eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

211
active users

#vulnerabilities

2 posts2 participants0 posts today

Firmware flaws in 240+ Gigabyte motherboards (2017–2021) could allow stealth malware to bypass Secure Boot and take full control. ⚠️🛡️

Fixes exist, but nearly half the boards are unsupported due to EOL status—leaving many users exposed. 💻❌
Check for updates or consider replacing hardware.

@techspot

techspot.com/news/108688-firmw

TechSpot · Firmware flaws in over 200 Gigabyte motherboards could lead to undetectable malwareBy Skye Jacobs

DATE: July 03, 2025 at 04:50PM
SOURCE: HEALTHCARE INFO SECURITY

Direct article link at end of text block below.

The #FDA says that #cyber #vulnerabilities - including a hidden #backdoor - involving certain patient monitoring devices made by #China-based #Contec have a patch to fix the issues.
But for some users, applying the patch won't be easy, the FDA warns.
t.co/4Xphw2IvXt

Here are any URLs found in the article text:

t.co/4Xphw2IvXt

Articles can be found by scrolling down the page at healthcareinfosecurity.com/ under the title "Latest"

-------------------------------------------------

Private, vetted email list for mental health professionals: clinicians-exchange.org

Healthcare security & privacy posts not related to IT or infosec are at @HIPAABot . Even so, they mix in some infosec with the legal & regulatory information.

-------------------------------------------------

#security #healthcare #doctors #itsecurity #hacking #doxxing #psychotherapy #securitynews #psychotherapist #mentalhealth #psychiatry #hospital #socialwork #datasecurity #webbeacons #cookies #HIPAA #privacy #datanalytics #healthcaresecurity #healthitsecurity #patientrecords @infosec #telehealth #netneutrality #socialengineering

(Maybe intentional, maybe unintentional) deceptive advisories 101: certvde.com/en/advisories/VDE- .

The actual vulns here are OS command injection issues (CWE-78). The webapp just so happens to be vulnerable to CSRF too, so they use CWE-352, but honestly nobody in their right mind gives a crap about CSRF as a top priority item.

There are multiple ways to exploit the bugs. The score/vector in the advisory is technically correct, but you could also exploit the bug (or series of bugs) as 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) or 9.9 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) depending on the privilege required to do the OS command injection. But honestly the 'what privilege required' becomes moot when you search the user manual for default credentials....

Whether the deception is intentional or not, who knows, it is what it is. Attackers are never* gonna use CSRF, but they are absolutely positively going to abuse command injection (even authenticated command injection), especially against devices which has 1) a cellular modem and 2) published default credentials that are incredibly easy to learn.

This is all an example of the fact that CVSS does not score a vulnerability, but rather scores one exploitation method of a vulnerability. There are often multiple ways to interpret 'a vuln'. In this case the advisory probably should have reserved more CVEs anyway: some to cover the CSRF, and others to cover the command injection bugs (the fixes for each are most likely distinct code changes, so worthy of independent CVEs, but I digress).

And sorry for the sales pitch: this is the kind of thing that we manually review all week, every week, and publish details about in our Worldview reports: dragos.com/dragos-worldview/

certvde.comVDE-2025-052 | CERT@VDEAdvisories

Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser

“Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what’s possible. The US was the most affected region, with around 14,000 of the total feeds streami ...continues

See gadgeteer.co.za/peep-show-40k-

GadgeteerZA · Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser“Security researchers managed to access the live feeds of 40,000 internet-connected cameras worldwide and they may have only scratched the surface of what's

🔥 Latest issue of my curated #cybersecurity and #infosec list of resources for week #23/2025 is out!

It includes the following and much more:

🇫🇷 Cartier announced a #databreach;

🫱🏻‍🫲🏼 Microsoft and CrowdStrike are working together to connect the different names used for hacking groups;

🇩🇪 German authorities have identified Vitaly Nikolaevich Kovalev as the leader of the #TrickBot cybercrime gang;

🩹 🐛 Over 30 #Vulnerabilities Patched in #Android;

🇪🇺 Microsoft has launched a free European Security Program to enhance cybersecurity for #EU governments;

🇮🇳 #Microsoft Helps India CBI Dismantle Indian Call Centers;

📨 Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s InfoSec Newsletter🕵🏻‍♂️ [InfoSec MASHUP] 23/2025Cartier announced a data breach; Microsoft and CrowdStrike are working together to connect the different names used for hacking groups; German authorities have identified Vitaly Nikolaevich Kovalev as the leader of the TrickBot cybercrime gang; Over 30 Vulnerabilities Patched in Android; Microsoft has launched a free European Security Program to enhance cybersecurity for EU governments; Microsoft Helps India CBI Dismantle Indian Call Centers;