Security Leftovers
-
Security Week ☛ Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
Amnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist.
-
OpenSSF (Linux Foundation) ☛ FOSDEM 2025: OpenSSF Community Wrap Up [Ed: Mostly for fake security run by GAFAM. If GAFAM wanted security, there would not be so many back doors in things.]
The Free and Open source Software Developers’ European Meeting (FOSDEM) is a non-commercial, volunteer-organized European event centered on free and open source software development. It is aimed at developers and anyone interested in the open source software movement.
-
Scoop News Group ☛ SolarWinds CISO says security execs are ‘nervous’ about individual liability for data breaches
Tim Brown didn’t call for indemnification laws, but suggested that CISOs dealing with legal implications for cyberattacks is stressful and a distraction from their core work.
-
Security Week ☛ Ransomware Group Takes Credit for Lee Enterprises Attack
The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions.
-
Security Week ☛ In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story
Noteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack.
-
Trail of Bits ☛ Threat modeling the TRAIL of Bits way
Over time, multiple application security experts have refined TRAIL to provide maximal value for our clients and to minimize the effort required to update the threat model as the system changes.
-
NVISO Labs ☛ Attack and Defense in OT: Enhancing Cyber Resilience in Industrial Systems with Red Team Operations
In today’s rapidly evolving industrial landscape, securing Operational Technology (OT) is more critical than ever due to increased connectivity and sophisticated cyber threats.
-
New Backdoor Auto-color Linux Targets Systems in US and Asia
A newly discovered Linux malware, dubbed Auto-color, is targeting educational institutions and government entities in North America and Asia, employing advanced stealth techniques to avoid detection and removal.