Tag: exploit

  • The Register: HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

    Source URL: https://www.theregister.com/2025/09/12/hopefully_just_a_poc_hybridpetya/ Source: The Register Title: HybridPetya: More proof that Secure Boot bypasses are not just an urban legend Feedly Summary: Although it hasn’t been seen in the wild yet A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked…

  • Unit 42: Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain

    Source URL: https://unit42.paloaltonetworks.com/third-party-supply-chain-token-management/ Source: Unit 42 Title: Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain Feedly Summary: Effective OAuth token management is crucial for supply chain security, preventing breaches caused by dormant integrations, insecure storage or lack of rotation. The post Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain…

  • Cisco Talos Blog: Beaches and breaches

    Source URL: https://blog.talosintelligence.com/beaches-and-breaches/ Source: Cisco Talos Blog Title: Beaches and breaches Feedly Summary: Thor examines why supply chain and identity attacks took center stage in this week’s headlines, rather than AI and ransomware. AI Summary and Description: Yes Summary: The provided text discusses various contemporary cybersecurity threats, shifting from ransomware to breaches, particularly focusing on…

  • The Register: Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets

    Source URL: https://www.theregister.com/2025/09/11/vmscape_spectre_vulnerability/ Source: The Register Title: Spectre haunts CPUs again: VMSCAPE vulnerability leaks cloud secrets Feedly Summary: AMD Zen hardware and Intel Coffee Lake affected If you thought the world was done with side-channel CPU attacks, think again. ETH Zurich has identified yet another Spectre-based transient execution vulnerability that affects AMD Zen CPUs and…

  • Cisco Security Blog: SnortML: Cisco’s ML-Based Detection Engine Gets Powerful Upgrade

    Source URL: https://blogs.cisco.com/security/snortml-cisco-ml-based-detection-engine-gets-powerful-upgrade Source: Cisco Security Blog Title: SnortML: Cisco’s ML-Based Detection Engine Gets Powerful Upgrade Feedly Summary: SnortML, Cisco’s innovative ML engine for Snort IPS, proactively detects evolving exploits like SQL Injection, Command Injection & XSS on-device for privacy. AI Summary and Description: Yes Summary: The text highlights the introduction of SnortML, a machine…

  • The Register: Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks

    Source URL: https://www.theregister.com/2025/09/10/akira_ransomware_abusing_sonicwall/ Source: The Register Title: Akira ransomware crims abusing trifecta of SonicWall security holes for extortion attacks Feedly Summary: Patch, turn on MFA, and restrict access to trusted networks…or else Affiliates of the Akira ransomware gang are again exploiting a critical SonicWall vulnerability abused last summer, after a suspected zero-day flaw actually turned…