Tux Machines
Security Leftovers
Posted by Roy Schestowitz on Feb 02, 2024
Security Week ☛ Mercedes Source Code Exposed by Leaked Microsoft's proprietary prison GitHub Token
A leaked token provided unrestricted access to the entire source code on Mercedes-Benz’s Microsoft's proprietary prison GitHub Enterprise server.
Pen Test Partners ☛ Hacking Electronic Flight Bags. Airbus NAVBLUE Flysmart+ Manager
We’ve been testing the security of a number of different electronic flight bag, or EFB, applications for a few years now.
Security Week ☛ Two More Individuals Charged for DraftKings Hacking
Nathan Austad and Kamerin Stokes have been charged for hacking user accounts at fantasy sports and betting website DraftKings.
SANS ☛ The Fun and Dangers of Top Level Domains (TLDs), (Wed, Jan 31st)
In the beginning, life was easy. We had a very limited set of top-level domains: .com, .edu, .gov, ..int, org, .mil, .net, .org, .edu. In addition, we had .arpa for infrastructure use and various two letter country level domains.
Sysdig Report Surfaces Major Container Security Challenges
A cloud-native security report from Sysdig found 91% of runtime scans fail and only 2% of granted permissions are being used in container environments.
Security Week ☛ Tor Code Audit Finds 17 Vulnerabilities
Over a dozen vulnerabilities discovered in Tor audit, including a high-risk flaw that can be exploited to inject arbitrary bridges.
Security Week ☛ US Gov Disrupts SOHO Router Botnet Used by Chinese APT Volt Typhoon
The US government neutralizes a botnet full of end-of-life Cisco and Netgear routers being by a notorious Chinese APT group.
Security Week ☛ US Says It Disrupted a China Cyber Threat, but Warns Hackers Could Still Wreak Havoc for Americans
↺ US Says It Disrupted a China Cyber Threat, but Warns Hackers Could Still Wreak Havoc for Americans
Chinese government hackers are busily targeting water treatment plants, the electrical grid, transportation systems and other critical infrastructure inside the United States, FBI Director Chris Wray told lawmakers.
Scoop News Group ☛ U.S. officials warn of dire Chinese cyber threats in wake of FBI operation to disrupt botnet
Volt Typhoon used privately owned routers infected with malware in attempt to conceal activity, DOJ says.
Silicon Angle ☛ US disrupts botnet operated by Chinese state-sponsored hacking group
The U.S. government has disrupted a botnet, or network of malware-laden devices, that was used by a Chinese state-sponsored hacking group to disguise its activities. The Justice Department announced the operation this morning. Also today, several senior U.S. officials testified before Congress on China-backed hacking activities targeting critical infrastructure.
Federal News Network ☛ Nakasone wants to see ‘bold move forward’ with CYBERCOM 2.0
Nakasone says one of the major challenges that needs addressing is how quickly military forces rotate in and out of CYBERCOM.
Federal News Network ☛ The journey of HHS transforming to zero trust
HHS is moving toward a zero trust architecture, collecting information on where it may be vulnerable and refining its approach.
Security Week ☛ After Delays, Ivanti Patches Zero-Days and Confirms New Exploit
Ivanti documents a brand-new zero-day and belatedly ships patches; Mandiant is reporting "broad exploitation activity."
Security Week ☛ GNU C Library Vulnerability Leads to Full Root Access
Researchers at Qualys call attention to a vulnerability in Linux’s GNU C Library (glibc) that allows full root access to a system.