Cybersecurity

5965 readers
115 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
1176
1177
1178
1179
1180
1181
 
 

​Security researchers at Tenable discovered what they describe as a high-severity vulnerability in Azure Service Tag that could allow attackers to access customers' private data.

1182
 
 

Researchers have published a proof-of-concept (PoC) exploit script demonstrating a chained remote code execution (RCE) vulnerability on Progress Telerik Report Servers.

1183
1184
1185
1186
1187
1188
 
 

AI platform Hugging Face says that its Spaces platform was breached, allowing hackers to access authentication secrets for its members.

1189
 
 

The vulnerability can be used to deceive a user into inadvertently uploading and integrating incorrect data into the application’s language model.

1190
 
 

Cybersecurity and Infrastructure Security Agency urges affected users to update ASAP.

1191
1192
1193
1194
1195
1196
19
submitted 7 months ago* (last edited 7 months ago) by Kalcifer to c/cybersecurity
 
 

The article says the following:

Linux 6.10 is introducing support for Trusted Platform Module (TPM2) encryption and integrity protections to prevent active/passive interposers from compromising them. This follows a recent security demonstration of TPM key recovery from Microsoft Windows BitLocker being demonstrated. TPM sniffing attacks have also been demonstrated against Linux systems too, thus the additional protections be made with Linux 6.10 to better secure TPM2 modules.

I'm a little confused with this article. Is it talking about implementing TPM parameter encryption? If so, does this mean that the TPM bus prior to kernel v6.10 was unencrypted? Will this kernel feature still require a patch to be made to software like systemd-cryptenroll? Are the sniffing attacks that it's talking about examples of MITM attacks like this? Does windows encrypt the TPM bus?


1197
1198
1199
1200
view more: ‹ prev next ›