InfoQ Homepage Security Vulnerabilities Content on InfoQ
-
Two Hidden Instructions Discovered in Intel CPUs Enable Microcode Modification
Security researchers Mark Ermolov, Dmitry Sklyarov, and Maxim Goryachy discovered two undocumented x86 instructions that can be used to modify the CPU microcode. The instructions can only be executed when the CPU runs in debug mode, which makes them not easily exploitable, though.
-
Linux Foundation Sigstore Aims to Be the Let's Encrypt of Code Signing
Backed by the Linux Foundation, Sigstore aims to provide a non-profit service to foster the adoption of cryptographic signing by open source projects to make the software supply chain more secure.
-
Analyzing Git Clone Vulnerability
A new Git version, 2.30.2, fixes a security vulnerability in Git large file storage (LFS) and other clean/smudge filters affecting Git 2.15 and newer. An analysis.
-
Eclipse Credentials Leak Affects Snapshot Builds
Deployment credentials on the Nexus Repository Manager have leaked in GitHub. The issue received broad attention when a vulnerability report was submitted in mid-February. The credentials were encrypted, however, the master password was leaked as well. Although the master password wasn’t stored in plain text, it’s relatively easy to decode and can then be used to decrypt the other credentials.
-
Google Extends Tsunami Security Scanner's Capabilities
Open-sourced last year, Google's Tsunami security scanner has received a significant update, extending its detection capabilities and adding support for Web application fingerprinting, among other things.
-
Sandboxing and Other Measures to Harden iMessage on iOS and macOS
After being hit by a 0-click exploit in iMessage last year, Apple has been hard at work to improve the security of its platform. One of the major changes in iOS 14 is BlastDoor, a tightly sandboxed service responsible for parsing all untrusted messages, along with randomization of the shared cache region containing system libraries, and exponential throttling to counter brute-force attacks.
-
Security Vulnerability Detection with Vulnture
Airbnb’s information security team wrote about their internal security vulnerability reporting tool called Vulnture. It utilizes the CVE, NVD and other vendor databases and scans infrastructure and the software stack for discovered vulnerabilities.
-
Half of 4 Million Public Docker Hub Images Found to Have Critical Vulnerabilities
A recent analysis of around 4 million Docker Hub images by cyber security firm Prevasio found that 51% of the images had exploitable vulnerabilities. A large number of these were cryptocurrency miners, both open and hidden, and 6,432 of the images had malware.
-
How SAD DNS Works
SAD DNS is a new variant of DNS cache poisoning that allows an attacker to inject malicious DNS records into a DNS cache, thus redirecting any traffic to their own server and become a man-in-the-middle (MITM).
-
Git 2.29 Introduces Experimental Support for SHA-256
The latest version of Git experimentally enables using SHA-256 instead of SHA-1 for file hashing, thus removing a long-standing vulnerability which in principle allowed an attacker to forge a counterfeited repository with a HEAD not distinguishable from the original's.
-
GitHub Code Scanning Is out of Beta
One year ago GitHub announced the acquisition of Semmle, maker of a semantic code analysis engine powered by the Semmle QL query language. After a few months in beta, GitHub is now announcing the availability of its new CodeQL-based code scanning capability for all public and private repos.
-
New COOP and COEP Cross-Origin Policies for Increased Security in Chrome and Firefox
Eiji Kitamura recently addressed in a talk at Google’s web.dev live the new COOP and COEP policies that dictate how browsers handle cross-origin resources. The new opener (COOP) and embedded (COEP) policies set up a cross-origin isolated environment that protects against Spectre attacks while restoring powerful, previously disabled features (SharedArrayMemoryBuffer and more).
-
Snyk Releases Enhanced Vulnerability Prioritization Features
Snyk has announced the release of a number of new features to simplify prioritizing security vulnerabilities. This includes a new, proprietary algorithm to assess and provide a score for each identified issue. This approach takes into account the maturity of the exploit and can analyze if the affected code is reachable through application execution.
-
AWS Announces the General Availability of New Security Service: Amazon Detective
Recently, Amazon announced the general availability of Amazon Detective. This new security service in AWS allows customers to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
-
Yelp Open-Sources Fuzz-Lightyear, A Swagger-Based IDOR Vulnerability Detector
Business directory and crowd-sourced review service, Yelp, has open-sourced their in-house security testing framework, fuzz-lightyear, that identifies Insecure Direct Object Reference (IDOR) vulnerabilities.