Tag: exploits

  • Hacker News: SELinux Bypasses

    Source URL: https://klecko.github.io/posts/selinux-bypasses/ Source: Hacker News Title: SELinux Bypasses Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides an in-depth technical exploration of SELinux, specifically relating to its implementation, security mechanisms, and potential bypass methods on Android devices. This is significant for professionals in security and compliance who are focused on kernel-level…

  • The Register: Just how private is Apple’s Private Cloud Compute? You can test it to find out

    Source URL: https://www.theregister.com/2024/10/25/apple_private_cloud_compute/ Source: The Register Title: Just how private is Apple’s Private Cloud Compute? You can test it to find out Feedly Summary: Also updates bug bounty program with $1M payout In June, Apple used its Worldwide Developer Conference to announce the creation of the Private Cloud Compute platform to run its AI Intelligence…

  • Embrace The Red: ZombAIs: From Prompt Injection to C2 with Claude Computer Use

    Source URL: https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/ Source: Embrace The Red Title: ZombAIs: From Prompt Injection to C2 with Claude Computer Use Feedly Summary: A few days ago, Anthropic released Claude Computer Use, which is a model + code that allows Claude to control a computer. It takes screenshots to make decisions, can run bash commands and so forth.…

  • The Register: Samsung phone users under attack, Google warns

    Source URL: https://www.theregister.com/2024/10/24/samsung_phone_eop_attacks/ Source: The Register Title: Samsung phone users under attack, Google warns Feedly Summary: Don’t ignore this nasty zero day exploit says TAG A nasty bug in Samsung’s mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google…

  • Slashdot: White Hat Hackers Earn $500,000 On First Day of Pwn2Own Ireland 2024

    Source URL: https://it.slashdot.org/story/24/10/23/2213229/white-hat-hackers-earn-500000-on-first-day-of-pwn2own-ireland-2024?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: White Hat Hackers Earn $500,000 On First Day of Pwn2Own Ireland 2024 Feedly Summary: AI Summary and Description: Yes Summary: The report highlights the significant financial rewards earned by white hat hackers during the Pwn2Own Ireland 2024 contest for exploiting various vulnerabilities in NAS devices and smart technologies. This…

  • The Register: Microsoft SharePoint RCE flaw exploits in the wild – you’ve had 3 months to patch

    Source URL: https://www.theregister.com/2024/10/23/microsoft_sharepoint_rce_exploited/ Source: The Register Title: Microsoft SharePoint RCE flaw exploits in the wild – you’ve had 3 months to patch Feedly Summary: Plus, a POC to make it extra easy for attackers A Microsoft SharePoint bug that can allow an attacker to remotely inject code into vulnerable versions is under active exploitation, according…

  • The Register: Akira ransomware is encrypting victims again following pure extortion fling

    Source URL: https://www.theregister.com/2024/10/22/akira_encrypting_again/ Source: The Register Title: Akira ransomware is encrypting victims again following pure extortion fling Feedly Summary: Crooks revert to old ways for greater efficiency Experts believe the Akira ransomware operation is up to its old tricks again, encrypting victims’ files after a break from the typical double extortion tactics.… AI Summary and…