@jos1264@social.skynetcloud.site avatar jos1264 , to random
@AAKL@infosec.exchange avatar AAKL , to random

This critical Broadcom vulnerability advisory was updated yesterday. You'll need a login for details.

Broadcom Mainframe Software Security Advisory for Critical OpenSSL Vulnerability CVE-2025-15467 https://support.broadcom.com/web/ecx/security-advisory

@harrysintonen@infosec.exchange avatar harrysintonen , to random

Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

Madness.

source: https://mrbruh.com/amd/

@NickAEsp@mastodon.social avatar NickAEsp , to random

Daily podcast: Tesla Cars = Super Hackable! Here's why that a good thing... in the long run...

https://soundcloud.com/nickaesp/tsh

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@majorlinux@toot.majorshouse.com avatar majorlinux , to random

And the State Department is worried about Calibri being woke...

Porn Is Being Injected Into Government Websites Via Malicious PDFs

https://www.404media.co/porn-is-being-injected-into-government-websites-via-malicious-pdfs/

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@acig@fediscience.org avatar acig , to random

🚨 New article now available online!

More digital technologies bring greater convenience and efficiency, but also expand the attack surface and increase security risks. In the light of this, EU’S introduces requirements pertaining to vulnerability disclosure and mitigation. Jukka Ruohonen and Paul Timmers examine the act’s details and sketch out the directions for future research.
Read their paper “Vulnerability Coordination under the Cyber Resilience Act,” now available at https://www.acigjournal.com/Vulnerability-Coordination-under-the-Cyber-Resilience-Act,213350,0,2.html

🌐 Applied Cybersecurity & Internet Governance () is published by – National Research Institute

ALT
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@jos1264@social.skynetcloud.site avatar jos1264 , to random
@jos1264@social.skynetcloud.site avatar jos1264 , to random

Microsoft Patch Tuesday for November 2025 – Fix for 0-day and Other 62 Vulnerabilities https://gbhackers.com/microsoft-patch-tuesday-november-2025/

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@harrysintonen@infosec.exchange avatar harrysintonen , to random

Several months ago, I found a from - Authentication bypass for some passwords due to PHP type juggling (CVE-2025-47776).

Any account that has a password that results in a hash that matches ^0+[Ee][0-9]+$ can be logged in with a password that matches that regex as well. For example, password comito5 can be used to log in to the affected accounts and thus gain unauthorised access.

The root cause of this bug is the incorrect use of == to match the password hash:

if( auth_process_plain_password( $p_test_password, $t_password, $t_login_method ) == $t_password )

The fix is to use === for the comparison.

This vulnerability has existed in MantisBT ever since hashed password support was added (read: decades). MantisBT 2.27.2 and later include a fix to this vulnerability. https://mantisbt.org/download.php

ALT
@jos1264@social.skynetcloud.site avatar jos1264 , to random