Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Apple’s Device Location-Tracking System Could Expose User Identities

Threatpost - 4 hodiny 2 min zpět
Researchers have identified two vulnerabilities in the company’s crowd-sourced Offline Finding technology that could jeopardize its promise of privacy.
Kategorie: Hacking & Security

Microsoft Patch Tuesday Updates Fix 14 Critical Bugs

Threatpost - 9 Březen, 2021 - 23:12
Microsoft's regularly scheduled March Patch Tuesday updates address 89 CVEs overall.
Kategorie: Hacking & Security

Introducing sigstore: Easy Code Signing & Verification for Supply Chain Integrity

Google Security Blog - 9 Březen, 2021 - 23:02
Posted by Kim Lewandowski & Dan Lorenc, Google Open Source Security Team

One of the fundamental security issues with open source is that it’s difficult to know where the software comes from or how it was built, making it susceptible to supply chain attacks. A few recent examples of this include dependency confusion attack and malicious RubyGems package to steal cryptocurrency.

Today we welcome the announcement of sigstore, a new project in the Linux Foundation that aims to solve this issue by improving software supply chain integrity and verification.

Installing most open source software today is equivalent to picking up a random thumb-drive off the sidewalk and plugging it into your machine. To address this we need to make it possible to verify the provenance of all software - including open source packages. We talked about the importance of this in our recent Know, Prevent, Fix post.

The mission of sigstore is to make it easy for developers to sign releases and for users to verify them. You can think of it like Let’s Encrypt for Code Signing. Just like how Let’s Encrypt provides free certificates and automation tooling for HTTPS, sigstore provides free certificates and tooling to automate and verify signatures of source code. Sigstore also has the added benefit of being backed by transparency logs, which means that all the certificates and attestations are globally visible, discoverable and auditable.

Sigstore is designed with open source maintainers, for open source maintainers. We understand long-term key management is hard, so we've taken a unique approach of issuing short-lived certificates based on OpenID Connect grants. Sigstore also stores all activity in Transparency Logs, backed by Trillian so that we can more easily detect compromises and recover from them when they do occur. Key distribution is notoriously difficult, so we've designed away the need for them by building a special Root CA just for code signing, which will be made available for free.

We have a working prototype and proof of concepts that we're excited to share for feedback. Our goal is to make it seamless and easy to sign and verify code:


It has been fun collaborating with the folks from Red Hat and the open source community on this project. Luke Hinds, one of the lead developers on sigstore and Security Engineering Lead at Red Hat says, "I am very excited about sigstore and what this means for improving the security of software supply chains. sigstore is an excellent example of an open source community coming together to collaborate and develop a solution to ease the adoption of software signing in a transparent manner." We couldn’t agree more.

Mike Malone, the CEO of Smallstep, helped with the overall design of sigstore. He adds, “In less than a generation, open source has grown from a niche community to a critical ecosystem that powers our global economy and institutions of society and culture. We must ensure the security of this ecosystem without undermining the open, decentralized collaboration that makes it work. By building on a clever composition of existing technologies that respect privacy and work at scale, sigstore is the core infrastructure we need to solve this fundamental problem. It’s an ambitious project with potential for global impact. I’m impressed by the rapid progress that’s been made by Google, Red Hat, and Linux Foundation over the past few months, and I’m excited to hear feedback from the broader community.”

While we are happy with the progress that has been made, we know there is still work to be done before this can be widely relied upon. Upcoming plans for sigstore include: hardening the system, adding support for other OpenID Connect providers, updating documentation and responding to community feedback.

Sigstore is in its early days, but we're really excited about its future. Now is a great time to provide feedback, try out the tooling and get involved with the project as design details are still being refined.
Kategorie: Hacking & Security

Dark Web Markets for Stolen Data See Banner Sales

Threatpost - 9 Březen, 2021 - 22:59
Despite an explosion in the sheer amount of stolen data available on the Dark Web, the value of personal information is holding steady, according to the 2021 Dark Web price index from Privacy Affairs. That leaves these thriving dirty data dealers in a familiar predicament — they need to lock down their growing businesses for […]
Kategorie: Hacking & Security

Adobe Critical Code-Execution Flaws Plague Windows Users

Threatpost - 9 Březen, 2021 - 21:44
The critical flaws exist in Adobe Framemaker, Connect and the Creative Cloud desktop application for Windows.
Kategorie: Hacking & Security

Google Play Harbors Malware-Laced Apps Delivering Spy Trojans

Threatpost - 9 Březen, 2021 - 17:44
A never-before-seen malware-dropper, Clast82, fetches the AlienBot and MRAT malware in a savvy Google Play campaign aimed at Android users.
Kategorie: Hacking & Security

Apple Plugs Severe WebKit Remote Code-Execution Hole

Threatpost - 9 Březen, 2021 - 16:58
Apple pushed out security updates for a memory-corruption bug to devices running on iOS, macOS, watchOS and for Safari.
Kategorie: Hacking & Security

Serious Security: Webshells explained in the aftermath of HAFNIUM attacks

Sophos Naked Security - 9 Březen, 2021 - 13:32
Webshells explained, with some (safe) examples you can try at home if you want to learn more.

9 Android Apps On Google Play Caught Distributing AlienBot Banker and MRAT Malware

The Hacker News - 9 Březen, 2021 - 12:13
Cybersecurity researchers have discovered a new malware dropper contained in as many as 9 Android apps distributed via Google Play Store that deploys a second stage malware capable of gaining intrusive access to the financial accounts of victims as well as full control of their devices. "This dropper, dubbed Clast82, utilizes a series of techniques to avoid detection by Google Play Protect
Kategorie: Hacking & Security

Cybersecurity Webinar — SolarWinds Sunburst: The Big Picture

The Hacker News - 9 Březen, 2021 - 11:42
The SolarWinds Sunburst attack has been in the headlines since it was first discovered in December 2020.  As the so-called layers of the onion are peeled back, additional information regarding how the vulnerability was exploited, who was behind the attack, who is to blame for the attack, and the long-term ramifications of this type of supply chain vulnerabilities continue to be actively
Kategorie: Hacking & Security

SolarWinds Hack — New Evidence Suggests Potential Links to Chinese Hackers

The Hacker News - 9 Březen, 2021 - 10:58
A malicious web shell deployed on Windows systems by leveraging a previously undisclosed zero-day in SolarWinds' Orion network monitoring software may have been the work of a possible Chinese threat group. In a report published by Secureworks on Monday, the cybersecurity firm attributed the intrusions to a threat actor it calls Spiral. Back on December 22, 2020, Microsoft disclosed that a second
Kategorie: Hacking & Security

Češi nejsou jediní. Počet útoků na Microsoft Exchange Server roste i ve světě

Novinky.cz - bezpečnost - 9 Březen, 2021 - 10:10
Hackerskému útoku čelily minulý týden ve čtvrtek systémy veřejné správy, kyberzločinci zneužili nezáplatovanou chybu Microsoft Exchange Serveru. Česko nicméně není jedinou zemí, na kterou se počítačoví piráti zaměřili – výrazný vzestup útoků ve spojitosti s Exchange Serverem pozorují bezpečnostní experti z antivirové společnosti Kaspersky také v dalších státech Evropy a USA.
Kategorie: Hacking & Security

Apple Issues Patch for Remote Hacking Bug Affecting Billions of its Devices

The Hacker News - 9 Březen, 2021 - 09:58
Apple has released out-of-band patches for iOS, macOS, watchOS, and Safari web browser to address a security flaw that could allow attackers to run arbitrary code on devices via malicious web content. Tracked as CVE-2021-1844, the vulnerability was discovered and reported to the company by Clément Lecigne of Google's Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability
Kategorie: Hacking & Security

Microsoft Exchange Hackers Also Breached European Banking Authority

The Hacker News - 9 Březen, 2021 - 09:57
The European Banking Authority (EBA) on Sunday said it had been a victim of a cyberattack targeting its Microsoft Exchange Servers, forcing it to temporarily take its email systems offline as a precautionary measure. "As the vulnerability is related to the EBA's email servers, access to personal data through emails held on that servers may have been obtained by the attacker," the Paris-based
Kategorie: Hacking & Security

McAfee prodá podnikovou divizi za čtyři miliardy dolarů

Novinky.cz - bezpečnost - 9 Březen, 2021 - 08:19
Americký výrobce antivirového softwaru McAfee prodá svoji podnikovou divizi konsorciu vedenému firmou Symphony Technology Group (STG) za čtyři miliardy USD (89 miliard Kč). Firma se nadále hodlá zaměřit na kybernetickou bezpečnost pro běžné spotřebitele, uvádí podnik v prohlášení.
Kategorie: Hacking & Security

Microsoft Exchange Cyber Attack — What Do We Know So Far?

The Hacker News - 9 Březen, 2021 - 08:09
Microsoft on Friday warned of active attacks exploiting unpatched Exchange Servers carried out by multiple threat actors, as the hacking campaign is believed to have infected tens of thousands of businesses, government entities in the U.S., Asia, and Europe. The company said "it continues to see increased use of these vulnerabilities in attacks targeting unpatched systems by multiple malicious
Kategorie: Hacking & Security

Malware Can Exploit New Flaw in Intel CPUs to Launch Side-Channel Attacks

The Hacker News - 9 Březen, 2021 - 04:08
A new research has yielded yet another means to pilfer sensitive data by exploiting what's the first "on-chip, cross-core" side-channel in Intel Coffee Lake and Skylake processors. Published by a group of academics from the University of Illinois at Urbana-Champaign, the findings are expected to be presented at the USENIX Security Symposium coming this August. While information leakage attacks
Kategorie: Hacking & Security

Newest Intel Side-Channel Attack Sniffs Out Sensitive Data

Threatpost - 8 Březen, 2021 - 22:20
A new side-channel attack takes aim at Intel's CPU ring interconnect in order to glean sensitive data.
Kategorie: Hacking & Security

Crypto-Miner Campaign Targets Unpatched QNAP NAS Devices

Threatpost - 8 Březen, 2021 - 22:16
Researchers warn two critical bugs impacting multiple QNAP firmware versions are under active attack.
Kategorie: Hacking & Security

Naked Security Live – ICU: How much do your home-working photos give away?

Sophos Naked Security - 8 Březen, 2021 - 20:46
I see you/And what you do - So be aware/Before you share - And if in doubt/Don't give it out!
Syndikovat obsah