• My Weekly RoundUp #125

    Some server issues, this week! So few links, sorry! Cybersecurity IM­P4GT: IM­Per­so­na­ti­on At­tacks in 4G NeT­works Long Term Evo­lu­ti­on (LTE/4G) es­ta­blis­hes mu­tu­al au­then­ti­ca­ti­on with a prov­a­b­ly se­cu­re Au­then­ti­ca­ti­on and Key Agree­ment (AKA) pro­to­col on layer three of the net­work stack.… read more »
  • Some thoughts on Information Technology in a post-apocalyptic environment

    Some funny thoughts about information technology on a post-apocalyptic environment, and some info about a more serious project! When most people think about what to do after an apocalyptic event, the first time that comes to mind is food and… read more »
  • CVE-2019-8641: remotely compromising an iPhone through iMessage

    Last December, in a talk at 36th Chaos Communication Congress, Samuel Groß presented a technical report about the infamous iOS vulnerability that allowed remote code execution on all iDevices up to iOS 12.4, within a couple of minutes and without… read more »
  • CacheOut - Another day, another CPU attack!

    A team of researchers from University of Michigan (Stephan van Schaik, Marina Minkin, Andrew Kwong and Daniel Genkin) and University of Adelaide (Yuval Yarom) recently presented a new attack technique that targets Intel CPUs. The attack, dubbed CacheOut (CVE-2020-0549), is… read more »
  • TLDR #1: Jeff Bezos’ iPhone hack

    Just few words (and links) about this hot topic. The Amazon billionaire Jeff Bezos had his mobile phone “hacked” in 2018 after receiving a WhatsApp message that had apparently been sent from the personal account of the crown prince of… read more »
  • My Weekly RoundUp #124

    Starting from this week, I'm going to start a recostructing of WeeklyRoundup (and also the whole blog): less images, more content! (...and, yes! Star Trek: Picard is awesome!) Cybersecurity Jeff Bezos hack: Amazon boss's phone 'hacked by Saudi crown prince'… read more »
  • Some thoughts about SIM Hijacking

    The SIM hijacking, also know as SIM swapping, is an attack where a criminal contacts the cell phone provider of a target user, and convinces it (sometimes involving employees of the phone company) to switch target's account to a SIM… read more »
  • DevSecOps: the value of "Security Champions"

    In a previous article [1], I've started to talk about DevSecOps and the concept of "shifting left" security.In order to move security checks to the early steps of development, a great help may be the presence of a security-aware person… read more »
  • FBI got data from a locked iPhone 11 using GrayKey: how does this tool work?

    The recent deadly shooting last month at a naval air station in Pensacola, Fla., brought in the spotlight the issue of iOS security: attorney General William P. Barr requested Apple to provide access to two phones used by the killer.… read more »
  • Security researcher found a hardcoded SSH Key in Fortinet SIEM appliances

    Security researcher Andrew Klaus, from Cybera, discovered a hardcoded SSH public key in Fortinet’s Security Information and Event Management FortiSIEM that can be used in order to generate a denial of service against the FortiSIEM Supervisor. Fortinet devices share the… read more »
  • My Weekly RoundUp #123

    Just some stuff i read in the last seven days... Cybersecurity Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A vulnerability (CVE-2019-19494) in Broadcom‘s cable modem firmware can open unknown millions of broadband modems by various manufacturers… read more »
  • CVE-2020-0601: a critical Windows vulnerability discovered by...NSA!

    Recently, Microsoft released a patch that fixes a critical vulnerability in the Windows' crypto library. According to the advisory [1]: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit… read more »
  • Some thoughts about "Shift Left" security in DevSecOps

    A popular term in DevOps context is “shift left”: it refers to the effort by a DevOps team to implement measures to guarantee application quality at the most early point in the software development life cycle. In a application security context,… read more »
  • CVE-2019-19781: my clippings on the infamous Citrix Netscaler vulnerability

    Many Proof-of-concept exploits has been released for the unpatched remote-code-execution vulnerability in the Citrix Application Delivery Controller and Citrix Gateway products. Below a list of useful links/quotes/posts on this topic. The vulnerability The vulnerability (CVE-2019-19781), already packs a double-punch in… read more »
  • My Weekly RoundUp #122

    I know, last week I slacked off, so few interesting links.Don't worry, few but good! Cybersecurity PoC exploits for Citrix ADC and Gateway CVE-2019-19781 flaw released online Experts announced the availability online of proof-of-concept exploit code for CVE-2019-19781 flaw in Citrix NetScaler… read more »
  • iOS Forensics: BFU (Before First Unlock) acquisition, using checkra1n

    iOS forensic is quite complex: in many cases, jailbreaking is the only way to gather all most information available in iOS devices. Ok, logical acquisition is easy, safe and it always works: however, this kind of acquisition mostly gives you… read more »
  • TikTok fixed several vulnerabilities that could allow hijacking of any account

    Security experts from CheckPoint discovered multiple vulnerabilities in the popular TikTok app that could be chained by remote attackers to hijack any user accounts, execute malicious code on the target system and perform unwanted actions. Those vulnerabilities (that includes SMS… read more »
  • Some thoughts about smartphones data extraction

    In an interesting article, editors by Privacy International examines some aspects of digital forensics on mobile phones, from the acquisition process to the data analysis phase. All the topics in the article [1] has been discussed in detail in the… read more »
  • My Weekly RoundUp #121

    After a brief pause, my WeeklyRoundup begin again! So, below, something I saw on the internet last week: Cybersecurity Exploiting Wi-Fi Stack on Tesla Model S In the past two years, Keen Security Lab did in-depth research on the security… read more »
  • Ring camera accounts breach: Amazon blames users, EFF respond!

    Recently, digital intruders entered the Ring surveillance camera in the bedroom of an 8-year-old girl in Mississippi and started talking to her [1], then various other intrusions took place and it emerged that 3600 e-mail addresses, passwords, localizations and other… read more »