PKfail Vulnerability Allows Secure Boot Bypass on Hundreds of Computer Models 

July 26, 2024 at 05:51AM Binarly has identified a security vulnerability named “PKfail,” centered around an exposed American Megatrends International Platform Key (PK), utilized as a Secure Boot private key. This flaw, found in hundreds of computer models from various manufacturers, allows attackers to sign and execute malicious code during the device’s boot process, potentially … Read more

PKfail Secure Boot bypass lets attackers install UEFI malware

July 25, 2024 at 05:45PM UEFI products from 10 vendors are vulnerable to compromise due to a critical firmware supply-chain issue called PKfail, allowing attackers to bypass Secure Boot and install malware. The affected devices use a test Secure Boot master key from American Megatrends International, which often remains untrusted by OEMs. Vendors are advised … Read more

DHS Inspector General: Coast Guard Shortcomings Hinder US Maritime Security

July 19, 2024 at 10:35AM The Coast Guard struggles to secure the US maritime supply chain due to inadequate staffing, training, authority, and cyber expertise. A new report highlights the industry’s reluctance to seek cybersecurity support, blaming the Coast Guard for not fully addressing potential cybersecurity threats. While the Coast Guard has the authority to … Read more

MxD Research Reveals Major Disconnect Between Perceived and Actual Cybersecurity Capabilities in US Manufacturing

July 17, 2024 at 04:55PM The report from MxD and the National Center for Cybersecurity in Manufacturing highlights the urgent need for the U.S. manufacturing sector to enhance its cybersecurity posture. It reveals that manufacturers are overestimating their capabilities and identifies key areas where additional resources can strengthen cybersecurity infrastructure. The report also emphasizes the … Read more

Top 5 Mistakes Businesses Make When Implementing Zero Trust

July 17, 2024 at 04:40PM The press release highlights the growing trend of organizations adopting Zero Trust architectures in response to evolving cybersecurity threats. It emphasizes the challenges and common mistakes organizations face when implementing these strategies, such as overlooking organizational culture, underestimating human risk, neglecting the supply chain, failing to plan for sustainable success, … Read more

60 New Malicious Packages Uncovered in NuGet Supply Chain Attack

July 11, 2024 at 11:49AM Threat actors have launched a new wave of malicious packages on the NuGet package manager, using a sophisticated approach to evade detection. The 60 fresh packages demonstrate a refined strategy, employing IL weaving to inject malicious functionality into legitimate .NET binaries. The end goal is to deliver a remote access … Read more

Saviynt Expands Capabilities With EY Alliance, Elevating Approach to External User Management With its Identity Cloud

July 10, 2024 at 05:17PM Saviynt announced a collaboration with EY to manage third-party identities and simplify external staff administration. The joint effort will enable improved on-boarding, administration, and risk management for external workforce and suppliers. Saviynt’s Identity Cloud platform will help address challenges in managing external identities, providing a more streamlined and secure process. … Read more

Polyfill Supply Chain Attack Hits Over 100k Websites 

June 26, 2024 at 07:07AM Over 100,000 websites have been targeted by a supply chain attack injecting malware through a Polyfill domain, as reported by SecurityWeek. Based on the meeting notes, it appears that a supply chain attack involving the injection of malware through a Polyfill domain has impacted over 100,000 websites. This information was … Read more

Practical Guidance For Securing Your Software Supply Chain

June 26, 2024 at 06:57AM Software-producing organizations are facing increasing regulatory and legal pressure to secure their supply chains and protect their software integrity. The software supply chain has become a prime target for attackers, as seen in the Log4j breach. To address these security challenges, organizations should consider various measures, including governing the software … Read more

High-Risk Overflow Bug in Intel Chips Likely Impacts 100s of PC Models

June 20, 2024 at 05:10PM A critical vulnerability, CVE-2024-0762 “UEFIcanhazbufferoverflow,” affecting Intel processors has been detailed by Eclypsium researchers. The flaw in UEFI firmware may allow attackers to gain unauthorized access and execute malicious code. The widespread impact on various PC models running SecureCore firmware adds complexity to patching efforts, leaving organizations vulnerable until fixes … Read more