"GhostWrite Vulnerability Facilitates Attacks on Devices With RISC-V CPU"

"GhostWrite Vulnerability Facilitates Attacks on Devices With RISC-V CPU"

Researchers from the CISPA Helmholtz Center for Information Security in Germany have detailed a RISC-V CPU vulnerability dubbed "GhostWrite." RISC-V is an open source Instruction Set Architecture (ISA) designed for developing custom processors for different applications, including embedded systems, microcontrollers, and more. The team found the vulnerability in the XuanTie C910 CPU made by the Chinese chip company T-Head. GhostWrite enables attackers with limited privileges to read and write from and to physical memory, which could allow them to gain full access to the targeted device.

Submitted by Gregory Rigby on

"Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption"

"Vulnerabilities Exposed Widely Used Solar Power Systems to Hacking, Disruption"

Bitdefender researchers discovered serious vulnerabilities in widely used solar power systems that could allow attackers to cause blackouts. The researchers analyzed photovoltaic system management platforms from the Chinese companies Solarman and Deye. According to Bitdefender, these platforms are used to operate millions of solar installations worldwide, making up about 20 percent of the global solar power production. This article continues to discuss the vulnerabilities found in solar power systems that could have been exploited by hackers to cause disruption and possibly blackouts.

Submitted by Gregory Rigby on

"AWS Patches Vulnerabilities Potentially Allowing Account Takeovers"

"AWS Patches Vulnerabilities Potentially Allowing Account Takeovers"

According to researchers at Aqua Security, Amazon Web Services (AWS) has patched critical vulnerabilities that could have been used to take over accounts. The security flaws could have enabled arbitrary code execution and AWS account takeovers, under certain conditions. The exploitation of the flaws could have also exposed sensitive data and caused Denial-of-Service (DoS) attacks, data exfiltration, and Artificial Intelligence (AI) model manipulation. This article continues to discuss the recently patched critical AWS vulnerabilities.  

Submitted by Gregory Rigby on

"Over 40,000 Internet-Exposed ICS Devices Found in US: Censys"

"Over 40,000 Internet-Exposed ICS Devices Found in US: Censys"

Censys found more than 40,000 Internet-exposed Industrial Control Systems (ICS) in the US. Over half of these systems are likely for building control and automation, and around 18,000 are used to control industrial systems. This article continues to discuss the exposure of Internet-exposed ICS devices.

SecurityWeek reports "Over 40,000 Internet-Exposed ICS Devices Found in US: Censys"

Submitted by grigby1

Submitted by Gregory Rigby on

"Chrome, Firefox Updates Patch Serious Vulnerabilities"

"Chrome, Firefox Updates Patch Serious Vulnerabilities"

Mozilla and Google recently updated their web browsers, and the latest versions patch several potentially serious vulnerabilities. Google updated Chrome to version 127.0.6533.99, which fixes six vulnerabilities, including a critical out-of-bounds memory access issue in the Angle component. The remaining issues have been assigned a "high severity" rating. Google noted that one of them, which earned the reporting researchers $11,000, has been described as a use-after-free in the Sharing component.

Submitted by Adam Ekwall on

"Windows Update Flaws Allow Undetectable Downgrade Attacks"

"Windows Update Flaws Allow Undetectable Downgrade Attacks"

SafeBreach Labs researcher Alon Leviev has highlighted significant gaps in Microsoft's Windows Update architecture, warning that hackers can execute software downgrade attacks and render "fully patched" meaningless on any Windows machine. In a Black Hat conference presentation, he took over the Windows Update process to craft custom downgrades on critical OS components, elevate privileges, and more. He made a fully patched Windows machine susceptible to thousands of past vulnerabilities, thus turning vulnerabilities that have been fixed into zero-days.

Submitted by Gregory Rigby on

"Samsung Bug Bounty Program Payouts Reach $5M, Top Reward Increased to $1M"

"Samsung Bug Bounty Program Payouts Reach $5M, Top Reward Increased to $1M"

Samsung recently announced that it has paid out nearly $5 million through its bug bounty program since its launch in 2017, including $828,000 in 2023.  In 2023, Samsung noted that 113 researchers got paid for responsibly disclosing vulnerabilities in Galaxy mobile devices.  The highest single reward exceeded $57,000, and it went to TASZK Security Labs.  The company also recently announced bonus rewards for high-quality vulnerability reports and informed bug bounty hunters that the maximum reward has been increased to $1 million.

Submitted by Adam Ekwall on

"Ransomware Attack Cost LoanDepot $27 Million"

"Ransomware Attack Cost LoanDepot $27 Million"

Mortgage lender LoanDepot recently reported that the costs associated with a ransomware attack that occured in January 2024, have reached nearly $27 million.  The company noted that the amount includes "costs to investigate and remediate the cybersecurity incident, the costs of customer notifications and identity protection, professional fees including legal expenses, litigation settlement costs, and commission guarantees." The Alphv/BlackCat ransomware group took credit for the attack.

Submitted by Adam Ekwall on

"Rockwell Controller Flaw Exposes Industrial Control Systems"

"Rockwell Controller Flaw Exposes Industrial Control Systems"

Claroty's Team82 uncovered a security vulnerability in Rockwell Automation's ControlLogix 1756 devices that could expose critical infrastructure to cyberattacks on the Operational Technology (OT) controlling physical processes. The flaw in Rockwell Automation's ControlLogix 1756 devices enables attackers to evade a critical security feature. They can use the trusted slot mechanism as a passageway to jump between slots and access Industrial Control Systems (ICS). This article continues to discuss the potential exploitation and impact of the Rockwell controller flaw.

Submitted by Gregory Rigby on

"CISA Releases Secure by Demand Guide"

"CISA Releases Secure by Demand Guide"

The US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have released "Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem" to help organizations purchasing software understand their software manufacturers' cybersecurity approach and ensure secure-by-design is a priority. The guide provides questions to ask when buying software, resources to assess product security maturity based on secure-by-design principles, and more. This article continues to discuss the new Secure by Demand guide.

Submitted by Gregory Rigby on
Subscribe to