What time is it? Accuracy of pool.ntp.org., (Tue, Oct 21st)
Yesterday, Chinese security services published a story alleging a multi-year attack against the...
Read MoreYesterday, Chinese security services published a story alleging a multi-year attack against the...
Read MoreThe info is spreading across the news websites: For approximatively two hours, many online services or websites are suffering of an Amazon Web Services outage. Some affected services: Signal Slack Zoom These may affect...
Read MoreI found another piece of malware this weekend. This one looks more like a proof-of-concept because...
Read MoreOverview A vulnerability in cross-origin resource sharing (CORS) headers in Chromium, Google Chrome, Microsoft Edge, Safari, and Firefox enables the CORS policy to be manipulated. Combined with a DNS rebind, an attacker can send...
Read MoreOverview Browser-extension password managers, which autofill sensitive information on websites, can be exposed to various clickjacking attacks. These attacks exploit the trust relationship between a web page and the...
Read MoreAttackers are everywhere! They try to abuse victims using new communication channels and social...
Read MoreThis week, we set up a new Slack workspace for DShield.org. This workspace replaces the old workspace we originally configured back in 2016 or 2017. The workspace was originally configured as a free workspace to support the...
Read MoreFor a while, clipboard content has been monitored by many infostealers. Purposes can be multiple,...
Read MoreI am experimenting today with a little bit of a cleaned-up patch overview. I removed vulnerabilities that affect Microsoft’s cloud systems (but appreciate Microsoft listing them at all), as well as vulnerabilities in...
Read MoreIn January, a possible XSS vulnerability was found in the electronic document security management system ESAFENET CDG. This was the latest (as far as I can tell) in a long list of vulnerabilities in the product. Prior...
Read MoreOverview Clevo’s UEFI firmware update packages included sensitive private keys used in their Intel Boot Guard implementation. This accidental exposure of the keys could be abused by an attacker to sign malicious firmware using...
Read MoreWireshark release 4.4.10 fixes 6 bugs and 1 vulnerability (in the MONGO dissector). A new branch with many new features is released too: 4.6.0 Didier Stevens Senior handler blog.DidierStevens.com (c) SANS Internet Storm Center....
Read More