• My Weekly RoundUp #124

    Starting from this week, I'm going to start a recostructing of WeeklyRoundup (and also the whole blog): less images, more content! (...and, yes! Star Trek: Picard is awesome!) Cybersecurity Jeff Bezos hack: Amazon boss's phone 'hacked by Saudi crown prince'… read more »
  • Some thoughts about SIM Hijacking

    The SIM hijacking, also know as SIM swapping, is an attack where a criminal contacts the cell phone provider of a target user, and convinces it (sometimes involving employees of the phone company) to switch target's account to a SIM… read more »
  • DevSecOps: the value of "Security Champions"

    In a previous article [1], I've started to talk about DevSecOps and the concept of "shifting left" security.In order to move security checks to the early steps of development, a great help may be the presence of a security-aware person… read more »
  • FBI got data from a locked iPhone 11 using GrayKey: how does this tool work?

    The recent deadly shooting last month at a naval air station in Pensacola, Fla., brought in the spotlight the issue of iOS security: attorney General William P. Barr requested Apple to provide access to two phones used by the killer.… read more »
  • Security researcher found a hardcoded SSH Key in Fortinet SIEM appliances

    Security researcher Andrew Klaus, from Cybera, discovered a hardcoded SSH public key in Fortinet’s Security Information and Event Management FortiSIEM that can be used in order to generate a denial of service against the FortiSIEM Supervisor. Fortinet devices share the… read more »
  • My Weekly RoundUp #123

    Just some stuff i read in the last seven days... Cybersecurity Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking A vulnerability (CVE-2019-19494) in Broadcom‘s cable modem firmware can open unknown millions of broadband modems by various manufacturers… read more »
  • CVE-2020-0601: a critical Windows vulnerability discovered by...NSA!

    Recently, Microsoft released a patch that fixes a critical vulnerability in the Windows' crypto library. According to the advisory [1]: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit… read more »
  • Some thoughts about "Shift Left" security in DevSecOps

    A popular term in DevOps context is “shift left”: it refers to the effort by a DevOps team to implement measures to guarantee application quality at the most early point in the software development life cycle. In a application security context,… read more »