Tag: hijacking

  • The Register: HybridPetya: More proof that Secure Boot bypasses are not just an urban legend

    Source URL: https://www.theregister.com/2025/09/12/hopefully_just_a_poc_hybridpetya/ Source: The Register Title: HybridPetya: More proof that Secure Boot bypasses are not just an urban legend Feedly Summary: Although it hasn’t been seen in the wild yet A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot on unrevoked…

  • Embrace The Red: Wrap Up: The Month of AI Bugs

    Source URL: https://embracethered.com/blog/posts/2025/wrapping-up-month-of-ai-bugs/ Source: Embrace The Red Title: Wrap Up: The Month of AI Bugs Feedly Summary: That’s it. The Month of AI Bugs is done. There won’t be a post tomorrow, because I will be at PAX West. Overview of Posts ChatGPT: Exfiltrating Your Chat History and Memories With Prompt Injection | Video ChatGPT…

  • Embrace The Red: Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets

    Source URL: https://embracethered.com/blog/posts/2025/windsurf-data-exfiltration-vulnerabilities/ Source: Embrace The Red Title: Hijacking Windsurf: How Prompt Injection Leaks Developer Secrets Feedly Summary: This is the first post in a series exploring security vulnerabilities in Windsurf. If you are unfamiliar with Windsurf, it is a fork of VS Code and the coding agent is called Windsurf Cascade. The attack vectors…

  • CSA: Homoglyph Attacks & Domain Squatting

    Source URL: https://cloudsecurityalliance.org/articles/homoglyph-attacks-domain-squatting-the-hidden-risk-to-your-brand Source: CSA Title: Homoglyph Attacks & Domain Squatting Feedly Summary: AI Summary and Description: Yes Summary: The text highlights the escalating threat posed by homoglyph-based domain squatting, emphasizing its potential impact on brand trust and cloud security. It underscores the need for proactive DNS posture management to detect and mitigate these risks,…

  • The Register: Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit

    Source URL: https://www.theregister.com/2025/07/16/sonicwall_vpn_hijack/ Source: The Register Title: Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit Feedly Summary: Someone’s OVERSTEPing the mark Unknown miscreants are exploiting fully patched, end-of-life SonicWall VPNs to deploy a previously unknown backdoor and rootkit, likely for data theft and extortion, according to Google’s Threat Intelligence Group.… AI…