Tag: network resilience

  • Microsoft Security Blog: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/13/analyzing-cve-2024-44243-a-macos-system-integrity-protection-bypass-through-kernel-extensions/ Source: Microsoft Security Blog Title: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions Feedly Summary: Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent…

  • Hacker News: Recent BGP leak that redirected internet traffic through Russia

    Source URL: https://www.kentik.com/blog/beyond-their-intended-scope-uzing-into-russia/ Source: Hacker News Title: Recent BGP leak that redirected internet traffic through Russia Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses a recent BGP leak incident involving Uztelecom, a service provider in Uzbekistan, which redirected internet traffic through Russia and Central Asia. It emphasizes the importance of BGP…

  • Slashdot: Cloudflare Blocks Largest Recorded DDoS Attack Peaking At 3.8Tbps

    Source URL: https://tech.slashdot.org/story/24/10/03/2034235/cloudflare-blocks-largest-recorded-ddos-attack-peaking-at-38tbps Source: Slashdot Title: Cloudflare Blocks Largest Recorded DDoS Attack Peaking At 3.8Tbps Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant distributed denial-of-service (DDoS) attack campaign impacting financial services, telecommunications, and internet sectors, with a peak attack size of 3.8 terabits per second. This unprecedented volume highlights the…

  • Hacker News: Is Tor still safe to use?

    Source URL: https://blog.torproject.org/tor-is-still-safe/ Source: Hacker News Title: Is Tor still safe to use? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the de-anonymization of a Tor user that may have resulted from a targeted law enforcement attack on an outdated application, Ricochet. It underscores the importance of maintaining up-to-date software for…