Tag: exploits

  • Hacker News: It is time to standardize principles and practices for software memory safety

    Source URL: https://cacm.acm.org/opinion/it-is-time-to-standardize-principles-and-practices-for-software-memory-safety/ Source: Hacker News Title: It is time to standardize principles and practices for software memory safety Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a comprehensive exploration of the endemic memory-safety vulnerabilities in software, their implications for security, and the necessity for memory-safety standardization to enhance software security…

  • The Register: Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims

    Source URL: https://www.theregister.com/2025/02/07/infected_apps_google_apple_stores/ Source: The Register Title: Apple missed screenshot-snooping malware in code that made it into the App Store, Kaspersky claims Feedly Summary: OCR plugin great for extracting crypto-wallet secrets from galleries Kaspersky eggheads say they’ve spotted the first app containing hidden optical character recognition spyware in Apple’s App Store. Cunningly, the software nasty…

  • Hacker News: Quick correlation of vulnerabilities from various sources

    Source URL: https://github.com/vulnerability-lookup/vulnerability-lookup Source: Hacker News Title: Quick correlation of vulnerabilities from various sources Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses Vulnerability-Lookup, a platform that enhances the management of vulnerabilities by facilitating quick correlation from various sources and supporting Coordinated Vulnerability Disclosure (CVD). Its collaborative features allow users to comment…

  • Slashdot: First OCR Spyware Breaches Both Apple and Google App Stores To Steal Crypto Wallet Phrases

    Source URL: https://it.slashdot.org/story/25/02/05/1826259/first-ocr-spyware-breaches-both-apple-and-google-app-stores-to-steal-crypto-wallet-phrases?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: First OCR Spyware Breaches Both Apple and Google App Stores To Steal Crypto Wallet Phrases Feedly Summary: AI Summary and Description: Yes **Summary:** Researchers from Kaspersky have identified new malware named “SparkCat” that exploits optical character recognition (OCR) technology to extract cryptocurrency wallet recovery phrases from users’ photo galleries…

  • Alerts: CISA Releases Nine Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2025/02/04/cisa-releases-nine-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Nine Industrial Control Systems Advisories Feedly Summary: CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-035-01 Western Telematic Inc NPS Series, DSM Series, CPM Series ICSA-25-035-02 Rockwell Automation 1756-L8zS3…

  • Unit 42: Stealers on the Rise: A Closer Look at a Growing macOS Threat

    Source URL: https://unit42.paloaltonetworks.com/?p=138244 Source: Unit 42 Title: Stealers on the Rise: A Closer Look at a Growing macOS Threat Feedly Summary: Atomic Stealer, Poseidon Stealer and Cthulhu Stealer target macOS. We discuss their various properties and examine leverage of the AppleScript framework. The post Stealers on the Rise: A Closer Look at a Growing macOS…

  • The Register: Google patches odd Android kernel security bug amid signs of targeted exploitation

    Source URL: https://www.theregister.com/2025/02/04/google_android_patch_netgear/ Source: The Register Title: Google patches odd Android kernel security bug amid signs of targeted exploitation Feedly Summary: Also, Netgear fixes critical router, access point vulnerabilities Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits.……

  • Hacker News: Sound & Efficient Generation of DOP Exploits via Programming Language Synthesis [pdf]

    Source URL: https://ilyasergey.net/assets/pdf/papers/doppler-usenix25.pdf Source: Hacker News Title: Sound & Efficient Generation of DOP Exploits via Programming Language Synthesis [pdf] Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a novel approach to generating data-oriented exploits through a technique called Programming Language Synthesis (PLS). This method improves the efficiency and soundness of exploit…