CyBOK has just published release v1.1 - this is an extremely useful set of frequently updated cyber security guidelines managed by a number of universities across UK covering topics from risk & governance to low-level tech like and web application

cybok.org/knowledgebase1_1/

You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries

"Among our most interesting findings is that only 27.2% of vulnerabilities in cryptographic libraries are cryptographic issues while 37.2% of vulnerabilities are memory safety issues, indicating that systems-level bugs are a greater security concern than the actual cryptographic procedures."

arxiv.org/abs/2107.04940

Local root exploit in Linux , do patch your kernelz

oss-security - CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer

openwall.com/lists/oss-securit

Since ~2005 all EU countries have Electronic Signature legislation (1999/93/EC), later renewed as eIDAS (Regulation 910/2014).

It's 2021, companies are still scammed by fake PDF pretending to be an order by a German court, notable judiciary institution, sent with *no* digital signature at all, in a industry where these attacks are frequent ๐Ÿคท

Linux Foundation has been quietly developing a project that might solve the supply chain attacks that are now on the rise - basically, a cryptographic transparency log of signed artifacts such as libraries, packages etc. It's in early phase but looks very promising

sigstore.dev/what_is_sigstore/

Many organisations by principle only apply product updates that are explicitly marked as security fixes. I argue why this policy is not sufficient with examples on how general updates also have impact on

krvtz.net/posts/why-only-secur

Very, very true... "if you cast your gaze across pentest reports and bug bounty findings, you'll discover another insidious theme emerges: 'vulnerabilities' that simply don't make sense."

portswigger.net/research/notwa

Someone backdoored official distro to execute custom code if an app is accessed with User-Agent containing "zerodium" string... ๐Ÿค”

therecord.media/hackers-backdo

A pretty comprehensive introduction into what end-to-end encryption *actually* means in the context of instant messengers (mostly): what data specifically is encrypted where, and what popular misconceptions in this field are routinely used for marketing purposes.

youtube.com/watch?v=CqsrA4eeGS

Fortunately, spread of trojanized packages is limited to newly built applications only because nobody updates NPM libs anyway ๐Ÿคทโ€โ™‚๏ธ

So as long everyone sticks to the tried strategy of "lets hold and wait if others get infected" we don't need any package signatures etc

zdnet.com/article/malicious-np

One of my favourite features of Wazuh is command monitoring which, combined with rules, allows creating sophisticated sanity checks on critical infrastructure services. krvtz.net/posts/checking-for-c

Software security scanner market today is now mature enough to have its own jargon, built largely by vendor marketing teams. As such, it's primarily designed to help you get rid of your infosec budget rather than help you design a reasonable security assurance architecture. This is first part of series that looks at SAST and DAST advantages and limitations. krvtz.net/posts/making-sense-o

How Slack's STUN/TURN servers running Coturn were abused and how to fix it?

Important for anyone running with their own STUN/TURN servers

rtcsec.com/2020/04/01-slack-we

Show more

kravietz ๐Ÿฆ‡'s choices:

Mastodon ๐Ÿ” privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!