Security Leftovers
-
Microsoft warns of rise in password sprays targeting cloud accounts [Ed: Microsoft dismissed this problem for a very long time]
-
New 'Trojan Source' Method Lets Attackers Hide Vulns in Source Code [Ed: It's hardly a new problem, unlike the hype associated with it; phishing tactics do the same]
-
The "Trojan Source" vulnerability
The latest branded and trademarked vulnerability type is called "Trojan Source". By playing tricks with Unicode bidirectional support, an attacker can create malicious code that appears to be benign to reviewers.
-
Trick & Treat! Paying Leets and Sweets for Linux Kernel privescs and k8s escapes
Starting today and for the next 3 months (until January 31 2022), we will pay 31,337 USD to security researchers that exploit privilege escalation in our lab environment with a patched vulnerability, and 50,337 USD to those that use a previously unpatched vulnerability, or a new exploit technique.
We are constantly investing in the security of the Linux Kernel because much of the internet, and Google—from the devices in our pockets, to the services running on Kubernetes in the cloud—depend on the security of it. We research its vulnerabilities and attacks, as well as study and develop its defenses. -
Google Will Now Pay $31,337 To $50,337 For New Linux Kernel Vulnerabilities - Phoronix
Google announced today that now through at least the end of January they will be providing higher payment amounts for security researchers disclosing new vulnerabilities affecting the Linux kernel.
For the next three months Google will pay out $31,337 USD for vulnerabilities that can exploit privilege escalation. Or if demonstrating a previously unpatched vulnerability or a new exploit technique, they will pay out $50,337 USD.
-
Bananian Bananapi Lamobo R1 (BCM53125) – the ARM router that is not a router (it is a layer 2 switch with only one NIC) – default root password is pi
it all could have been so well
an ARM based router, with HDMI (!) with SATA (!) with enough power, but adding a second interface (every router needs at least LAN (can be layer 2 switch) and WAN (should be physically separate NIC) with an USB-ETHERNET adapter is a low quality (unreliable) option, that one is pretty much against.
- Login or register to post comments
- Printer-friendly version
- 4674 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Trojan Source: Invisible Vulnerabilities
Trojan Source: Invisible Vulnerabilities