/oncd/national-cybersecurity-strategy/
There is still a couple more days to submit your 1-page article to Paged Out! #6!
We're at 41 pages of content out of 50 required. We'll start finalizing the issue when we reach 50. Not much time left, but you can still make it! 🙂
Details: https://pagedout.institute/?page=cfp.php
4 February 1917 | A Polish Jewish dancer Franciszka Mann was born. She was most probably the woman who on 23 October 1943, inside the undressing room of gas chamber II at Auschwitz II-Birkenau, seized SS man Josef Schillinger’s pistol, shot him & wounded SS man Wilhelm Emmerich.
Do you want to introduce the fediverse and/or Bluesky to your organization -- in addition to, or instead of, X & Meta?
Through Feb, Mar and Apr, I'll be offering free one-hour sessions on Fridays to talk to your org. For-profit, non-profit, gov, edu, etc. This is not a consultancy; this is volunteer advocacy and support for building our collective independence from X & Meta.
If you are interested, book a slot through this link (starting Feb 7). Time is not movable. :)
New from our team: A PHP implementation of RFC 9180 (HPKE - Hybrid Public-Key Encryption):
https://github.com/paragonie/hpke-php
This should serve as building block for more secure protocols (i.e., RFC 9420 a.k.a. Messaging Layer Security)/
This would, in turn, enable PHP developers to write software that communicates with MLS-compatible end-to-end encrypted messaging services.
Google Android zero-day: Android Security Bulletin February 2025
46 CVEs in Framework (1 critical, 45 high severity) cc: @buherator
Note: There are indications that CVE-2024-53104 may be under limited, targeted exploitation.
#CVE_2024_53104 #android #google #vulnerability #zeroday #eitw #activeexploitation #infosec #cybersecurity
Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!
https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w