Bug in glibc's iconv() function allows for RCE in PHP servers by setting charset to ISO-2022-CN-EXT to trigger buffer overflow (CVE-2024-2961) ~comp security.cyber Link 9 votes
When provided with CVE descriptions of 15 different vulnerabilities and a set of tools useful for exploitation, GPT-4 was capable of autonomously exploiting 13 of which, yielding an 87% success rate ~comp security.cyber PDF 17 votes
Twitter replaces twitter.com with x.com without user consent. Bad implementation invites an influx of Phishing attacks. (german source) ~comp security.cyber Article 271 words 48 votes
Critical vulnerability in Rust's Command library allows for command injection when using its API to invoke batch scripts with arguments on Windows systems (CVE-2024-24576) ~comp security.cyber programming languages Article 450 words 18 votes
Sweden's public sector has ditched Big Tech in the name of privacy as a major telecom provider unveiled a new secure collaboration hub ~tech privacy security.cyber Link 14 votes
Backdoor in upstream libxz targeting sshd ~comp linux security.cyber open source Article 1967 words 104 votes
Hackers can read private AI-assistant chats even though they’re encrypted ~tech security.cyber Article 639 words, published Mar 14 2024 20 votes
‘We’re hemorrhaging money’: US health clinics try to stay open after unprecedented cyberattack ~health healthcare Article 31 votes
White House urges use of type safe and memory safe programming languages and hardware ~tech security.cyber PDF 38 votes
White House to Developers: Using C or C++ Invites Cybersecurity Risks ~comp programming languages security.cyber Article 319 words 5 votes
Leak of documents on spyware developed by vendor for Chinese government ~tech security.cyber Tweet 33 votes
ChatGPT is leaking passwords from private conversations of its users, Ars reader says ~tech privacy security.cyber Article 586 words 17 votes
In major gaffe, hacked Microsoft test account was assigned admin privileges ~tech security.cyber microsoft Article 432 words 28 votes
Twenty-six billion records exposed in massive leak, including data from Linkedin, X, Dropbox ~tech security.cyber privacy Article 369 words 44 votes
Hackers can infect network-connected wrenches to install ransomware, researchers say ~tech security.cyber Article 493 words 28 votes
EU Cyber Resilience Act: What does it mean for open source? ~comp security.cyber open source Article 3329 words, published Dec 30 2023 13 votes