roundcubemail-1.6.4-1.fc39

Read Time:18 Second

FEDORA-2023-735ee6d4e1

Packages in this update:

roundcubemail-1.6.4-1.fc39

Update description:

Version 1.6.4

Fix PHP8 warnings (#9142, #9160)
Fix default ‘mime.types’ path on Windows (#9113)
Managesieve: Fix javascript error when relational or spamtest extension is not enabled (#9139)
Fix cross-site scripting (XSS) vulnerability in handling of SVG in HTML messages (#9168)

Read More

roundcubemail-1.6.4-1.fc37

Read Time:18 Second

FEDORA-2023-562e77957f

Packages in this update:

roundcubemail-1.6.4-1.fc37

Update description:

Version 1.6.4

Fix PHP8 warnings (#9142, #9160)
Fix default ‘mime.types’ path on Windows (#9113)
Managesieve: Fix javascript error when relational or spamtest extension is not enabled (#9139)
Fix cross-site scripting (XSS) vulnerability in handling of SVG in HTML messages (#9168)

Read More

Coin Flips Are Biased

Read Time:1 Minute, 11 Second

Experimental result:

Many people have flipped coins but few have stopped to ponder the statistical and physical intricacies of the process. In a preregistered study we collected 350,757 coin flips to test the counterintuitive prediction from a physics model of human coin tossing developed by Persi Diaconis. The model asserts that when people flip an ordinary coin, it tends to land on the same side it started—Diaconis estimated the probability of a same-side outcome to be about 51%.

And the final paragraph:

Could future coin tossers use the same-side bias to their advantage? The magnitude of the observed bias can be illustrated using a betting scenario. If you bet a dollar on the outcome of a coin toss (i.e., paying 1 dollar to enter, and winning either 0 or 2 dollars depending on the outcome) and repeat the bet 1,000 times, knowing the starting position of the coin toss would earn you 19 dollars on average. This is more than the casino advantage for 6 deck blackjack against an optimal-strategy player, where the casino would make 5 dollars on a comparable bet, but less than the casino advantage for single-zero roulette, where the casino would make 27 dollars on average. These considerations lead us to suggest that when coin flips are used for high-stakes decision-making, the starting position of the coin is best concealed.

Boing Boing post.

Read More

Strengthening Cybersecurity: Force multiplication and security efficiency

Read Time:5 Minute, 4 Second

In the ever-evolving landscape of cybersecurity, the battle between defenders and attackers has historically been marked by an asymmetrical relationship. Within the cybersecurity realm, asymmetry has characterized the relationship between those safeguarding digital assets and those seeking to exploit vulnerabilities. Even within this context, where attackers are typically at a resource disadvantage, data breaches have continued to rise year after year as cyber threats adapt and evolve and utilize asymmetric tactics to their advantage.  These include technologies and tactics such as artificial intelligence (AI), and advanced social engineering tools. To effectively combat these threats, companies must rethink their security strategies, concentrating their scarce resources more efficiently and effectively through the concept of force multiplication.

Asymmetrical threats, in the world of cybersecurity, can be summed up as the inherent disparity between adversaries and the tactics employed by the weaker party to neutralize the strengths of the stronger one. The utilization of AI and similar tools further erodes the perceived advantages that organizations believe they gain through increased spending on sophisticated security measures.

Recent data from InfoSecurity Magazine, referencing the 2023 Checkpoint study, reveals a disconcerting trend: global cyberattacks increased by 7% between Q1 2022 and Q1 2023. While not significant at first blush, a deeper analysis reveals a more disturbing trend specifically that of the use of AI.  AI’s malicious deployment is exemplified in the following quote from their research:

“…we have witnessed several sophisticated campaigns from cyber-criminals who are finding ways to weaponize legitimate tools for malicious gains.”

Furthermore, the report highlights:

“Recent examples include using ChatGPT for code generation that can help less-skilled threat actors effortlessly launch cyberattacks.”

As threat actors continue to employ asymmetrical strategies to render organizations’ substantial and ever-increasing security investments less effective, organizations must adapt to address this evolving threat landscape. Arguably, one of the most effective methods to confront threat adaptation and asymmetric tactics is through the concept of force multiplication, which enhances relative effectiveness with fewer resources consumed thereby increasing the efficiency of the security dollar.

Efficiency, in the context of cybersecurity, refers to achieving the greatest cumulative effect of cybersecurity efforts with the lowest possible expenditure of resources, including time, effort, and costs. While the concept of efficiency may seem straightforward, applying complex technological and human resources effectively and in an efficient manner in complex domains like security demands more than mere calculations. This subject has been studied, modeled, and debated within the military community for centuries. Military and combat efficiency, a domain with a long history of analysis, offers valuable insights. In 1050 BC, the Chinese warrior LouTao observed:

“The strength of an army depends less upon numbers than upon efficiency.”

Similarly, in his renowned 19th Century book titled On War, Carl Von Clausewitz emphasized a general principle of warfare:

“Make the best use of the few means at our disposal.”

At the risk of oversimplifying, operational and financial efficiency is optimal and, in the case of cybersecurity, critical. In most businesses, companies are allocated budgets annually.  When business conditions change budgets may increase or decrease.  Regardless, the concept of efficiency is directly correlated to the ability to use those budgetary allocations more efficiently.  If an organization can gain an efficiency of 20% that enables them to re-invest that saved 20% into additional security measures thereby enabling the equivalent of net improvement of 20% in security for the original amount allocated. The question becomes, how do organizations improve efficiency?

Borrowing once again from military theory, it is instructive to consider the concept of force multiplication within cybersecurity.  Force multiplication refers to a factor or combination of factors that empower personnel, or other assets to achieve results that are greater than the sum of its parts. It’s an essential concept when faced with challenging scenarios where numerical superiority is lacking.  Force multiplication within the military can include training, doctrinal changes, psychology, deception, and technology. 

Consider a 12-person Special Forces team (Green Berets).  This 12-person team can recruit, train, and lead a 1,000-person indigenous force within months of arrival in country.  Additionally, their proficiency in combat results in any enemy who wants to attack them committing a much larger force than would be required for a less proficient team. It should be noted that this proficiency comes at an expense of a very long training regimen of several years to become ‘fully qualified’.  In short, the 12-person team acts as a much larger force in the eyes of the enemy.  Some technological examples of force multipliers in combat would be the use of air refueling tankers which provide aircraft with virtually unlimited range. 

Within the security domain a slight modification to the traditional military definition is suggested to account for the differences in purely defensive vs bidirectional operations:

“…using various strategies, technologies, and human factors to amplify the effectiveness of security measures.”

Numerous studies have demonstrated that today’s conventional security approaches are increasingly inefficient, and therefore ineffective, in the face of evolving threats. In a parallel to how military experts seek to accomplish their objectives more efficiently, allocating fewer resources, incurring fewer losses, and achieving objectives more swiftly, companies should adopt a similar objective.

In much the same way that the Green Berets rely upon proficiency in their own operations, companies can recruit, hire, and train to gain an advantage at proficiency. Proficiency conveys a level of skill that supports efficiency rather than the simple mechanistic characteristics implied by efficiency.  This may provide a force multiplication effect, but the key is to hire at the appropriate level. 

From a technological perspective, AT&T can help your organization achieve force multiplication and cybersecurity efficiency through myriad products.  These include:  Zero Trust Architecture, Secured Access Service Edge (SASE), USM Anywhere, and Managed Vulnerability Programs (MVP), among other services and products.

By leveraging AT&T’s substantial suite of cybersecurity products and services, your organization can begin to see the benefits of cyber force multiplication that, in turn, will result in greater efficiencies for your organization allowing your company to get more bang for your security dollar. 

Read More

gdb-13.2-6.fc38

Read Time:9 Second

FEDORA-2023-60cf98b7e6

Packages in this update:

gdb-13.2-6.fc38

Update description:

Backport upstream commit d28fbc7197b which fixes RHBZ 2233965, Security fix for CVE-2022-48065

Read More

wordpress-6.3.2-1.fc39

Read Time:1 Minute, 1 Second

FEDORA-2023-1adca3e938

Packages in this update:

wordpress-6.3.2-1.fc39

Update description:

WordPress 6.3.2 – Maintenance and Security release

This security and maintenance release features 19 bug fixes on Core, 22 bug fixes for the Block Editor, and 8 security fixes.

Security updates included in this release:

Marc Montpas of Automattic for finding a potential disclosure of user email addresses.
Marc Montpas of Automattic for finding an RCE POP Chains vulnerability.
Rafie Muhammad and Edouard L of Patchstack along with a WordPress commissioned third-party audit for each independently identifying a XSS issue in the post link navigation block.
Jb Audras of the WordPress Security Team and Rafie Muhammad of Patchstack for each independently discovering an issue where comments on private posts could be leaked to other users.
John Blackbourn (WordPress Security Team), James Golovich, J.D Grimes, Numan Turle, WhiteCyberSec for each independently identifying a way for logged-in users to execute any shortcode.
mascara7784 and a third-party security audit for identifying a XSS vulnerability in the application password screen.
Jorge Costa of the WordPress Core Team for identifying XSS vulnerability in the footnotes block.
s5s and raouf_maklouf for independently identifying a cache poisoning DoS vulnerability.

Read More

wordpress-6.3.2-1.fc38

Read Time:1 Minute, 1 Second

FEDORA-2023-c42a4b2eab

Packages in this update:

wordpress-6.3.2-1.fc38

Update description:

WordPress 6.3.2 – Maintenance and Security release

This security and maintenance release features 19 bug fixes on Core, 22 bug fixes for the Block Editor, and 8 security fixes.

Security updates included in this release:

Marc Montpas of Automattic for finding a potential disclosure of user email addresses.
Marc Montpas of Automattic for finding an RCE POP Chains vulnerability.
Rafie Muhammad and Edouard L of Patchstack along with a WordPress commissioned third-party audit for each independently identifying a XSS issue in the post link navigation block.
Jb Audras of the WordPress Security Team and Rafie Muhammad of Patchstack for each independently discovering an issue where comments on private posts could be leaked to other users.
John Blackbourn (WordPress Security Team), James Golovich, J.D Grimes, Numan Turle, WhiteCyberSec for each independently identifying a way for logged-in users to execute any shortcode.
mascara7784 and a third-party security audit for identifying a XSS vulnerability in the application password screen.
Jorge Costa of the WordPress Core Team for identifying XSS vulnerability in the footnotes block.
s5s and raouf_maklouf for independently identifying a cache poisoning DoS vulnerability.

Read More