[SANS ISC] A ‘Zip Bomb’ to Bypass Security Controls & Sandboxes

I published the following diary on isc.sans.edu: “A ‘Zip Bomb’ to Bypass Security Controls & Sandboxes“: Yesterday, I analyzed a malicious archive for a customer. It was delivered to the mailbox of a user who, hopefully, was security-aware and reported it. The payload passed through the different security layers based on big

The post [SANS ISC] A ‘Zip Bomb’ to Bypass Security Controls & Sandboxes appeared first on /dev/random.

Continue reading [SANS ISC] A ‘Zip Bomb’ to Bypass Security Controls & Sandboxes

Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple’s Bug Bounty Program

A comprehensive three-month analysis of Apple’s online services has netted a team of security researchers a $288,500 reward after reporting critical vulnerabilities as part of its bug bounty program. In total, the researchers disclosed 55 vulnerabiliti… Continue reading Security Researchers Awarded over $250,000 for Reporting 55 Vulnerabilities in Apple’s Bug Bounty Program

Kentucky-Based Fine Spirits Manufacturer Targeted by REvil Ransomware

Sodinokibi (REvil) ransomware operators have been busy over the past month, and have now claimed US fine spirits manufacturer Brown-Forman as their latest victim. The Kentucky-based company, one of the largest US businesses in the spirits and wine busi… Continue reading Kentucky-Based Fine Spirits Manufacturer Targeted by REvil Ransomware

Ask Hackaday: Why Did GitHub Ship All Our Software Off To The Arctic?

If you’ve logged onto GitHub recently and you’re an active user, you might have noticed a new badge on your profile: “Arctic Code Vault Contributor”. Sounds pretty awesome right? But whose code got archived in this vault, how is it being stored, and what’s the point?

They Froze My Computer!

…read more

Continue reading Ask Hackaday: Why Did GitHub Ship All Our Software Off To The Arctic?

Go Phish: Cybercriminals Stick to Coronavirus and Financial Content to Fuel Phishing Schemes

We’ve reached the half-year mark and online scammers are still taking advantage of the uncertainties brought on by the pandemic. Cyber-attacks targeting both consumers and business surged worldwide, and the trend shows no sign of stopping any tim… Continue reading Go Phish: Cybercriminals Stick to Coronavirus and Financial Content to Fuel Phishing Schemes

26 million LiveJournal users warned that their passwords have been breached

On underground criminal marketplaces the email addresses and plaintext passwords of over 26 million LiveJournal blogging accounts are being traded, despite LiveJournal’s owners refusing to acknowledge that any security breach has occurred. The fi… Continue reading 26 million LiveJournal users warned that their passwords have been breached

Hacking the iOS/macOS webcam – Apple pays out $75,000 to bug hunter

A vulnerability researcher has received a bug bounty after discovering security holes in Apple’s software that could allow malicious parties to hijack an iPhone or Mac user’s camera and spy upon them. Bug hunter Ryan Pickren is richer to th… Continue reading Hacking the iOS/macOS webcam – Apple pays out $75,000 to bug hunter