Difference between revisions of "Template:PSWPaul639"

From Paul's Security Weekly
Jump to: navigation, search
Line 1: Line 1:
 
#[https://asset-group.github.io/disclosures/sweyntooth/ ASSET Research Group: SweynTooth] - ''SweynTooth captures a family of 12 vulnerabilities (more under non-disclosure) across different BLE software development kits (SDKs) of six major system-on-a-chip (SoC) vendors. The vulnerabilities expose flaws in specific BLE SoC implementations that allow an attacker in radio range to trigger deadlocks, crashes and buffer overflows or completely bypass security depending on the circumstances.''
 
#[https://asset-group.github.io/disclosures/sweyntooth/ ASSET Research Group: SweynTooth] - ''SweynTooth captures a family of 12 vulnerabilities (more under non-disclosure) across different BLE software development kits (SDKs) of six major system-on-a-chip (SoC) vendors. The vulnerabilities expose flaws in specific BLE SoC implementations that allow an attacker in radio range to trigger deadlocks, crashes and buffer overflows or completely bypass security depending on the circumstances.''
#[https://www.securityweek.com/misconfigured-docker-registries-expose-thousands-repositories Misconfigured Docker Registries Expose Thousands of Repositories | SecurityWeek.Com]
+
#[https://www.securityweek.com/misconfigured-docker-registries-expose-thousands-repositories Misconfigured Docker Registries Expose Thousands of Repositories] - ''“With all the source code and historical tags, malicious actors can design tailored exploits to compromise the systems. If the push operation is allowed, benign application images may be replaced with images with backdoors. These registries may also be used for hosting malware. If the delete operation is allowed, hackers could encrypt or delete the images and ask for ransom,” they note in a blog post. '' but as of tonight, only 940, at least one person got the memo. But there are probably more in other hosted providers.
 
#[https://news.hitb.org/content/top-ten-password-cracking-techniques-used-hackers top-ten-password-cracking-techniques-used-hackers]
 
#[https://news.hitb.org/content/top-ten-password-cracking-techniques-used-hackers top-ten-password-cracking-techniques-used-hackers]
 
#[https://www.slashgear.com/mac-malware-reportedly-grew-faster-than-windows-malware-in-2019-11609550/ Mac malware reportedly grew faster than Windows malware in 2019]
 
#[https://www.slashgear.com/mac-malware-reportedly-grew-faster-than-windows-malware-in-2019-11609550/ Mac malware reportedly grew faster than Windows malware in 2019]

Revision as of 21:12, 13 February 2020

  1. ASSET Research Group: SweynTooth - SweynTooth captures a family of 12 vulnerabilities (more under non-disclosure) across different BLE software development kits (SDKs) of six major system-on-a-chip (SoC) vendors. The vulnerabilities expose flaws in specific BLE SoC implementations that allow an attacker in radio range to trigger deadlocks, crashes and buffer overflows or completely bypass security depending on the circumstances.
  2. Misconfigured Docker Registries Expose Thousands of Repositories - “With all the source code and historical tags, malicious actors can design tailored exploits to compromise the systems. If the push operation is allowed, benign application images may be replaced with images with backdoors. These registries may also be used for hosting malware. If the delete operation is allowed, hackers could encrypt or delete the images and ask for ransom,” they note in a blog post. but as of tonight, only 940, at least one person got the memo. But there are probably more in other hosted providers.
  3. top-ten-password-cracking-techniques-used-hackers
  4. Mac malware reportedly grew faster than Windows malware in 2019
  5. Forgotten motherboard driver turns out to be perfect for slipping Windows ransomware past antivirus checks
  6. Dell SupportAssist flaw exposes computers to hack, patch it asap!
  7. Jail Software Left Inmate Data Exposed Online
  8. Why Ransomware Will Soon Target the Cloud
  9. Hackers could shut down satellites or turn them into weapons
  10. Emotet Evolves With new Wi-Fi Spreader - Binary Defense
  11. CIA Secretly Owned Global Encryption Provider, Built Backdoors, Spied On 100+ Foreign Governments: Report