Dave Aitel(@daveaitel) 's Twitter Profileg
Dave Aitel

@daveaitel

Cyber Security Researcher | Policy Analyst | Partner at https://t.co/OpZchMm8Sz | @[email protected]

ID:8371802

linkhttp://www.aitelfoundation.org calendar_today23-08-2007 00:57:41

92,5K Tweets

28,8K Followers

1,6K Following

chrisrohlf(@chrisrohlf) 's Twitter Profile Photo

Dave Aitel Yes and also time to recognize most of the vulnerable functionality in these edge devices is implemented in memory safe languages. I’m good with the push on memory safety but maybe time for a USG campaign for “no more shelling out for developer convenience”.

account_circle
Dave Aitel(@daveaitel) 's Twitter Profile Photo

We don't need software liability. We just need the ability and courage to say 'these boxes are not and were never safe to run on your network. Throw them away immediately'.

account_circle
Dan Black(@DanWBlack) 's Twitter Profile Photo

Over a decade in the making: Sandworm is now APT44.

Below is a thread with some major takeaways and insights from our new report:

cloud.google.com/blog/topics/th…

account_circle
Will Dormann(@wdormann) 's Twitter Profile Photo

Worth noting:
- Fixes have not been released yet.
- This is being exploited in the wild.
- One mitigation is to disable device telemetry. Which I'd like to assume actually blocks the attack vector, as opposed to merely keeping the product owner blissfully ignorant.
Right??

Worth noting: - Fixes have not been released yet. - This is being exploited in the wild. - One mitigation is to disable device telemetry. Which I'd like to assume actually blocks the attack vector, as opposed to merely keeping the product owner blissfully ignorant. Right??
account_circle
Will Dormann(@wdormann) 's Twitter Profile Photo

Brian in Pittsburgh Dave Aitel I love how they use the language that it 'is no longer an effective mitigation'
As in, it used to block the vulnerability at the time of writing it.
But somehow the world changed to make them now wrong.

account_circle
Dave Aitel(@daveaitel) 's Twitter Profile Photo

The USG can't be trustworthy unless they are willing to say things that go against what a vendor wants to hear - sometimes that means acknowledging patching a vulnerability is not the answer.

account_circle
Dave Aitel(@daveaitel) 's Twitter Profile Photo

The idea a vendor would suggest that only configurations with telemetry on were vulnerable and then have to walk that back is amazing. The USG needs to go on record and provide stable advice to people that these boxes should not be used and are not patchable.

account_circle
Justin Elze(@HackingLZ) 's Twitter Profile Photo

Since it's out there now this is what I caught in wild CVE-2024-3400

GET /global-protect/login.esp HTTP/1.1 Host: X User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Accept-Encoding: gzip, deflate, br…

account_circle
Dr. Jason Loxton(@jason_loxton) 's Twitter Profile Photo

This is the craziest paleo story of the year. Hominid mandible in someone's bathroom reno! johnhawks.net/weblog/how-man…

This is the craziest paleo story of the year. Hominid mandible in someone's bathroom reno! johnhawks.net/weblog/how-man…
account_circle
Dave Aitel(@daveaitel) 's Twitter Profile Photo

The whole point of Trump's statement was as a call out to Confederates. It's how the Taliban says 'Sheikh Osama* when talking about Bin Laden.

account_circle
Brian in Pittsburgh(@arekfurt) 's Twitter Profile Photo

So, uhh, you know how Palo-Alto said you were only vulnerable to CVE 2024-3400 if you had GlobalProtect gateway *and* telemetry enabled and therefore you might disable telemetry to protect yourself as an emergency measure?
Yeah.
Turns out that was not, as one might say, correct.

account_circle
Brian in Pittsburgh(@arekfurt) 's Twitter Profile Photo

I love how Palo-Alto says 'Disabling telemetry is no longer an effective mitigation.' As if it *was* an effective mitigation but somehow the nature of the vulnerability spontaneously evolved over the last two days.
🤥🤥🤥🤥

account_circle
Gynvael Coldwind(@gynvael) 's Twitter Profile Photo

One of my issues with most bugbounty programs is that they effectively attempt to buy silence instead of focusing strictly on improving security.
There are notable exceptions, like Google, which applies the 90 day policy to itself as well.

account_circle
Andy Greenberg (@agreenberg at the other places)(@a_greenberg) 's Twitter Profile Photo

A group called Cyber Army of Russia posted videos in which it tampers with control software for US water utilities, a Polish wastewater plant, and a French hydroelectric dam.

Now a report from Mandiant ties the group to Russia's Sandworm hacker group. wired.com/story/cyber-ar…

account_circle
Dan Black(@DanWBlack) 's Twitter Profile Photo

Important to remember: the GRU habitually exaggerates the impact of cyber operations in their IO activity - it's been a core feature extending back to the CyberBerkut era.

Fantastic work shining sunlight on yet another case of that playbook in action here from Le Monde

account_circle
Will Dormann(@wdormann) 's Twitter Profile Photo

What are the consequences of a vendor for a security product choosing to use a feature (shell=true) that's well documented to introduce vulnerabilities?
Oh, right. None.
There aren't any.

What are the consequences of a vendor for a security product choosing to use a feature (shell=true) that's well documented to introduce vulnerabilities? Oh, right. None. There aren't any.
account_circle