"PixieFail Flaws Impact PXE Network Boot in Enterprise Systems"

"PixieFail Flaws Impact PXE Network Boot in Enterprise Systems"

Quarkslab researchers discovered a set of vulnerabilities called PixieFail affecting the IPv6 network protocol stack of TianoCore's EDK II, an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification that is widely used in enterprise computers and servers. The flaws are in the PXE network boot process, which is critical for provisioning operating systems in data centers and high-performance computing environments. It is a standard procedure for loading operating system images from the network during boot.

Submitted by grigby1 CPVI on

"Majorca Tourist Hotspot Hit With $11m Ransom Demand"

"Majorca Tourist Hotspot Hit With $11m Ransom Demand"

A major Spanish holiday destination became the victim of ransomware last weekend, with reports claiming digital extortionists are demanding €10m ($11m).  The municipality of Calvià in the southwest of Majorca includes the popular tourist hotspot of Magaluf and attracts over one million visitors to its shores a year.  A crisis committee has been assembled to assess the attack's impact on local services, and an IT team is working through forensic analysis and recovery processes.  The Guardia Civil has reportedly also been contacted for assistance.

Submitted by Adam Ekwall on

"OpenAI Announces Plans to Combat Misinformation Amid 2024 Elections"

"OpenAI Announces Plans to Combat Misinformation Amid 2024 Elections"

OpenAI, the developer of the AI chatbot ChatGPT and the image generator DALL-E has recently announced new measures to prevent abuse and misinformation ahead of big elections this year.  The firm announced that it was collaborating with the National Association of Secretaries of State (NASS), the oldest non-partisan professional organization for public officials in the US, to prevent the use of ChatGPT for misinformation ahead of the US Presidential Election in November.

Submitted by Adam Ekwall on

"A Flaw in Millions of Apple, AMD, and Qualcomm GPUs Could Expose AI Data"

"A Flaw in Millions of Apple, AMD, and Qualcomm GPUs Could Expose AI Data"

According to new research, a vulnerability called LeftoverLocals exists in multiple brands and models of mainstream GPUs, including Apple, Qualcomm, and AMD chips, and can allow an attacker to steal large amounts of data from a GPU's memory. To exploit the vulnerability, attackers must first establish some level of operating system access on a target's device. Modern computers and servers are designed to silo data, allowing multiple users to share the same processing resources while not being able to access each other's data.

Submitted by grigby1 CPVI on

"Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation"

"Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation"

Citrix recently informed customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks.  One of the flaws tracked as CVE-2023-6548 is a medium-severity issue that allows a low-privileged authenticated attacker to execute arbitrary code on the management interface remotely.  The second vulnerability, CVE-2023-6549, is a high-severity issue that can be exploited for denial-of-service (DoS) attacks.

Submitted by Adam Ekwall on

"Google Warns of Chrome Browser Zero-Day Being Exploited"

"Google Warns of Chrome Browser Zero-Day Being Exploited"

Google has recently pushed out an urgent Chrome browser update to fix a trio of high-severity security defects and warned that one of the bugs is already being exploited in the wild.  Google describes the exploited zero-day, CVE-2024-0519, as an out-of-bounds memory access issue in the V8 JavaScript engine.  Google did not provide any additional details on the scope of the observed attacks or share telemetry to help defenders hunt for signs of compromise.

Submitted by Adam Ekwall on

"Chinese Researchers Use Quantum To Protect E-Commerce Transactions"

"Chinese Researchers Use Quantum To Protect E-Commerce Transactions"

Researchers from Nanjing University and Renmin University in China have significantly advanced e-commerce security by developing the world's first five-user online trading platform using quantum technology. Their research could improve online transaction security. Traditional e-commerce systems, which are protected by classical encryption algorithms, are becoming increasingly vulnerable to hacking, particularly with the rise of powerful quantum computing.

Submitted by grigby1 CPVI on

"Computer Scientists Makes Noisy Data: Can Improve Treatments in Healthcare"

"Computer Scientists Makes Noisy Data: Can Improve Treatments in Healthcare"

Collecting and analyzing data from a large number of patients in order to discover patterns is an important aspect of modern healthcare, but such data must be protected to prevent the violation of individuals' privacy. Breaches could also damage general trust, resulting in fewer people consenting to participate. Researchers at the University of Copenhagen's Department of Computer Science have developed a method for protecting data sets used to train Machine Learning (ML) models. According to Ph.D.

Submitted by grigby1 CPVI on

"Researchers Demo New CI/CD Attack Techniques in PyTorch Supply-Chain"

"Researchers Demo New CI/CD Attack Techniques in PyTorch Supply-Chain"

Security researchers used new techniques to infiltrate PyTorch's development infrastructure. They exploited insecure configurations in GitHub Actions workflows. Their proof-of-concept (POC) attack was disclosed to PyTorch's lead developer Meta AI. However, other software development organizations using GitHub Actions are likely to have made similar deployment mistakes, potentially exposing themselves to software supply chain attacks.

Submitted by grigby1 CPVI on

"Group-IB Uncovers 16,000 Malicious Domains Used in Inferno Drainer Crypto Scam"

"Group-IB Uncovers 16,000 Malicious Domains Used in Inferno Drainer Crypto Scam"

A new report from Group-IB details the discovery of over 16,000 malicious domains created during the Inferno Drainer cryptocurrency scam last year. The Inferno Drainer group has been linked to the theft of more than $80 million in digital assets. Inferno Drainer targeted about 100 cryptocurrency brands using thousands of unique domains. The scam involved stealing the digital assets of victims who were duped into connecting their cryptocurrency wallets to fake websites and authorizing transactions.

Submitted by grigby1 CPVI on
Subscribe to