Tag: exploit

  • Simon Willison’s Weblog: Quoting Sam Altman

    Source URL: https://simonwillison.net/2025/Feb/12/sam-altman/#atom-everything Source: Simon Willison’s Weblog Title: Quoting Sam Altman Feedly Summary: We want AI to “just work” for you; we realize how complicated our model and product offerings have gotten. We hate the model picker as much as you do and want to return to magic unified intelligence. We will next ship GPT-4.5,…

  • The Register: Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

    Source URL: https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/ Source: The Register Title: Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un Feedly Summary: 300+ US companies, 70+ individuals hit by the fraudsters An Arizona woman who created a “laptop farm" in her home to help fake IT workers pose as US-based employees has pleaded guilty in a…

  • Microsoft Security Blog: The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/ Source: Microsoft Security Blog Title: The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation Feedly Summary: Microsoft is publishing for the first time our research into a subgroup within the Russian state actor Seashell Blizzard and its multiyear initial access operation, tracked by Microsoft Threat Intelligence as the “BadPilot campaign”.…

  • Alerts: CISA Adds Two Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/12/cisa-adds-two-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Two Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-24200 Apple iOS and iPadOS Incorrect Authorization Vulnerability CVE-2024-41710 Mitel SIP Phones Argument Injection Vulnerability These types of vulnerabilities are frequent attack vectors for…

  • Alerts: CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/12/cisa-and-fbi-warn-malicious-cyber-actors-using-buffer-overflow-vulnerabilities-compromise-software Source: Alerts Title: CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software Feedly Summary: CISA and the Federal Bureau of Investigation (FBI) have released a Secure by Design Alert, Eliminating Buffer Overflow Vulnerabilities, as part of their cooperative Secure by Design Alert series—an ongoing series aimed…

  • Hacker News: Delivering Malware Through Abandoned Amazon S3 Buckets

    Source URL: https://www.schneier.com/blog/archives/2025/02/delivering-malware-through-abandoned-amazon-s3-buckets.html Source: Hacker News Title: Delivering Malware Through Abandoned Amazon S3 Buckets Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a concerning vulnerability in software supply chain security, specifically targeting abandoned Amazon S3 buckets that could serve as a platform for malware delivery. The research highlights the potential risks…

  • The Register: Crimelords and spies for rogue states are working together, says Google

    Source URL: https://www.theregister.com/2025/02/12/google_state_cybercrime_report/ Source: The Register Title: Crimelords and spies for rogue states are working together, says Google Feedly Summary: Only lawmakers can stop them. Plus: software needs to be more secure, but what’s in it for us? Google says the the world’s lawmakers must take action against the increasing links between criminal and state-sponsored…

  • Schneier on Security: Delivering Malware Through Abandoned Amazon S3 Buckets

    Source URL: https://www.schneier.com/blog/archives/2025/02/delivering-malware-through-abandoned-amazon-s3-buckets.html Source: Schneier on Security Title: Delivering Malware Through Abandoned Amazon S3 Buckets Feedly Summary: Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize…