Security Leftovers
-
David Cantrell: Security Checks in rpminspect
Summary
Some changes have been made to how rpminspect honors settings in local configuration files. With rpminspect you can modify a local rpminspect configuration file to control how individual inspections run. The change is that any check that would produce a Security waiver authorization is now something that the local configuration file cannot override. In order to set rules to control how Security checks work, you need to modify the security product release file in the vendor data package.
-
Data stolen from CommScope in ransomware attack released on dark web
Data stolen from network infrastructure provider CommScope Holding Co. Inc. has been published on the dark web, the shady corner of the internet reachable through special software, following a successful ransomware attack. -
Using LLMs to Create Bioweapons
I'm not sure there are good ways to build guardrails to prevent this sort of thing:
[...] -
Citizen Lab finds three new iOS exploits used by NSO Group
Citizen Lab has identified three new zero-day or yet-unpatched iOS exploits that were used by NSO Group Ltd.’s Pegasus spyware to infect iPhones. Citizen Lab, a cybersecurity research center affiliated with the University of Toronto, published its findings today. -
Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains
Key Findings In 2022, the Citizen Lab gained extensive forensic visibility into new NSO Group exploit activity after finding infections among members of Mexico's civil society, including two human rights defenders from Centro PRODH, which represents victims of military abuses in Mexico.
-
NSO Group Used at Least 3 iOS Zero-Click Exploits in 2022: Citizen Lab
NSO Group used at least three iOS zero-click exploits in Pegasus attacks in 2022: FindMyPwn, PwnYourHome, and LatentImage.
-
New ‘Domino’ Malware Linked to FIN7 Group, Ex-Conti Members
New Domino backdoor brings together former members of the Conti group and the FIN7 threat actors.
-
Takedown of GitHub Repositories Disrupts RedLine Malware Operations
Four GitHub repositories used by RedLine stealer control panels were suspended, disrupting the malware’s operations.
-
CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog
CISA has added two vulnerabilities to its ‘must patch’ list, including a recently fixed Chrome flaw and a macOS flaw exploited by the DazzleSpy malware.
-
CISA Chief of Staff Kiersten Todt to step down [Ed: CISA just became little but a Microsoft proxy]
After nearly two years at the Cybersecurity and Infrastructure Security Agency, Todt will leave for a job in the private sector.
-
UDDIs are back: Attackers rediscovering old exploits., (Tue, Apr 18th)
-
Security updates for Wednesday [LWN.net]
Security updates have been issued by Debian (asterisk), Fedora (lldpd and openssh), Red Hat (curl, kernel, and openvswitch2.13), SUSE (compat-openssl098, glib2, grafana, helm, libgit2, openssl, and openssl-1_1), and Ubuntu (linux, linux-aws, linux-aws-5.15, linux-azure, linux-azure-5.15, linux-azure-fde, linux-gcp, linux-gcp-5.15, linux-gke, linux-gke-5.15, linux-gkeop, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-oracle, linux-oracle-5.15, linux-raspi, linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.19, linux-kvm, linux-lowlatency, linux-oracle, linux-raspi, and vim).
-
Virginia Passes Legislation Prohibiting the Use of Employees’ Social Security Numbers as Identifiers [Ed: Due to data breaches]
On March 21, 2023, Virginia’s governor approved Senate Bill 1040, which prohibits an employer from using an employee’s social security number or any derivative as an employee’s identification number. The bill also prohibits including an employee’s social security number or any number derived from the social security number on any identification card or badge.
An employer who knowingly violates the new law may be subject to a civil penalty not to exceed $100 for each violation. However, the employer shall be provided notice of the violation by the state Commissioner and the employer can request an informal conference regarding the violation.