Catalin Cimpanu's avatar
Catalin Cimpanu
campuscodi@mastodon-social.mostr.pub
npub1tqfu...aefw
Cybersecurity reporter for Risky Business #infosec #cybersecurity #security
Binarly has an analysis of the private key leaks that took place at Lenovo in September 2022 and MSI in April 2023. The report's main finding was that multiple companies were apparently using the same Intel Boot Guard private keys to sign different types of firmware images.
Ransomware is being deployed within one day of initial access in more than 50% of engagements. In just 12 months the median dwell time identified in the annual Secureworks State of the Threat Report has freefallen from 4.5 days to less than one day. In 10% of cases, ransomware was even deployed within five hours of initial access.
From cURL founder on the nazi-X-chan: "We are cutting the release cycle short and will release curl 8.4.0 on October 11, including a fix for a severity HIGH CVE."
Not gonna lie.... Substack is starting to piss me off. Why is there no more "View on web" link in its newsletters?
Broadcom's Symantec division has discovered a new Rust-based ransomware strain named 3AM. Symantec saw the ransomware used in one attack so far, where a known ransomware affiliate deployed it on a victim's network after Lockbit was detected and blocked. The 3AM ransomware comes with a Tor-based support and payment portal but does not appear to operate a dark web leak site (yet).
Newsletter: Podcast: -Microsoft to phase out 3rd-party printer drivers -Akira and Lockbit exploit Cisco ASA/FTD zero-day -FBI links Stake crypto-heist to North Korea -Ukrainian hacktivists unmask Russia's Cuban mercenary recruiting scheme -Ransomware hits Sri Lanka govt -Twitter bans scraping -15 Israeli opposition party members have a WhatsApp issue mysteriously at the same time -China's Myanmar fraud crackdown hits 1.2k -Chinese info-op on Gab image
BugProve researchers have identified 33 vulnerabilities in Zabio IP security cameras. Seven of the reported vulnerabilities are pre-authentication remote code execution flaws that can be used to hijack affected security camera models. The company has published details and proof-of-concept scripts for all issues after the vendor failed to respond for almost nine months.