Tag: exploit

  • The Register: One token to pwn them all: Entra ID bug could have granted access to every tenant

    Source URL: https://www.theregister.com/2025/09/19/microsoft_entra_id_bug/ Source: The Register Title: One token to pwn them all: Entra ID bug could have granted access to every tenant Feedly Summary: Until Microsoft lobbed it into a virtual volcano A security researcher claims to have found a flaw that could have handed him the keys to almost every Entra ID tenant…

  • The Register: Cybercriminals pwn 850k+ Americans healthcare data

    Source URL: https://www.theregister.com/2025/09/18/850k_americans_affected_by_medical/ Source: The Register Title: Cybercriminals pwn 850k+ Americans healthcare data Feedly Summary: Three US medical centers fess up to serious breaches Cybercriminals broke in and stole nearly a million Americans’ data in the space of a week, after three digital burglaries at healthcare providers.… AI Summary and Description: Yes Summary: The text…

  • Schneier on Security: Time-of-Check Time-of-Use Attacks Against LLMs

    Source URL: https://www.schneier.com/blog/archives/2025/09/time-of-check-time-of-use-attacks-against-llms.html Source: Schneier on Security Title: Time-of-Check Time-of-Use Attacks Against LLMs Feedly Summary: This is a nice piece of research: “Mind the Gap: Time-of-Check to Time-of-Use Vulnerabilities in LLM-Enabled Agents“.: Abstract: Large Language Model (LLM)-enabled agents are rapidly emerging across a wide range of applications, but their deployment introduces vulnerabilities with security implications.…

  • The Register: Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack

    Source URL: https://www.theregister.com/2025/09/17/ddr5_dram_rowhammer/ Source: The Register Title: Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack Feedly Summary: Google and ETH Zurich found problems with AMD/SK Hynix combo, will probe other hardware Researchers from Google and Swiss university ETH Zurich have found a new class of Rowhammer vulnerability that could allow attackers to access info stored…

  • Cloud Blog: New DNS Armor can help detect, mitigate domain name system risks

    Source URL: https://cloud.google.com/blog/products/identity-security/introducing-dns-armor-to-mitigate-domain-name-system-risks/ Source: Cloud Blog Title: New DNS Armor can help detect, mitigate domain name system risks Feedly Summary: The Domain Name System (DNS) is like the internet’s phone book, automatically and near-instantly translating requests for websites and mobile apps from their domain names to the Internet Protocol addresses of the actual computers hosting…

  • Slashdot: The Mac App Flea Market

    Source URL: https://apple.slashdot.org/story/25/09/16/0629209/the-mac-app-flea-market?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: The Mac App Flea Market Feedly Summary: AI Summary and Description: Yes Summary: The text highlights the emergence of numerous imitation applications in the Mac App Store that mimic official AI chat applications like ChatGPT. These copycat apps raise concerns regarding authenticity and security in the AI landscape. Detailed…

  • Krebs on Security: Self-Replicating Worm Hits 180+ Software Packages

    Source URL: https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/ Source: Krebs on Security Title: Self-Replicating Worm Hits 180+ Software Packages Feedly Summary: At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages…