Security

!security

@lemmy.ml
Create post
Novel attack against virtually all VPN apps neuters their entire purpose

Novel attack against virtually all VPN apps neuters their entire purpose

Open link in next tab

Novel attack against virtually all VPN apps neuters their entire purpose

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/

TunnelVision vulnerability has existed since 2002 and may already be known to attackers.

Novel attack against virtually all VPN apps neuters their entire purpose
How well can an employer be certain of a remote employee's geographical location?

How well can an employer be certain of a remote employee's geographical location?

cross-posted from: https://lemmy.ml/post/15178977

FWIW, this isn't to do with me personally at all, I'm not looking to do anything dodgy here, but this came up as a theoretical question about remote work and geographical security, and I realised I didn't know enough about this (as an infosec noob)

Presuming:

  • an employer provides the employee with their laptop
  • with security software installed that enables snooping and wiping etc and,
  • said employer does not want their employee to work remotely from within some undesirable geographical locations

How hard would it be for the employee to fool their employer and work from an undesirable location?

I personally figured that it's rather plausible. Use a personal VPN configured on a personal router and then manually switch off wifi, bluetooth and automatic time zone detection. I'd presume latency analysis could be used to some extent?? But also figure two VPNs, where the second one is that provided by/for the employer, would disrupt that enough depending on the geographies involved?

What else could be done on the laptop itself? Surreptitiously turn on wiki and scan? Can there be secret GPSs? Genuinely curious!

Stealing your Telegram account in 10 seconds flat

Stealing your Telegram account in 10 seconds flat

Open link in next tab

Stealing your Telegram account in 10 seconds flat

https://lyra.horse/blog/2024/05/stealing-your-telegram-account-in-10-seconds-flat/

Say you handed me your phone, what’s the worst I could do in 10 seconds?

Computer scientists unveil novel attacks on cybersecurity

Computer scientists unveil novel attacks on cybersecurity

Open link in next tab

Computer scientists unveil novel attacks on cybersecurity

https://www.sciencedaily.com/releases/2024/04/240426165229.htm

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use.

Computer scientists unveil novel attacks on cybersecurity
Passkeys: A Shattered Dream

Passkeys: A Shattered Dream

Open link in next tab

Firstyear's blog-a-log

https://fy.blackhats.net.au/blog/2024-04-26-passkeys-a-shattered-dream/

Firstyear's blog

After XZ Utils, More Open-Source Maintainers Under Attack

After XZ Utils, More Open-Source Maintainers Under Attack

Open link in next tab

After XZ Utils, More Open-Source Maintainers Under Attack

https://www.bankinfosecurity.com/after-xz-utils-more-open-source-maintainers-under-attack-a-24870

Major open-source software projects are warning that more pieces of code than XZ Utils may have been backdoored by attackers, based on ongoing supply-chain attack

After XZ Utils, More Open-Source Maintainers Under Attack
PuTTY priority high vulnerability CVE-2024-31497

PuTTY priority high vulnerability CVE-2024-31497

Open link in next tab

Simon Tatham (@simontatham@hachyderm.io)

https://hachyderm.io/@simontatham/112276855758487211

We've released #PuTTY version 0.81. This is a SECURITY UPDATE, fixing a #vulnerability in ECDSA signing for #SSH. If you've used a 521-bit ECDSA key (ecdsa-sha2-nistp521) with any previous version of PuTTY, consider it compromised! Generate a new key pair, and remove the old public key from authorized_keys files. Other key types are not affected, even other sizes of ECDSA. In particular, Ed25519 is fine. This vulnerability has id CVE-2024-31497. Full information is at https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html

New Technique Detected in an Open Source Supply Chain Attack

New Technique Detected in an Open Source Supply Chain Attack

Open link in next tab

New Technique Detected in an Open Source Supply Chain Attack

https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/

In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub's search functionality, and using meticulously crafted repositories to distribute malware.

New Technique Detected in an Open Source Supply Chain Attack
New Spectre v2 attack impacts Linux systems on Intel CPUs

New Spectre v2 attack impacts Linux systems on Intel CPUs

Open link in next tab

New Spectre v2 attack impacts Linux systems on Intel CPUs

https://www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/

Researchers have demonstrated the "first native Spectre v2 exploit" for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors.

New Spectre v2 attack impacts Linux systems on Intel CPUs