Security at the Edge
CrowdStrike Sued? — Delta Dials David Boies
Richi Jennings | | CrowdStrike, CrowdStrike Falcon, CrowdStrike incident;, Delta Airlines, falcon, SB Blogwatch
Is Delta the First of Many? Airline calls in attorneys Boies Schiller Flexner to claw back its cash ...
Security Boulevard
PKfail: 800+ Major PC Models have Insecure ‘Secure Boot’
Richi Jennings | | Binarly, BIOS, BIOS update, Certificate and Key Management, hardware supply chain, key management, Key Management Problem, PKfail, Private Key Management, SB Blogwatch, secure boot, UEFI, UEFI Failing, UEFI firmware, UEFI vulnerabilities, Unified Extensible Firmware Interface (UEFI)
Big BIOS bother: Hundreds of PC models from vendors such as HP, Lenovo, Dell, Intel, Acer and Gigabyte shipped with useless boot protection—using private keys that aren’t private ...
Security Boulevard
CrowdStrike Admits it Doesn’t ‘Canary’ Test all Updates
Richi Jennings | | canary deployment, CrowdStrike, CrowdStrike Falcon, CrowdStrike Falcon XDR, Downtime and outages, outage, Outage Investigation, SB Blogwatch
Corporate incompetence: Beleaguered security firm issues initial post-mortem on Friday’s faux pas ...
Security Boulevard
EFF Angry as Google Keeps 3rd-Party Cookies in Chrome
Richi Jennings | | adtech, Advertising, Advertising and AdTech, adverts, Chrome, CMA, Competition and Markets Authority, cookie, Cookie Consent, cookieconsent, cookies, Data Privacy, EFF, Electronic Frontier Foundation, FLEDGE, FLoC, GOOG, google, Google Chrome, ICO, information commissioner's office, IP Protection, Privacy, Privacy Sandbox, regulatory capture, SB Blogwatch, Surveillance capitalism, Topics, tracking, tracking cookies, web cookie, zero trust
Regulatory capture by stealth? Google changes its mind about third-party tracking cookies—we’re stuck with them for the foreseeable ...
Security Boulevard
Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity
Joe Nocera | | Cyber Maturity, cyber-risk, Cybersecurity, delivery efficiencies, expense pressure, human capital, increased automation, managed services, managed services provider, predictable fee structures, risk reduction capabilities, security, Threat Detection and Response
A managed service provider must work with each client to determine the level of support needed and improve the service over time to meet changing business needs ...
Security Boulevard
Global Outage Outrage: CrowdStrike Security Tool Blamed
Richi Jennings | | azure, Azure cloud, cloud outage, CrowdStrike, CrowdStrike Falcon, CrowdStrike Falcon XDR, Downtime and outages, m365, Microsoft 365, Microsoft 365 (365), Microsoft 365 outage, Microsoft 365 service outage alert, Microsoft Azure, Microsoft Azure Security, outage, Outage Investigation, SB Blogwatch
BSODs beyond belief: A buggy update to CrowdStrike Falcon made Windows PCs and servers crash—worldwide ...
Security Boulevard
Disney 1.2 TB Slack Hack: NullBulge Claims Leak is its Own
Richi Jennings | | Disney, hacktivism, Hacktivist, Hacktivists, hacktivity, NullBulge, SB Blogwatch, slack, Slack breach
Steamboat bloat: Hacktivist group wields infostealer Trojan, leaks 1,200 GB of mouse droppings ...
Security Boulevard
‘Blast-RADIUS’ Critical Bug Blows Up IT Vacation Plans
Richi Jennings | | blast radius, collision-based-hashing-algorithm-disclosure, CVE-2024-3596, hash, hash algorithms, hash function, hash functions, Man In The Middle, man in the middle attack, man in the middle attacks, maninthemiddleattacks, md5 hash, men-in-the-middle attack, mitm, MitM Attack, mitm attacks, RADIUS, SB Blogwatch
MD5 MITM Muddle: Ancient, widely used protocol has CVSS 9.0 vulnerability ...
Security Boulevard
‘Polyfill’ Supply Chain Threat: 4x Worse Than We Thought
Richi Jennings | | App Sec & Supply Chain Security, AppSec & Supply Chain Security, CloudFlare, Funnull, Javascript, Modern Software Supply Chains, Open Source and Software Supply Chain Risks, open source software supply chain, open source software supply chain security, polyfill, SB Blogwatch, secure software supply chain, software supply chain attack, software supply chain attacks, software supply chain hygiene, software supply chain risk, Software Supply Chain risks, Supply-Chain Insecurity
Spackle attack: Chinese company takes over widely used free web service—almost 400,000 websites at risk ...
Security Boulevard
‘Perfect 10’ Apple Supply Chain Bug — Millions of Apps at Risk of CocoaPods RCE
Richi Jennings | | App Sec & Supply Chain Security, Apple, Apple iOS, AppSec & Supply Chain Security, CocoaPods, CVE-2024-38366, CVE-2024-38368, dependencies, dependency injection, Dependency Management, macos, macOS Security, Modern Software Supply Chains, Open Source and Software Supply Chain Risks, open source software supply chain, open source software supply chain security, SB Blogwatch, software dependencies, Supply-Chain Insecurity, third-party dependencies, trust dependencies
Tim looks grim: 10 year old vulnerabilities in widely used dev tool include a CVSS 10.0 remote code execution bug ...
Security Boulevard