Friday Squid Blogging: SQUID Acronym for Making Conscious Choices
I think the U is forced: SQUID consists of five steps: Stop, Question, Understand, Imagine, and Decide. As usual, you can also use this squid...
New exploits can bypass Secure Boot and modern UEFI security protections
Two teams of researchers have revealed vulnerabilities this week in Unified Extensible Firmware Interface (UEFI) implementations and bootloaders that could allow attackers to defeat the...
CVE-2021-29118
An out-of-bounds read vulnerability exists when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) which allow an unauthenticated attacker to induce an...
CVE-2021-29117
A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in...
CVE-2021-29112
An out-of-bounds read vulnerability exists when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) which allow an unauthenticated attacker to induce an...
Meta Tests Encrypted Backups and End-to-End Encryption in Facebook Messenger
Meta is also introducing an encrypted backup feature called Secure Storage Read More
Sounding the Alarm on Emergency Alert System Flaws
The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System...
Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments
The devices were powered by MediaTek chips and susceptible to two kinds of attacks Read More
Twitter Exposes Personal Information for 5.4 Million Accounts
Twitter accidentally exposed the personal information—including phone numbers and email addresses—for 5.4 million accounts. And someone was trying to sell this information. In January 2022,...
SolidBit Ransomware Group Recruiting New Affiliates on Dark Web
20% of the earned profit from the distribution of the ransomware will be paid to the affiliates Read More