Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

DEF CON 31 - Josep Rodriguez’ ‘Contactless Overflow Code Execution In Payment Terminals & ATMs’ →

December 04, 2023 by Marc Handelman in DEF Con 31, Security Conferences, Information Security, Cybersecurity, Cybersecurity Education, Infosecurity Education, Security Architecture, Vulnerabilities

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel.

December 04, 2023 /Marc Handelman
DEF Con 31, Security Conferences, Information Security, Cybersecurity, Cybersecurity Education, Infosecurity Education, Security Architecture, Vulnerabilities

DEF CON 31 Policy - Panel: All Your Vulns Are Belong To Terms And Conditions →

November 01, 2023 by Marc Handelman in DEF Con 31, Security Conferences, Information Security, Cybersecurity, Cybersecurity Education, Infosecurity Education, Security Architecture, OSINT, Threat Hunting, Vulnerabilities

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel.

November 01, 2023 /Marc Handelman
DEF Con 31, Security Conferences, Information Security, Cybersecurity, Cybersecurity Education, Infosecurity Education, Security Architecture, OSINT, Threat Hunting, Vulnerabilities

Fujiwhara Effect: A Tale Of

April 13, 2020 by Marc Handelman in Fujiwhara Effect, Vulnerability Research, Vulnerabilities, Information Security, Must Read

The next Fujiwhara Effect is 'slated' for April 14 2020 (tomorrow). In this scenario, the Effect is not related to cyclonic vortices adjacent to each other, but rather, the close proximaty in time, of multiple vendor announcements with multiple (per vendor) vulnerabilities to computational, internetworking and other activities. Mind you - be certain to don those nor'easter rain bonnets before crying for relief from the non-stop onslaught of vulnerability fixes on the 'nigh! Todays' Must Read.

April 13, 2020 /Marc Handelman
Fujiwhara Effect, Vulnerability Research, Vulnerabilities, Information Security, Must Read

Google Confirms' Backdoor Is In Motion...

June 07, 2019 by Marc Handelman in Evil Appears Before Us, Vulnerable Systems, Vulnerabilities, Information Security

via Dan Goodin, reporting at Ars Technica, and focusing on recently discovered Android device backdoors. Apparently, said backdoors were installed at currently unidentified manufacturer's factories prior to sale (confirmed by Google Security Engineers). Bad news for Android users... Currently, Google, Inc. (Nasdaq: GOOG) remediation plans are unclear.

June 07, 2019 /Marc Handelman
Evil Appears Before Us, Vulnerable Systems, Vulnerabilities, Information Security

Image Courtesy of Yowp

Exit, Stage Left...

May 31, 2019 by Marc Handelman in TOR, The Onion Router, Vulnerabilities

via Pierluigi Paganini, comes news of TOR leveraged scans searching for BlueKeep vulns, as those observed scans are conveyed and exiting via TOR exit nodes.

May 31, 2019 /Marc Handelman
TOR, The Onion Router, Vulnerabilities

US District Court Judge To State of Georgia: Bad, Bad, Double-Bad

September 18, 2018 by Marc Handelman in Vulnerable Systems, Vulnerabilities, Malware, Malware Detection, Elections, Election Security, Election Manipulation, Election Fraud, Electioneering

via Cyrus Farivar, writing at Ars Technica, of the apparent displeasure noted by United States District Court Judge Amy Totenberg, whilst Her Honor viewed the shenanigans being perpertrated by the State of Georgia's voting commision. Suprised? Don't be.. The centuries lomg tradition of election manipulations is coming to the fore, as the aft begins sinking under it's own weight of corruption, down south, that is. That said, the North, West and East aren't exactly doing that much better. Read Cyrus's superb reportage and weep for free, unfettered elections.

September 18, 2018 /Marc Handelman
Vulnerable Systems, Vulnerabilities, Malware, Malware Detection, Elections, Election Security, Election Manipulation, Election Fraud, Electioneering

Comcast Hole Of Doom: The Plugging

August 14, 2018 by Marc Handelman in Vulnerabilities, Vulnerability Research, Information Security

News via Jeff Baumgartner, writing at Light Reading, of the apparent remediation of a deep (and wide) hole in Comcast systems; certainly today's MustRead!

"One of the vulnerabilities uncovered by security researcher Ryan Stevenson centered on an in-home authentication portal that lets customers pay bills without signing in with their credentials." via Jeff Baumgartner, writing at Light Reading

August 14, 2018 /Marc Handelman
Vulnerabilities, Vulnerability Research, Information Security

CircleCity Con 5.0 2018, Derek Milroy's 'Enterprise Vulnerability Management (Assessing, Implementing, and Maintaining)' →

July 11, 2018 by Marc Handelman in Conferences, Education, Information Security, Vulnerabilities, Circle City Con
July 11, 2018 /Marc Handelman
Conferences, Education, Information Security, Vulnerabilities, Circle City Con

Alert the Media! We're Going Public With The Lockout Bypass Flaw!

The Standoff, Google's Project Zero & Microsoft's Unpatched Windows 10 Bypass →

April 22, 2018 by Marc Handelman in Vulnerabilities, Information Security

Liam Tung, writing at ZDNet, regales us with a brief soliloquy on Microsoft Corporation's ((NASDAQ: MSFT) unpatched Windows 10 Lockdown Bypass flaw, and news of Google's (NASDAQ:GOOG) Project Zero denial of an extension-to-fix (addressed-ever-so-nicely to Microsoft's powers-that-be) of said unpatched pernicious flaw. Microsoft required an additional 90 days to fix the issue... Must be quite busy in Redomond with the re-org and demotion (and disruption) of the Windows product line, into - fundamentally - a non-business line (should have been executed years ago).

April 22, 2018 /Marc Handelman
Vulnerabilities, Information Security

via the comic superiority of Robert M. Lee and the superb illustration work of Jeff Haas at Little Bobby Comics

Robert M. Lee & Jeff Haas's 'Little Bobby - Preparatory Action' →

April 08, 2018 by Marc Handelman in Little Bobby Comics, Information Security, Vulnerability Research, Vulnerabilities, Reconnaissance, Security Humor
April 08, 2018 /Marc Handelman
Little Bobby Comics, Information Security, Vulnerability Research, Vulnerabilities, Reconnaissance, Security Humor

Illustration from the Kaspersky Labs Document.

Six Years The Lurker →

March 12, 2018 by Marc Handelman in Vulnerable Systems, Vulnerability Research, Vulnerabilities, Attack Analysis, APT

Dan Goodin, writing at ArsTechnica, provides us with the surreptitious history of the malice-filled code-miscreant APT monikered Slingshot; of which, is apparently an alternatative mwthod of describing the devil's offspring in code-complete form. More, here.

"The researchers still don't know precisely how Slingshot initially infected all its targets. In several cases, however, Slingshot operators got access to routers made by Latvian manufacturer MikroTik and planted a malicious code in it." - via Dan Goodin, slaving away over a sizziling keyboard at ArsTechica

March 12, 2018 /Marc Handelman
Vulnerable Systems, Vulnerability Research, Vulnerabilities, Attack Analysis, APT

Another Flawed Bit of Intel Corp Nonsense, The Active Management Technology Vector →

January 17, 2018 by Marc Handelman in Bombast, Blatant Incompetence, Vulnerabilities, Vulnerability Research, Vulnerable Systems, Information Security, Hardware Security, Hardware Flaws

Reportedly, Harry Sintonen, empolyed at F-Secure as a security researcher, discovered during the course of his labors - a flaw in Intel's Active Management Technology (AMT) firmware. Ooops.

As is typical of Intel Corporation (Nasdaq: INTC) the firm is attempting to shirk responsability for this attack and transfer the blame onto the company's vendors, not to mention the glad-handing exhibited by the company's CEO at CES.

It's time to rein in Intel Corporation's significantly flawed software development practice (as evidenced by the output), as the ramifications for the company's vulnerability touch many - if not all - systems worldwide. Further, what else is flawed in the company's other products (for example, automotive chips, medical device systems where the firm's hardware and software reside)?

'But the latest vulnerability—discovered in July of 2017 by F-Secure security consultant Harry Sintonen and revealed by the company today in a blog post—is more of a feature than a bug. Notebook and desktop PCs with Intel AMT can be compromised in moments by someone with physical access to the computer—even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords—by rebooting the computer, entering its BIOS boot menu, and selecting configuration for Intel’s Management Engine BIOS Extension (MEBx).' - via Sean Gallagher - writing at Ars Technica

January 17, 2018 /Marc Handelman
Bombast, Blatant Incompetence, Vulnerabilities, Vulnerability Research, Vulnerable Systems, Information Security, Hardware Security, Hardware Flaws

Smart Speaker Flaws, The Pranking

December 29, 2017 by Marc Handelman in Information Security, Vulnerability Research, Vulnerabilities, Hubris

Via Catalin Cimpanu, writing at Bleeping Computer, comes one of today's most interesting - yet innocuous (thus far) - flaws, targeting the speaker products of both Sonos and Bose Corporation. Apparently, the flaws are of the remote exploit variety, of which, permits remote attackers to execute sounds upon command. The possibilites, therefore, are significant (considering the Children of the Script out there...). So far, the reports have noted pranking connected to the flaw.

December 29, 2017 /Marc Handelman
Information Security, Vulnerability Research, Vulnerabilities, Hubris

Converge 2017, Amol Sarwate's 'Prioritize Vulnerability Remediation' →

June 07, 2017 by Marc Handelman in Conferences, Education, Information Security, Vulnerabilities
June 07, 2017 /Marc Handelman
Conferences, Education, Information Security, Vulnerabilities

Webroot, The Latest SNAFU →

April 25, 2017 by Marc Handelman in All is Information, Security Failure, Information Security, Governance, Security Governance, Security Heal Thyself, Security Testing, Vulnerabilities, Vulnerability Research

Iain Thomson, writng at El Reg, reports on Webroot's latest SNAFU. I'll leave it to his illustrative prose to tell the tale.

April 25, 2017 /Marc Handelman
All is Information, Security Failure, Information Security, Governance, Security Governance, Security Heal Thyself, Security Testing, Vulnerabilities, Vulnerability Research

A Secret World, Detailed →

March 09, 2017 by Marc Handelman in Secrets, Vulnerabilities, Vulnerability Research, Information Security, Must Read

Today MustRead details the secretive environment many vulnerability researchers and operatives live and labor within. Enjoy.

March 09, 2017 /Marc Handelman
Secrets, Vulnerabilities, Vulnerability Research, Information Security, Must Read

911 Systems At Risk →

September 13, 2016 by Marc Handelman in All is Information, Vulnerabilities, Emergency Management, Systemic Fragility

Well crafted reportage by David Bisson, writing at Graham Cluley's GCHQ blog, detailing a new paper published by Israel's Ben-Gurion University of the Negev's Cyber-Security Research Centers' Mordechai Guri, Yisroel Mirsky, and Yuval Elovici. The fragility of these systems are, for a reasonable person, simply astounding; especially considering the significant capabilities to deploy hardened communications infrastructures in this epoch. As always, you be the judge.

 

September 13, 2016 /Marc Handelman
All is Information, Vulnerabilities, Emergency Management, Systemic Fragility

iOS Tracking, The Control Gambit →

July 25, 2016 by Marc Handelman in All is Information, Information Security, Intelligence, Vulnerabilities, User Tracking

via Kate Kochetkova writing on the Kaspersky blog, comes advice on mitigating iOS tracking. Well played Ms. Kochetkova, Well Played.

 

July 25, 2016 /Marc Handelman
All is Information, Information Security, Intelligence, Vulnerabilities, User Tracking

Seven Xen Itch

November 02, 2015 by Marc Handelman in All is Information, Information Security, Vulnerabilities, Virtualization, Cruft

News, via Dan Goodin, writing at Ars Technica, details a seven year old, pernicious bug in Xen virtualiztion wares. In which, users can exploit the bug to breakout of their local machines, thence into the underlying hypervisor layer. FYI - One high profile customer of the Xen Hypervisor is Amazon Web Services. Time to Patch, eh?

"Admittedly this is subtle bug, because there is no buggy code that could be spotted immediately. The bug emerges only if one looks at a bigger picture of logic flows (compare also QSB #09 for a somehow similar situation). On the other hand, it is really shocking that such a bug has been lurking in the core of the hypervisor for so many years. In our opinion the Xen project should rethink their coding guidelines and try to come up with practices and perhaps additional mechanisms that would not let similar flaws to plague the hypervisor ever again (assert-like mechanisms perhaps?). Otherwise the whole project makes no sense, at least to those who would like to use Xen for security-sensitive work." - via Dan Goodin, writing at Ars Technica.

November 02, 2015 /Marc Handelman
All is Information, Information Security, Vulnerabilities, Virtualization, Cruft

Herzog, The Truth About Vulnerability Scanners →

October 29, 2015 by Marc Handelman in All is Information, Information Security, Vulnerabilities

Superlative post, well-crafted by the eponymous Pete Herzog (writing at Norses' [Darkmatters), elucidating the truth of vulnerability scanners. Today's Must Read.

October 29, 2015 /Marc Handelman
All is Information, Information Security, Vulnerabilities
  • Newer
  • Older