How should security patches be managed in public versioning systems (like Github, etc.)?

There’s a thing I don’t understand. I found a project on Github. Looking at the list of commits, you can see stuff like “fixed XSS in file whatever, etc”. But that commit is part of a long list of commits that were made after… Continue reading How should security patches be managed in public versioning systems (like Github, etc.)?

E-Mail Vulnerabilities and Disclosure

Last week, researchers disclosed vulnerabilities in a large number of encrypted e-mail clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird and AppleMail. These are serious vulnerabilities: An attacker who can alter mail sent to a vulnerable client can trick that client into sending a copy of the plaintext to a web server controlled by that attacker. The story… Continue reading E-Mail Vulnerabilities and Disclosure

Hacker Publicly Posts Data Stolen From Government-Linked Cyberespionage Group

Last week, Motherboard obtained data from the so-called ZooPark hacking group, which some suspect is connected to Iran. Now the hacker responsible has seemingly dumped the information after receiving a $1,000 payment. Continue reading Hacker Publicly Posts Data Stolen From Government-Linked Cyberespionage Group

It only took five hours to close a critical vulnerability in Signal’s desktop client

A critical vulnerability found in the desktop version of secure messaging app Signal was patched less than five hours after disclosure to the developers, a rapid response that’s earned some plaudits from observers. Security researchers detailed a remote code execution flaw in the Signal desktop application across Windows, Mac OSX and Linux operating systems. A hacker could execute code on a targeted system just by sending a message to the victim because Signal’s desktop app failed to sanitize specific HTML tags that can inject HTML code into remote chat windows. “The critical thing here was that it didn’t require any interaction form[sic] the victim, other than simply being in the conversation,” the researchers wrote. “Anyone can initiate a conversation in Signal, so the attacker just needs to send a specially crafted URL to pwn the victim without further action. And it is platform independent!” Joshua Lund, a developer at Signal, commented that “exploiting this requires the attacker […]

The post It only took five hours to close a critical vulnerability in Signal’s desktop client appeared first on Cyberscoop.

Continue reading It only took five hours to close a critical vulnerability in Signal’s desktop client

‘Efail’ exploit can expose old email content that was previously encrypted

Lingering software flaws that have existed in popular email clients can be exploited under certain conditions to access email content even when they’re protected by PGP or S/MIME standards, according to new research. The research, dubbed “efail,” explains how it’s possible to exploit buggy email platforms, particularly in the way PGP is integrated into the platform. It does not show how to “break” the actual encryption protocol supporting PGP, short for “pretty good privacy.” Sebastian Schnitzel, who co-authored the research, urged people to disable PGP or S/MIME in their email client until a fix can be issued. There are currently no reliable fixes for the vulnerability. If you use PGP/GPG or S/MIME for very sensitive communication, you should disable it in your email client for now. Also read @EFF’s blog post on this issue: https://t.co/zJh2YHhE5q #efail 2/4 — Sebastian Schinzel (@seecurity) May 14, 2018 The research is focused on how popular HTML-based email […]

The post ‘Efail’ exploit can expose old email content that was previously encrypted appeared first on Cyberscoop.

Continue reading ‘Efail’ exploit can expose old email content that was previously encrypted

Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business.

An anonymous report claims that a ton of your company’s customer data has been exposed. A sense of calm is in the air as you enact your vulnerability disclosure policy. You save the day, get a promotion and rainbows and unicorns fill the sky. The… Continue reading Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business.

Israeli Security Attacks AMD by Publishing Zero-Day Exploits

Last week, the Israeli security company CTS Labs published a series of exploits against AMD chips. The publication came with the flashy website, detailed whitepaper, cool vulnerability names — RYZENFALL, MASTERKEY, FALLOUT, and CHIMERA — and logos we… Continue reading Israeli Security Attacks AMD by Publishing Zero-Day Exploits