"The Danger of Forgotten Pixels on Websites: A New Case Study"

"The Danger of Forgotten Pixels on Websites: A New Case Study"

Reflectiz, an advanced website security solution provider, has released a case study highlighting a scenario involving forgotten pixels on websites that could have impacted any industry. The case study focuses on an overlooked and misconfigured pixel associated with a top global healthcare provider. This forgotten piece of code collected private user information without user consent, potentially exposing the company to significant fines and reputational damage. This article continues to discuss the case study on the risks of forgotten pixels on websites.

Submitted by Gregory Rigby on

Pub Crawl - November 2023

Pub Crawl - November 2023

Selections by dgoff

Pub Crawl summarizes, by hard problems, sets of publications that have been peer-reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by Gregory Rigby on

"Google Announces Bug Bounty Program and Other Initiatives to Secure AI"

"Google Announces Bug Bounty Program and Other Initiatives to Secure AI"

Google recently announced several initiatives meant to improve the safety and security of AI, including a bug bounty program and a $10 million fund.  Google noted that the new vulnerability reporting program (VRP) will reward researchers for finding vulnerabilities in generative AI to address concerns such as the potential for unfair bias, hallucinations, and model manipulation.

Submitted by Adam Ekwall on

"Cloudflare Sees Surge in Hyper-Volumetric HTTP DDoS Attacks"

"Cloudflare Sees Surge in Hyper-Volumetric HTTP DDoS Attacks"

Cloudflare reports that the number of hyper-volumetric HTTP Distributed Denial-of-Service (DDoS) attacks recorded in the third quarter of 2023 exceeds all previous years. A report from Cloudflare reveals that during the third quarter of 2023, the Internet company mitigated thousands of hyper-volumetric HTTP DDoS attacks. More than 89 of these attacks surpassed 100 million requests per second (rps). The largest attack peaked at 201 million rps, three times larger than the previous record in February 2023.

Submitted by Gregory Rigby on

"CISA Issues Request for Comment on Software Identification Ecosystem Analysis White Paper"

"CISA Issues Request for Comment on Software Identification Ecosystem Analysis White Paper"

The US Cybersecurity and Infrastructure Security Agency (CISA) wants feedback on its analysis or approaches in "Software Identification Ecosystem Option Analysis," a white paper outlining a community goal for a more harmonized software identification ecosystem that can be used across the global software space for all important cybersecurity use cases.

Submitted by Gregory Rigby on

"iLeakage - Apple Processors Vulnerable To Sensitive Data Leaks"

"iLeakage - Apple Processors Vulnerable To Sensitive Data Leaks"

According to researchers from American and German universities, the A- and M-Series processors used in Apple's mobile devices and PCs contain a flaw that makes it easy for hackers to access sensitive data. The researchers refer to the flaw as iLeakage, which is a side-channel vulnerability. In side-channel attacks, information becomes visible using clues left in electromagnetic radiation, data caches, and other manifestations within a system. This article continues to discuss the iLeakage vulnerability.

Submitted by Gregory Rigby on

"CISA Releases Cybersecurity Toolkit For Healthcare"

"CISA Releases Cybersecurity Toolkit For Healthcare"

The Cybersecurity and Infrastructure Security Agency (CISA) has recently published a new set of online resources designed to help IT security leaders in the healthcare sector improve their organization’s security posture.  The new tools include CISA’s Cyber Hygiene Services, which use vulnerability scanning to help organizations reduce their attack surface.

Submitted by Adam Ekwall on

"Complex Spy Platform StripedFly Bites 1M Victims"

"Complex Spy Platform StripedFly Bites 1M Victims"

Malware, believed to just be a cryptocurrency miner was, in fact, a sophisticated spy platform for Windows and Linux systems. It has already infected more than one million people. When it was first detected in 2017, StripedFly was regarded as a mainly ineffective malware for cryptocurrency mining. However, since then, it has been functioning as a complex piece of modular malware that enables attackers to gain persistence on networks, visibility over their activity, and the ability to exfiltrate credentials and other data, according to researchers.

Submitted by Gregory Rigby on

"Ransomware Groups Continue To Increase Their Operational Tempo"

"Ransomware Groups Continue To Increase Their Operational Tempo"

According to GuidePoint Security, ransomware activity continued to increase in the third quarter of 2023. GuidePoint Research and Intelligence Team (GRIT) observed a nearly 15 percent rise in ransomware activity due to an increase in the number of ransomware groups, including the discovery of 10 new groups. GRIT tracked 1,353 publicly posted ransomware victims claimed by 46 different threat groups during the third quarter.

Submitted by Gregory Rigby on

"Hackers Earn $400k on First Day at Pwn2Own Toronto 2023"

"Hackers Earn $400k on First Day at Pwn2Own Toronto 2023"

The Pwn2Own Toronto 2023 hacking contest started yesterday, and participants successfully hacked NAS devices, printers, mobile phones, and other devices, earning more than $400,000 on the first day.  The highest reward of the day went to team Orca of Sea Security, which executed a two-vulnerability exploit chain (out-of-bounds read and use-after-free) against the Sonos Era 100 speaker, earning $60,000.  The Pentest Limited team earned the second highest reward of the day, at $50,000, for an improper input validation exploit targeting the Samsung Galaxy S23 mobile phone.

Submitted by Adam Ekwall on
Subscribe to