1
111
submitted 15 hours ago* (last edited 14 hours ago) by lwCET to c/communityspotlight

Hello World,

This week's Community Spotlights are:

LW Community: Forgotten Weapons ([email protected]) - A community dedicated to discussion around historical arms, mechanically unique arms, and Ian McCollum’s Forgotten Weapons content.
Mod(s): @[email protected]


Fediverse Community: Aneurysm Posting ([email protected]) - For shitposting by people who can smell burnt toast.
Mod(s): @[email protected]


How to submit a community you would like to see spotlighted

Comment on any Weekly Spotlight post or suggest a community on our Discord server in the community-spotlight channel. You can also send a message to the Community Team with your suggestions.

2
74
Radical Honesty (mander.xyz)
submitted 35 minutes ago by [email protected] to c/[email protected]
3
34
submitted 25 minutes ago by [email protected] to c/linuxmemes

An oldie, but a goodie

4
62
rule (lemmy.blahaj.zone)
submitted 54 minutes ago by [email protected] to c/[email protected]
5
44
submitted 47 minutes ago by BigDaddySlim to c/mildlyinfuriating

I already have the desktop app, what difference should this even make? Pointless gatekeeping by the devs

6
18
submitted 24 minutes ago by PeleSpirit to c/politics
7
24
submitted 40 minutes ago by [email protected] to c/[email protected]
8
17
submitted 38 minutes ago by FireTower to c/forgottenweapons
9
178
submitted 1 hour ago by return2ozma to c/news
10
11
submitted 27 minutes ago by PeleSpirit to c/politics
11
8
submitted 19 minutes ago by [email protected] to c/[email protected]
12
15
submitted 35 minutes ago by PeleSpirit to c/politics
13
66
submitted 1 hour ago by L4s to c/technology

Tesla Whistleblower Says 'Autopilot' System Is Not Safe Enough To Be Used On Public Roads::"It affects all of us because we are essentially experiments in public roads."

14
7
submitted 18 minutes ago* (last edited 16 minutes ago) by [email protected] to c/[email protected]
15
7
submitted 21 minutes ago by [email protected] to c/[email protected]
16
4
submitted 12 minutes ago by DougHolland to c/thepoliceproblem
17
18
submitted 50 minutes ago by [email protected] to c/technology

Firmware security company Binarly on Wednesday disclosed the details of an attack method that can be used to compromise many consumer and enterprise devices by leveraging malicious UEFI logo images.

The attack method, dubbed LogoFAIL, exploits vulnerabilities in the image parsers used by the UEFI firmware to display logos during the boot process or in the BIOS setup. Getting the affected parsers to process a specially crafted image can enable the attacker to hijack the execution flow and run arbitrary code.

Hackers can use the LogoFAIL attack to compromise the entire system and bypass security measures such as Secure Boot.

“These vulnerabilities can compromise the entire system’s security, rendering ‘below-the-OS’ security measures like any shade of Secure Boot ineffective, including Intel Boot Guard. This level of compromise means attackers can gain deep control over the affected systems,” Binarly explained.

Binarly’s analysis showed that UEFI vendors use various types of parsers for BMP, PNG, JPEG, GIF and other types of images. The security firm’s research targeted firmware from Insyde, AMI and Phoenix and led to the discovery of two dozen vulnerabilities, more than half of which have been assigned a ‘high severity’ rating.

The impacted firmware is shipped with hundreds of consumer and enterprise computer models — including x86 and ARM-based devices — made by companies such as Acer, Dell, Framework, Fujitsu, Gigabyte, HP, Intel, Lenovo, MSI, Samsung, and Supermicro. This means millions of devices worldwide could be exposed to attacks.

A LogoFAIL attack can be launched by abusing the firmware update procedure to replace the legitimate logo with a malicious version. Attacks through physical access may also be possible, using an SPI flash programmer, assuming that the logo is not protected by hardware verified boot technologies.

Some vendors — this includes Intel, Acer and Lenovo — offer features that enable users to customize the logos displayed during boot, which can make it possible to launch LogoFAIL attacks from the OS, without the need for physical access to the device.

It’s important to note that while image parser vulnerabilities have been found in devices from all of the aforementioned vendors, they cannot always be exploited. In Dell’s case, for instance, the logo is protected by Intel Boot Guard, which prevents its replacement even if the attacker has physical access to the targeted system. In addition, Dell does not offer any logo customization features.

Details of the attack were presented by Binarly at the Black Hat Europe conference on Wednesday, and the company has published a technical blog post describing its findings.

The security firm has published a video showing a proof-of-concept (PoC) LogoFAIL exploit in action, demonstrating how an attacker who has admin permissions on the operating system can escalate privileges to the firmware level.

The vulnerabilities were reported to impacted vendors through CERT/CC several months ago, but it can take a lot of time for patches for these types of security holes to reach end devices, even if vendors create the fixes.

18
5
submitted 18 minutes ago by [email protected] to c/[email protected]

Ryan Cohen became chairman on June 9 2021.

How has the company's financial standing change since then?

19
21
submitted 55 minutes ago by [email protected] to c/[email protected]
20
3
submitted 8 minutes ago by [email protected] to c/[email protected]

Although legal, the time frame and approach seems designed to shield the company from negligence.

21
3
submitted 4 minutes ago by [email protected] to c/[email protected]
22
3
6 December 1986 (sh.itjust.works)
submitted 5 minutes ago by [email protected] to c/calvinandhobbes
23
135
submitted 1 hour ago by [email protected] to c/[email protected]
24
7
submitted 36 minutes ago by afraid_of_zombies to c/handmade

550 paracord, simple cobra braid, bic lighter, singer brand scissors.

25
2
submitted 8 minutes ago by [email protected] to c/[email protected]
view more: next ›

Lemmy.World

144,085 readers
2,419 users here now

The World's Internet Frontpage Lemmy.World is a general-purpose Lemmy instance of various topics, for the entire world to use.

Be polite and follow the rules (https://legal.lemmy.world/fair-use/).

Get started

See the Getting Started Guide

Donations 💗

If you would like to make a donation to support the cost of running this platform, please do so at the mastodon.world donation URLs:

LW Legal & Help Center

(https://lemmy.world/legal)

Join the team 😎

Check out our team page to join

Questions / Issues

More Lemmy.World

Mastodon Follow

Discord

Matrix

Alternative UIs

Monitoring / Stats 🌐

Open Collective backers and sponsors

founded 6 months ago
ADMINS