"GoFetch Attack- Researchers Uncover Unfixable Vulnerability in Apple CPUs Affecting Cryptographic Security"

"GoFetch Attack- Researchers Uncover Unfixable Vulnerability in Apple CPUs Affecting Cryptographic Security"

A team of researchers has detailed a new side-channel attack method dubbed "GoFetch," that exploits an unpatchable vulnerability in Apple's M series of chips and enables threat actors to extract secret keys used in cryptography operations. The method is described as a microarchitectural side-channel attack that can extract secret keys from constant-time cryptographic implementations. The attack is aimed at a hardware optimization known as the Data Memory-Dependent Prefetcher (DMP). It tries to improve performance by prefetching addresses found in program memory.

Submitted by grigby1 CPVI on

"Hackers Earn $1,132,500 For 29 Zero-Days at Pwn2Own Vancouver"

"Hackers Earn $1,132,500 For 29 Zero-Days at Pwn2Own Vancouver"

Pwn2Own Vancouver 2024 has recently ended.  Security researchers collected $1,132,500 after demoing 29 zero-days (and some bug collisions).  Throughout the event, the security researchers targeted software and products in the web browser, cloud-native/container, virtualization, enterprise applications, server, local escalation of privilege (EoP), enterprise communications, and automotive categories, all up-to-date and in their default configuration.  The total prize pool was over $1,300,000 in cash prizes and a Tesla Model 3, which Team Synacktiv won on the first day.

Submitted by Adam Ekwall on

"Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds"

"Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds"

Ian Carroll, Lennert Wouters, and other security researchers have revealed a hotel keycard hacking technique dubbed "Unsaflok." The method involves a set of security flaws that would enable a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by Dormakaba. The Saflok systems are installed on 3 million doors worldwide in 13,000 properties across 131 countries. Carroll and Wouters demonstrated how easy it is to open a Saflok keycard lock by exploiting flaws in both Dormakaba's encryption and the underlying RFID system, known as MIFARE Classic.

Submitted by grigby1 CPVI on

"North Korean Hackers Use 'Nuclear Lure' to Trick and Run New Attack"

"North Korean Hackers Use 'Nuclear Lure' to Trick and Run New Attack"

"Kimsuky," a North Korean cyber espionage group, is now using North Korea's nuclear threats to lure victims into executing malicious payloads. Researchers at Rapid7 Labs observed Kimsuky using new tactics to target victims. The group has used weaponized Office documents and ISO files, and starting last year, they began abusing shortcut (LNK) files. The attackers trick users into executing LNK files by passing them off as benign documents or files. However, these files contain hidden PowerShell commands or even full binaries.

Submitted by grigby1 CPVI on

"Tax Hackers Blitz Small Business With Phishing Emails"

"Tax Hackers Blitz Small Business With Phishing Emails"

Threat actors are trying to compromise Social Security numbers through a tax phishing attack aimed at small business owners and self-employed filers. According to Malwarebytes Labs, the social engineering scammers are most likely using a cheap email list of self-employed US residents. These emails can be obtained for as little as a few cents each, either on the dark web or through legitimate lead brokers.

Submitted by grigby1 CPVI on

"Security Researchers Win Second Tesla At Pwn2Own"

"Security Researchers Win Second Tesla At Pwn2Own"

A team of security researchers won a Tesla Model 3 and $200,000 for discovering a zero-day vulnerability in a vehicle's Electronic Control Unit (ECU). After one day of Pwn2Own Vancouver 2024, held by Trend Micro's Zero Day Initiative (ZDI), the Synacktiv team topped the leaderboard. Not much is known about the vulnerability because all bugs discovered during the competition are responsibly reported to the appropriate vendor for patching. However, it is known that the team used a single integer overflow flaw to exploit a Tesla ECU with Vehicle (VEH) CAN BUS Control.

Submitted by grigby1 CPVI on

"New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio"

"New Bipartisan Bill Would Require Online Identification, Labeling of AI-Generated Videos and Audio"

Artificial Intelligence (AI)-generated deepfakes can be difficult or impossible to distinguish from the real thing. AI has already been used to mimic voices, exploit celebrities' likenesses, and impersonate world leaders, raising concerns that it will lead to increased misinformation, consumer scams, and a widespread loss of trust. Therefore, recently introduced bipartisan legislation would require the identification and labeling of AI-generated online images, videos, and audio.

Submitted by grigby1 CPVI on

46th International Conference on Software Engineering (ICSE 2024)

"The IEEE/ACM International Conference on Software Engineering, is the premier software engineering conference. Since 1975, ICSE provides a forum where researchers, practitioners, and educators gather together to present and discuss the most recent innovations, trends, experiences and issues in the field of software engineering."

Topics of interest include, but are not limited to security.

"AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials"

"AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials"

Researchers have detailed "AndroxGh0st," a tool used to target Laravel applications and steal sensitive data. It scans and extracts important information from .env files, revealing login information for Amazon Web Services (AWS) and Twilio. It is classified as an SMTP cracker, exploiting SMTP through different strategies, including credential exploitation, web shell deployment, and vulnerability scanning. Threat actors have been using AndroxGh0st to access Laravel .env files and steal credentials for cloud-based applications.

Submitted by grigby1 CPVI on
Subscribe to