article thumbnail

Secure by Design roundup - March 2024

Adam Shostack

Threat Modeling People are raving out our new whitepaper on Inherent Threats! Image by Midjourney: robot reading many books::2 , while being hacked. The LINDDUN team has a new edition of LINDDUN GO , and were kind enough to send me a copy. Blog overview or direct link.) I expect to be talking about it at Threatmodcon in Lisbon.

Software 130
article thumbnail

Sonos smart speakers flaw allowed to eavesdrop on users

Security Affairs

NCC Group also published a whitepaper that provides details about the reverse engineering process and exploitation techniques that its experts used to achieve arbitrary code execution on both the Sonos Era-100 and the Sonos One devices. The other major section of the whitepaper is dedicated towards the Sonos Era-100 device.

Wireless 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ETERNALSILENCE – 270K+ devices vulnerable to UPnProxy Botnet build using NSA hacking tools

Security Affairs

In early 2013, researchers at Rapid7 published an interesting whitepaper entitled “Security Flaws in Universal Plug and Play” that evaluated the global exposure of UPnP-enabled network devices. Securi ty Affairs – UPnProxy, NSA hacking tools). The UPnP communication protocol is widely adopted even if it is known to be vulnerable.

Hacking 111
article thumbnail

The evolution of ransomware in 2019: attackers think bigger, go deeper and grow more advanced

Security Affairs

The findings come as highlights of Group-IB whitepaper titled “ Ransomware Uncovered: Attackers’ Latest Methods ,” closely examining the evolution of the ransomware operators’ strategies over the past year, issued today. More recommendations can be found in the relevant section of the whitepaper. . Big Game Hunting. About Group-IB.

article thumbnail

Hacking for Defenders: approaches to DARPA’s AI Cyber Challenge

Google Security

A 2024 whitepaper from Google walks through one way to build an LLM-based automated patching pipeline. Improving patching with AI These limitations highlight a second area for competitors to apply AI’s capabilities. One approach might be to use an LLM to suggest patches.

Hacking 93
article thumbnail

News Alert: Utimaco finds regional disparities in consumers’ level of trust in digital security

The Last Watchdog

When asked if they have ever been a victim of data loss, identity theft or hacks related to a smart home device, 41% of US respondents said Yes. Just decades ago, the internet was something that could only be accessed from large, immobile personal computers.

article thumbnail

Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

The Last Watchdog

They are doing this using both tried-and-true, as well as leading-edge, hacking techniques. One key bit of intelligence Bitdefender shares in a whitepaper is a breakdown of how EternalBlue has come into play, once again.