Security Leftovers
-
Bypassing a Theft Threat Model
Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.
I wrote about this kind of thing in 2000, in Secrets and Lies (page 318): [...]
-
New Python credential harvester and hacking tool being sold on Telegram [Ed: What does that have to do with Python? Imagine if any malicious program written in C was described in media headline as a "C threat"... this is FUD]
Researchers at cloud forensics and incident response platform startup Cado Security Ltd. today announced details of a recently discovered Python-based credential harvester and hacking tool. -
Critical Vulnerability in Hikvision Storage Solutions Exposes Video Security Data
Hikvision patches CVE-2023-28808, a critical authentication bypass vulnerability that exposes video data stored on its Hybrid SAN and cluster storage products.
-
Linux kernel logic allowed Spectre attack on major cloud • The Register [iophk: "spinning hardware design failure as kernel problems"]