"GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks"

"GhostWrite: New T-Head CPU Bugs Expose Devices to Unrestricted Attacks"

A team of researchers from Germany's CISPA Helmholtz Center for Information Security discovered an architectural flaw, codenamed "GhostWrite," affecting the Chinese chip company T-Head's XuanTie C910 and C920 RISC-V CPUs. Attackers could exploit the bug to gain unrestricted access to vulnerable devices. The GhostWrite vulnerability is a direct CPU bug embedded in the hardware instead of a side-channel or transient execution attack.

Submitted by Gregory Rigby on

"Carnegie Mellon's Hacking Team Wins Third Straight, Record Eighth Overall DEF CON Capture-the-Flag Title"

"Carnegie Mellon's Hacking Team Wins Third Straight, Record Eighth Overall DEF CON Capture-the-Flag Title"

The most successful team in DEF CON's Capture-the-Flag (CTF) competition history, Carnegie Mellon University's (CMU) "Plaid Parliament of Pwning" (PPP), won its third consecutive title, earning its eighth victory. DEF CON's flagship competition gathers cybersecurity professionals, researchers, and students to break each other's systems, steal virtual flags, and accumulate points while protecting their own systems. As cyberattacks rise worldwide, such events allow top cybersecurity engineers to compete and learn new techniques.

Submitted by Gregory Rigby on

"35% of Exposed API Keys Still Active, Posing Major Security Risks"

"35% of Exposed API Keys Still Active, Posing Major Security Risks"

The company Nightfall AI found that secrets such as passwords and Application Programming Interface (API) keys were most often found in GitHub. Every year, about 350 total secrets are exposed per 100 employees. Thirty-five percent of the discovered API keys were still active, increasing vulnerability to privilege escalation attacks, data leaks, and breaches.

Submitted by Gregory Rigby on

"Hackers Leak 2.7 Billion Data Records With Social Security Numbers"

"Hackers Leak 2.7 Billion Data Records With Social Security Numbers"

Nearly 2.7 billion records of personal information for people in the US were leaked on a popular hacking forum. The records include names, Social Security numbers (SSNs), known physical addresses, and more. The leaked data is alleged to have come from National Public Data, a company that collects and sells access to personal data for background checks, criminal record searches, and private investigations. This article continues to discuss the leak of 2.7 billion data records by hackers.

Submitted by Gregory Rigby on

"Adobe Calls Attention to Massive Batch of Code Execution Flaws"

"Adobe Calls Attention to Massive Batch of Code Execution Flaws"

Adobe recently released fixes for 72 security vulnerabilities across multiple products and warned that Windows and macOS users are at risk of code execution, memory leaks, and denial-of-service attacks. The company noted that the patches address critical security defects in Adobe Acrobat and Reader, Illustrator, Photoshop, InDesign, Adobe Commerce, and Dimension and is warning that the most severe of these vulnerabilities could allow attackers to take complete control of a target machine.

Submitted by Adam Ekwall on

"FBI Leads Effort to Dismantle Radar/Dispossessor Ransomware"

"FBI Leads Effort to Dismantle Radar/Dispossessor Ransomware"

The Federal Bureau of Investigation (FBI) has partnered with law enforcement in the UK and Germany to dismantle Information Technology (IT) infrastructure linked to the ransomware group called "Dispossessor" or "Radar." According to the FBI, the group targets small and medium-sized businesses (SMBs) in the production, development, education, healthcare, financial services, and transportation sectors. This article continues to discuss the dismantling of the Radar/Dispossessor ransomware. 

Submitted by Gregory Rigby on

"AMD Issues Updates for Silicon-Level 'SinkClose' Processor Flaw"

"AMD Issues Updates for Silicon-Level 'SinkClose' Processor Flaw"

AMD has issued firmware updates to address a nearly two-decade-old silicon-level vulnerability called "SinkClose" in its EPYC data center processors and Ryzen line of processors for PCs and embedded systems. The flaw impacts a processor component that protects System Management Mode (SMM), an execution mode more privileged than kernel-level mode. According to the IOActive researchers who discovered the privilege escalation vulnerability, it is an "unpatchable" issue. If exploited, it enables an attacker to install malware on a system that would be nearly impossible to remove.

Submitted by Gregory Rigby on

"3AM Ransomware Stole Data of 464,000 Kootenai Health Patients"

"3AM Ransomware Stole Data of 464,000 Kootenai Health Patients"

Kootenai Health has recently disclosed a data breach impacting over 464,000 patients after their personal information was stolen and leaked by the 3AM ransomware operation.  The organization is notifying patients who received care at its facilities that it detected a cyberattack in early March 2024, which disrupted certain IT systems.  The company stated that the ongoing investigation shows that the cybercriminals gained unauthorized access to Kootenai's systems on February 22, 2024, allowing the threat actors ten days to roam the network and steal sensitive data.

Submitted by Adam Ekwall on

"Prolific Belarusian Cybercriminal Arrested in Spain"

"Prolific Belarusian Cybercriminal Arrested in Spain"

A 38-year-old Belarusian accused of being one of the world's most prolific Russian-speaking cybercriminals has been arrested and extradited by the UK's National Crime Agency (NCA) as part of an international law enforcement operation.  Silnikau, who also goes by Maksym Silnikov, was arrested by Spain's Guardia Civil in an apartment in Estepona, southern Spain, in July 2023.  On August 9, 2024, he was extradited from Poland to the US to face charges relating to cybercrime offenses.  The NCA noted that Silnikau is believed to have used the "J.P.

Submitted by Adam Ekwall on

"Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation"

"Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation"

The National Institute of Standards and Technology (NIST) has formally published three post-quantum cryptography standards from its competition to develop cryptography that can withstand quantum computing decryption of current asymmetric encryption. The three standards are ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (Sphincs+). FN-DSA (Falcon) is a fourth that has been chosen for standardization in the future.

Submitted by Gregory Rigby on
Subscribe to