The sale and use of surveillance software is largely unregulated and unexamined, but Ron Deibert and his team at the Citizen Lab are working to change that through research into abuses.
Brian Donohue of Red Canary joins Dennis Fisher to discuss the news and insights from Cyberwarcon.
Cloudflare has open sourced Flan Scan, a “lightweight” network vulnerability scanner that it uses in-house to help identify vulnerable services running in its vast network. Early reactions suggest that it shouldn’t be the sole vulnerability management tool being used in the network.
Google is now offering a top bounty of $1 million for a full chain remote code execution exploit that gains persistence on the Titan M chip on Pixel phones.
The United Nations General Assembly will vote on a Russia- and China-backed resolution that claims to give governments tools to fight cybercrime. What it will actually do if it becomes a treaty, is allow governments to establish a sovereign Internet where they have full control of their country's Internet and monitor all activities.
The new AWS IMDSv2 security feature mitigates common attacks that take advantage of SSRF, open WAFs, and open layer 3 firewalls.
Ron Deibert of Citizen Lab joins Dennis Fisher to discuss his team's work on investigating surveillance vendors and helping victims.
Eight out of every 10 adults in the United States worry they cannot control how information about them is being used, found a new study from the Pew Research Center. A equal number of them don't think the rewards of personalized and customized services are worth it.
The Office of the Director of National Intelligence confirmed that the government has stopped collecting phone location data using Section 215 of the Patriot Act.
Security researchers at Graz University of Technology in Austria discovered the fixes for the ZombieLoad speculative execution attacks on Intel processors were not completely effective. The researchers have disclosed a new variant that works on Intel processors that have hardware mitigations in place.
The world is more interconnected than ever, and that network of dependencies means when an organization experiences a security incident, so do other downstream organizations in the supply chain, Cyentia Insitute said in its latest analysis.
Chris Wysopal of Veracode joins Dennis Fisher to dive into the company's new State of Software Security report.
Mozilla, Firefox, and Cloudflare team up to tackle a specific TLS security problem: what to do in CDN and large web deployments where the private key has to be installed on every web server. Delegated credentials are short-lived TLS private keys that are generated by the web server.
The Apple Mail app on the most recent Macs appear to be storing copies of encrypted emails in plaintext, an Apple IT specialist found. There is a way to turn this off, temporarily.
BlueKeep exploits have been seen installing a cryptominer, but Microsoft is warning customers that more damaging attacks could be coming.