36 links
tagged with security
Click any tag below to further narrow down your results
Links
A security researcher discovered that a database containing sensitive personal information of over 450 individuals with "top secret" US government security clearances was exposed online by the House Democrats' DomeWatch website. The data included names, contact information, and details related to job applications, raising concerns about potential espionage risks if accessed by malicious actors. Following the discovery, the database was secured within hours, and an investigation has been launched to address security vulnerabilities.
Microsoft has announced that the File Explorer Preview pane in Windows 11 25H2 and 24H2 will not function for files downloaded from the internet due to security concerns, specifically to prevent NTLM credential leaks. Users can still preview locally created files, but to view internet-downloaded files, they must manually unblock them in the file properties. This change also applies to Windows 10 with its latest update.
The article discusses the security of browser password managers, particularly Google's Chrome and Apple's Safari, highlighting that while they have improved significantly and are better than not using a password manager, they still pose risks due to operational security concerns. It emphasizes the need for users to be cautious about relying solely on browser-based solutions and suggests that dedicated password managers may still offer superior security.
The article discusses the security vulnerabilities in the Rust programming language associated with a situation dubbed "TARmageddon." It provides insights for developers on how these issues compromise Rust's security measures and what can be done to mitigate these risks.
Omnia OS is an innovative email management solution designed to help users eliminate inbox clutter by allowing them to quarantine unknown senders, manage organization-specific threads, and clean up emails in bulk. With a focus on security, it keeps data local and isolates suspicious domains, ensuring that users can take back control of their inboxes. Currently available for free on macOS, it supports Gmail accounts while prioritizing user privacy.
The article discusses three key indicators of email scams based on the author's personal experiences. It highlights the importance of scrutinizing sender identities, spotting contradictions in the content, and checking for suspicious links. The author emphasizes the need for vigilance to avoid falling victim to these scams.
The article discusses the security risks associated with AI browser agents like OpenAI's ChatGPT Atlas and Perplexity's Comet, which offer advanced web browsing capabilities but pose significant privacy threats. Cybersecurity experts warn of vulnerabilities, particularly prompt injection attacks, which can compromise user data and actions. While companies are developing safeguards, the risks remain substantial as these technologies gain popularity.
The article discusses the implementation of Anubis, a security measure designed to protect websites from aggressive web scraping by AI companies. It introduces a Proof-of-Work scheme to deter bots while acknowledging that it requires modern JavaScript, thus limiting access for users with certain plugins. The solution aims to eventually improve bot detection without inconveniencing legitimate users.
The article discusses the evolution of Cloudflare Radar since its launch in 2020, emphasizing its role in enhancing Internet observability by providing insights into security, performance, and usage trends. It highlights key developments, including the introduction of new data sets related to Certificate Transparency, connection tampering detection, and post-quantum encryption, while maintaining user-friendly access through improved information architecture and APIs.
The article features a discussion between Filippo Valsorda and Neil Madden regarding the design of the age encryption tool, focusing on the differences in their views on authenticated encryption and security guarantees. Valsorda emphasizes age's purpose as a confidentiality tool without sender authentication, while Madden provides a detailed response addressing various points raised about the design and implementation of age.
The article introduces MCP-Scan, a security scanning tool designed to identify and log vulnerabilities in MCP connections. It features capabilities such as static and dynamic scanning for attacks like prompt injections and tool poisoning, as well as real-time monitoring and guardrail enforcement for enhanced security. The tool supports various MCP configurations and offers customization for auditing and logging traffic.
Pleo is currently facing a phishing attempt where fraudulent SMS messages are impersonating the company, warning recipients about declined transactions or login issues. Users are advised not to share their passcodes or call any numbers provided in these messages, and to report any suspicious activity to Pleo's support team. The company has implemented measures to enhance security, including changing the sender name for SMS messages in Denmark.
Centia.io offers a secure SQL API that allows users to query data over HTTP or WebSocket with support for JSON-RPC methods. It features built-in security measures such as OAuth2, row-level security, and rate limiting, making it a developer-friendly solution backed by Postgres. The platform provides intuitive SDKs and a friendly CLI for data management.
The article expresses caution regarding the use of the Obsidian app, highlighting concerns about its closed-source nature, the lack of distribution via the Mac App Store, and potential risks associated with community plugins. While the author appreciates the app's philosophy and potential, they emphasize the importance of being aware of the security implications involved in using it, especially when accessing sensitive data.
The article presents Katakate's k7, a self-hosted infrastructure designed for creating lightweight virtual machine (VM) sandboxes to safely execute untrusted code. It supports a command-line interface, API, and Python SDK, leveraging technologies like Kubernetes, Kata, and Firecracker for efficient VM management. Currently in beta, it offers features for serverless applications, CI/CD runners, and blockchain execution, while being open-source under the Apache-2.0 license.
The article discusses the inadequacy of many error messages in software design, arguing that poor messages often arise from design trade-offs rather than incompetence. It highlights the importance of providing informative and actionable messages while also addressing security concerns that lead to vague errors, using examples like login errors and encryption-related issues.
The article discusses the security vulnerabilities of local large language models (LLMs), particularly gpt-oss-20b, which are more easily tricked by attackers compared to larger frontier models. It details two types of attacks: one that plants hidden backdoors disguised as harmless features, and another that executes malicious code during the coding process by exploiting cognitive overload. The research highlights the significant risks of using local LLMs in coding environments.
The article explores Linux capabilities as a fine-grained access control mechanism that allows for more secure privilege management by dividing the traditional superuser privileges into distinct units. It demonstrates how these capabilities can be manipulated to create potential security vulnerabilities, particularly in the context of privilege escalation and backdooring. Additionally, it provides commands for viewing and managing capabilities on Linux systems.
The article discusses the discovery of cryptographic vulnerabilities in Cloudflare's CIRCL library, specifically regarding its FourQ elliptic curve implementation. These issues, related to insufficient validation of points during elliptic curve computations, could potentially allow attackers to exploit the system and derive secret keys. The vulnerabilities were reported and subsequently addressed by Cloudflare.
A user raised an issue on the MinIO GitHub repository asking about the absence of a new Docker image for a recent security release. They inquired whether this was expected and requested that a new release be pushed for Docker installation methods.
The article presents slides from a presentation discussing memory tagging, a technique aimed at improving memory safety and security in software applications. It outlines the potential benefits of memory tagging as well as its implementation challenges, particularly in the context of LLVM, a popular compiler infrastructure. The audience is likely composed of developers and researchers interested in advanced memory management techniques.
Users of hardware security keys for two-factor authentication (2FA) on the platform X must re-enroll their keys by November 10 to avoid account lockout. This requirement is part of X's transition from the Twitter.com domain to x.com and does not affect other 2FA methods like authenticator apps. Cybersecurity experts continue to recommend the use of 2FA for enhanced account protection.
The article discusses a significant failure in Google's internal password manager triggered by a high traffic spike from a WiFi password change announcement. It highlights the challenges in balancing reliability and security in system design, illustrating how the interplay between these two aspects can lead to unexpected outcomes, as evidenced by the engineers' struggle to restore service due to security protocols and miscommunications.
The article discusses a recent talk by Simon Willison at a Claude Code Anonymous meetup, where he explores the benefits and risks of using coding agents, particularly through the "YOLO mode" that allows for greater freedom in executing tasks. While this mode offers significant advantages in productivity, it also poses risks such as prompt injection vulnerabilities that can compromise security. Willison shares examples of projects he completed using this mode while highlighting the need for caution.
The article discusses a security vulnerability in Microsoft 365 Copilot, where an indirect prompt injection allowed the execution of arbitrary instructions to extract sensitive tenant data. By leveraging Mermaid diagrams, attackers could create deceptive elements that transmitted this data to their server when clicked by users.
The article discusses how Cloudflare's client-side security, particularly its Page Shield feature, effectively mitigated the risks posed by a recent npm supply chain attack where malicious code was injected into popular JavaScript packages. The advanced machine learning algorithms employed by Cloudflare allowed for rapid detection and prevention of potential crypto theft, ensuring the safety of users' applications against such vulnerabilities.
The article discusses a new paper on monitoring tamper-sensing meshes using low-cost time-domain reflectometry (TDR) with inexpensive components. This innovative approach enables precise monitoring of security meshes, which are used to protect high-security devices, achieving high resolution while remaining cost-effective. The author shares insights into the circuit design and performance, highlighting the effectiveness of the method against physical attacks.
The FreeBSD Foundation has successfully implemented a no-root infrastructure for building FreeBSD, eliminating the need for root privileges in the build process. This enhancement improves security, enables reproducible builds, and allows contributors to create FreeBSD release artifacts safely and easily on local systems.
The FreeBSD project has achieved a significant milestone by implementing reproducible builds and eliminating the need for root privileges during the build process, enhancing security and simplifying automated builds. These improvements are part of the upcoming FreeBSD 15.0 release and were commissioned by the Sovereign Tech Agency. The changes make it possible to build all FreeBSD release artifacts without requiring root access, addressing common issues associated with reproducibility in software development.
The article discusses a significant security flaw discovered in a Next.js application due to a seemingly perfect function that always returned true. This issue arose from the asynchronous behavior of server functions in React, which inadvertently turned a synchronous check into a promise evaluation, allowing unauthorized access. The author emphasizes the importance of understanding framework behavior to avoid such pitfalls in software development.
The article presents the MCP Scanner, a Python tool developed by Cisco AI Defense for scanning Model Context Protocol (MCP) servers to identify security vulnerabilities. It features multiple scanning engines, customizable YARA rules, and flexible authentication options, making it a powerful solution for comprehensive security analysis. The tool can be run as a CLI or REST API and supports OAuth for authentication.
The article discusses a critical Remote Code Execution (RCE) vulnerability, named TARmageddon (CVE-2025-62518), found in the async-tar Rust library and its forks, including the abandoned tokio-tar. This vulnerability can lead to severe attacks due to its wide usage in popular projects, highlighting the challenges of maintaining open-source software and coordinating timely disclosures and patches across multiple forks. The Edera team recommends migrating to actively maintained forks to mitigate risks associated with the abandoned dependencies.
The article discusses a recent experience of flying with British Airways, where the author discovered a way to access free WiFi for messaging by signing up for their frequent flyer program mid-flight. It explores the technical aspects of how the airline restricts internet access based on the SNI (Server Name Indication) during TLS handshakes, allowing only certain messaging apps while blocking others, and includes a detailed analysis of the WiFi setup and testing methods used to investigate the restrictions.
The article discusses a comprehensive study revealing that a significant amount of sensitive data is being transmitted unencrypted via geostationary satellites. This includes internal corporate communications, military data, and personal information, all of which can be intercepted using consumer-grade hardware. The study emphasizes the need for encryption in satellite communications to protect against vulnerabilities.
The article discusses the setHTML() method of the Element interface, which provides a secure way to parse and sanitize HTML strings before inserting them into the DOM. It emphasizes the method's capability to remove XSS-unsafe elements and attributes, making it a safer alternative to Element.innerHTML for handling user-provided HTML. The article also includes syntax, parameters, and examples for using the method effectively.
The article discusses concerns raised in the oss-sec mailing list regarding new CVE entries for dnsmasq, which require replacing the default configuration file to exploit. Moritz Mühlenhoff highlights that such vulnerabilities are questionable, as direct configuration changes would negate the need for exploiting the parser. The same issue is noted with vulnerabilities reported for the Kamailio SIP server.