Tag: attack scenarios

  • Cloud Blog: Introducing Google Cloud’s new Vulnerability Reward Program

    Source URL: https://cloud.google.com/blog/products/identity-security/google-cloud-launches-new-vulnerability-rewards-program/ Source: Cloud Blog Title: Introducing Google Cloud’s new Vulnerability Reward Program Feedly Summary: Vulnerability reward programs play a vital role in driving security forward. By incentivizing security research, vulnerabilities can be found and fixed by vendors before they are potentially exploited by malicious actors, protecting users and strengthening security posture. Also known…

  • The Register: Fore-get about privacy, golf tech biz leaves 32M data records on the fairway

    Source URL: https://www.theregister.com/2024/10/10/trackman_unprotected_database/ Source: The Register Title: Fore-get about privacy, golf tech biz leaves 32M data records on the fairway Feedly Summary: Researcher spots 110 TB of sensitive info sitting in unprotected database Nearly 32 million records belonging to users of tech from Trackman were left exposed to the internet, sitting in a non-password protected…

  • Hacker News: DEF Con 32 – AMD Sinkclose Universal Ring-2 Privilege Escalation (Not Redacted) [pdf]

    Source URL: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Enrique%20Nissim%20Krzysztof%20Okupski%20-%20AMD%20Sinkclose%20Universal%20Ring-2%20Privilege%20Escalation.pdf Source: Hacker News Title: DEF Con 32 – AMD Sinkclose Universal Ring-2 Privilege Escalation (Not Redacted) [pdf] Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text discusses a significant vulnerability in AMD’s System Management Mode (SMM) that can be exploited for privilege escalation, presenting both theoretical and practical approaches…

  • Hacker News: OAuth from First Principles

    Source URL: https://stack-auth.com/blog/oauth-from-first-principles Source: Hacker News Title: OAuth from First Principles Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed exploration of the OAuth 2.0 authorization process through the lens of security vulnerabilities. It highlights various security attacks that can occur if OAuth is implemented incorrectly, and outlines secure methods…