Tag: handshake
-
Cloud Blog: Windows Remote Desktop Protocol: Remote to Rogue
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/windows-rogue-remote-desktop-protocol/ Source: Cloud Blog Title: Windows Remote Desktop Protocol: Remote to Rogue Feedly Summary: Written by: Rohit Nambiar Executive Summary In October 2024, Google Threat Intelligence Group (GTIG) observed a novel phishing campaign targeting European government and military organizations that was attributed to a suspected Russia-nexus espionage actor we track as UNC5837. The…
-
Hacker News: Certificate Transparency in Firefox: A Big Step for Web Security
Source URL: https://blog.transparency.dev/ct-in-firefox Source: Hacker News Title: Certificate Transparency in Firefox: A Big Step for Web Security Feedly Summary: Comments AI Summary and Description: Yes Summary: The implementation of Certificate Transparency (CT) enforcement in Firefox marks a significant advancement in web security, enhancing protection against certificate fraud and man-in-the-middle attacks. This change demands compliance from…
-
Bulletins: Vulnerability Summary for the Week of February 17, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-055 Source: Bulletins Title: Vulnerability Summary for the Week of February 17, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info a1post–A1POST.BG Shipping for Woo Cross-Site Request Forgery (CSRF) vulnerability in a1post A1POST.BG Shipping for Woo allows Privilege Escalation. This issue affects A1POST.BG Shipping for Woo: from n/a…
-
The Cloudflare Blog: QUIC action: patching a broadcast address amplification vulnerability
Source URL: https://blog.cloudflare.com/mitigating-broadcast-address-attack/ Source: The Cloudflare Blog Title: QUIC action: patching a broadcast address amplification vulnerability Feedly Summary: Cloudflare was recently contacted by researchers who discovered a broadcast amplification vulnerability through their QUIC Internet measurement research. We’ve implemented a mitigation. AI Summary and Description: Yes **Summary:** This text discusses a recently discovered vulnerability in Cloudflare’s…
-
The Cloudflare Blog: Resolving a Mutual TLS session resumption vulnerability
Source URL: https://blog.cloudflare.com/resolving-a-mutual-tls-session-resumption-vulnerability/ Source: The Cloudflare Blog Title: Resolving a Mutual TLS session resumption vulnerability Feedly Summary: Cloudflare patched a Mutual TLS (mTLS) vulnerability (CVE-2025-23419) reported via its Bug Bounty Program. The flaw in session resumption allowed client certificates to authenticate across different AI Summary and Description: Yes Summary: The text discusses a recently discovered…
-
Bulletins: Vulnerability Summary for the Week of January 27, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-034 Source: Bulletins Title: Vulnerability Summary for the Week of January 27, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 0xPolygonZero–plonky2 Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length is not divisible by 26 = floor(num_routed_wires / 3) always…
-
Bulletins: Vulnerability Summary for the Week of January 20, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-026 Source: Bulletins Title: Vulnerability Summary for the Week of January 20, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info aEnrich Technology–a+HRD The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database…
-
Bulletins: Vulnerability Summary for the Week of December 2, 2024
Source URL: https://www.cisa.gov/news-events/bulletins/sb24-344 Source: Bulletins Title: Vulnerability Summary for the Week of December 2, 2024 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description8 Published CVSS Score Source Info SailPoint Technologies–IdentityIQ IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2…
-
Hacker News: Breaking NATO Radio Encryption [video]
Source URL: https://media.ccc.de/v/38c3-breaking-nato-radio-encryption Source: Hacker News Title: Breaking NATO Radio Encryption Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses significant vulnerabilities in the HALFLOOP-24 encryption algorithm utilized by the US military and NATO for high-frequency radio communication. It reveals that the encryption can be compromised within two hours of intercepted traffic…
-
Hacker News: Reclaim Your Data: Freeing a Wi-Fi Sensor from the Cloud
Source URL: https://embeddedartistry.com/blog/2024/11/04/reclaim-your-data-freeing-a-wi-fi-sensor-from-the-cloud/ Source: Hacker News Title: Reclaim Your Data: Freeing a Wi-Fi Sensor from the Cloud Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the security implications of a Wi-Fi connected radon sensor’s communication with the cloud, detailing methods to minimize reliance on third-party servers. It highlights the importance of…