Language Selection

English French German Italian Portuguese Spanish

Security Leftovers

Filed under
Security
  • Apple patches zero-day kernel hole and much more – update now! [Ed: Apple did not patch this until it was publicly known that it had been exploited]

    The bug fixes for iPhones and iPads include remote code execution flaws (RCEs) in components from the kernel itself to Apple’s image rendering library, graphics drivers, video processing modules and more. Several of these bugs warn that “a malicious application may be able to execute arbitrary code with kernel privileges”. That’s the sort of security hole that could lead to a complete device takeover – what’s known in the jargon as a “jailbreak“, because it escapes from Apple’s strict lockdown and app restrictions.

  • Creating our own password manager

    We can manage a range of passwords by creating our own password manager using the bash commandline available in popular GNU/Linux operating systems. The GNU/Bash Shell is readily available in Ubuntu/Debian based Linux systems. They can be launched using the terminal application (with the shortcut Ctrl+Alt+T).

  • Conti presses Costa Rica. Bluetooth LE proof-of-concept. Making initial access more difficult. Cyber phases of hybrid wars. [Ed: Costa Rica pays a huge price for being penetrated by Microsoft]

    Reuters reports that the number of Costa Rican organizations affected by Conti's ransomware attack has now grown to twenty-seven. Recently elected President Rodrigo Chaves has said that nine institutions, most of them governmental, were heavily affected, and that the attacks were having an "enormous" impact on foreign trade and tax collection. The governments of Israel, the United States and Spain are all providing Costa Rica with assistance in recovery and remediation, but a lot of work remains to be done.

  • Fantastic Open Source Cybersecurity Tools and Where to Find Them [Ed: Ironically, one must run unsafe proprietary software just to open this article]
  • Venezuelan cardiologist charged with 'designing and selling ransomware' [Ed: Microsoft Windows]

    The US Attorney’s Office has charged a 55-year-old cardiologist with creating and selling ransomware and profiting from revenue-share agreements with criminals who deployed his product.

    A complaint [PDF] filed on May 16th in the US District Court, Eastern District of New York, alleges Moises Luis Zagala Gonzalez – aka “Nosophoros,” “Aesculapius” and “Nebuchadnezzar” – created a ransomware builder known as “Thanos”, and ransomware named “Jigsaw v. 2”.

    The self-taught coder and qualified cardiologist advertised the ransomware in dark corners of the web, then licensed it ransomware to crooks for either $500 or $800 a month, it is claimed. He also ran an affiliate network that offered the chance to run Thanos to build custom ransomware, in return for a share of profits, it is alleged.

  • Firefox out-of-band update to 100.0.1 – just in time for Pwn2Own? [Ed: Bloated browsers beget impossible security?]
  • How crooks backdoor sites and scrape credit card info • The Register

    In a paper scheduled to appear at the Usenix '22 security conference later this year, authors Asuman Senol (imec-COSIC, KU Leuven), Gunes Acar (Radboud University), Mathias Humbert (University of Lausanne) and Frederik Zuiderveen Borgesius, (Radboud University) described how they measured data handling in web forms on the top 100,000 websites, as ranked by research site Tranco. ®

  • Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware [Ed: Microsoft Windows]

    There also is a custom hash-cracking system that "stores cracked hashes, updates threat actors on the cracking status and shows the results of cracking attempts on other servers," the threat hunters wrote. The software claims it can crack a broad array of common hash types, including LM:NTLM hashes, cached domain credentials, Kerberos 5 TGS-REP/AS-REP tickets, KeePass files, and those used for MS Office 2013 documents.

  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

  • Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks
  • India slightly softens infosec incident reporting rules • The Register

    India has slightly softened its controversial new reporting requirements for information security incidents and made it plain they apply to multinational companies.

    The rules were announced with little advance warning in late April and quickly attracted criticism from industry on grounds including the requirement to report 22 different types of incident within six hours, a requirement to register personal details of individual VPN users, and retention of many log files for 180 days.

  • How to choose a certificate management tool

    Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

  • OpenSSF Helping to Secure Open Source Software [Ed: No, it is mostly a marketing (openwashing) facade for proprietary software companies that actively insert back doors into things and strive to centralise everything around themselves under the guise of "security"]
  • Sigstore Sets Out to Secure Cloud-Native Supply Chain [Ed: No, this is about outsourcing trust and centralising it around Pentagon-connected companies in the name of so-called 'security' (it's censorship of software)]
  • SBOM Everywhere: The OpenSSF Plan for SBOMs [Ed: Missing disclosure here about LF paying for puff pieces about its programs and schemes]
  • Patch your VMware gear now – or yank it out, Uncle Sam tells federal agencies [Ed: When VMWare points the finger at Linux it's a deflection tactic]
  • Malicious PyPI package opens backdoors on Windows, Linux, and Macs [Ed: It's not an OS issue but an issue of people installing malware on their OS]

More in Tux Machines

MNT Pocket Reform 7-inch modular mini laptop takes a range of Arm (and FPGA) modules

MNT Pocket Reform is an open-source hardware mini laptop with a 7-inch Full HD display, an ortholinear mechanical keyboard, and trackball, that follows the path of its older and bigger sibling: the MNT Reform 2 laptop initially launched with an NXP i.MX 8M quad-core Arm Cortex-A53 module. The new laptop will not only support a similar “NXP i.MX 8M Plus” module but also a range of other Arm modules namely an NXP Layerscape LS1028A module with up to 16GB RAM, the Raspberry Pi CM4 module via an adapter, Pine64 SOQuartz (RK3566, up to 8GB RAM), as well as based on AMD Xilinx Kintex-7 FPGA for industrial use. Read more Also: STEPFPGA supports Verilog on cloud-based IDE and Lattice’s Diamond IDE

Android Leftovers

IPFire 2.27 - Core Update 169 is available for testing

The next Core Update - one of the biggest in size we have ever put together - is available for testing. It introduces the support of two-factor authentication (2FA) for OpenVPN clients, updates several core parts of the system, provides mitigations for another two types of CPU side-channel attacks, as well as package updates, bug fixes and other security improvements. For OpenVPN clients, the setup of two-factor authentication based on time-based one-time password (TOTP) is now supported. It can either be enforced on a per-client basis, preserving the flexibility of mixing end-user devices with machine clients, where no manual interaction is feasible during OpenVPN connection establishment. Read more

9 Top Free and Open Source Elixir Web Frameworks

One of the types of software that’s important for a web developer is the web framework. A framework “is a code library that makes a developer’s life easier when building reliable, scalable, and maintainable web applications” by providing reusable code or extensions for common operations. By saving development time, developers can concentrate on application logic rather than mundane elements. A web framework offers the developer a choice about how to solve a specific problem. By using a framework, a developer lets the framework control portions of their application. While it’s perfectly possible to code a web application without using a framework, it’s more practical to use one. Read more