Mozilla Just Doubled Its Payouts As It Tries To Attract Software Vulnerability Hunters
RSA BSAFE Crypto Attacks / Denial Of Service
RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, SSL-J and SSL-C all suffer from various crypto, denial of service, and underflow vulnerabilities.
RSA BSAFE Lenstra's Attack
RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, and SSL-J contain a fix to address Lenstra's attack. RSA BSAFE Micro Edition Suite (MES) 4.1.5, RSA BSAFE Crypto-C Micro Edition (CCME) 4.1.3, RSA BSAFE Crypto-J 6.2.1, and RSA BSAFE SSL-J 6.2.1 are affected.
Android Securty Research: Crypto Local Storage Attack
Whale Win32 Attack Surface Toolkit
Whale in a win32 attack surface toolkit written in C#. It's capable of monitoring many of different areas of the Windows for new and removed kernel objects, open ports, drivers, services and much more. It also allows a user to test for different bug classes and has found a few interesting issues across the sub-systems.
Mandos Encrypted File System Unattended Reboot Utility 1.8.10
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
Phrack - Attacking JavaScript Engines
Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622.
Half Of Industrial Control System Networks Have Faced Cyber Attacks, Say Security Researchers
SWAPGS Attack Proof Of Concept
SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel.