Hacking Digital License Plates
December 18 2024Not everything needs to be digital and “smart.” License plates, for example:
Josep Rodriguez, a researcher at security firm IOActive, has revealed a technique to “jailbreak” digital license plates...
Read more
Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days
November 18 2024Zero-day vulnerabilities are more commonly used, according to the Five Eyes:
Key Findings
In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing...
Read more
AIs Discovering Vulnerabilities
November 5 2024I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning,...
Read moreHacking ChatGPT by Planting False Memories into Its Data
October 1 2024This vulnerability hacks a feature that allows ChatGPT to have long-term memory, where it uses information from past conversations to inform future conversations with that same user. A researcher...
Read moreNew Windows IPv6 Zero-Click Vulnerability
August 16 2024The press is reporting a critical Windows vulnerability affecting IPv6.
As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly...
Read more
Nearly 7% of Internet Traffic Is Malicious
July 31 2024Cloudflare reports on the state of applications security. It claims that 6.8% of Internet traffic is malicious. And that CVEs are exploited as quickly as 22 minutes after proof-of-concepts...
Read moreCompromising the Secure Boot Process
July 27 2024This isn’t good:
On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by Acer, Dell, Gigabyte, Intel,...
Read more
RADIUS Vulnerability
July 10 2024New attack against the RADIUS authentication protocol:
The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge a valid protocol accept message in response...
Read more
New Open SSH Vulnerability
July 3 2024It’s a serious one:
The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems;...
Read more
Recent Comments