101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

542
active users

#bootkits

0 posts0 participants0 posts today
Winbuzzer<p>Researchers have identified “Bootkitty,” the first known UEFI bootkit developed to target Linux systems. <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/bootkitty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkitty</span></a> <a href="https://mastodon.social/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkits</span></a> </p><p><a href="https://buff.ly/4eTjEHi" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/4eTjEHi</span><span class="invisible"></span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://squirrelmob.com/@bedast" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bedast</span></a></span> My problem is that these people <em>refuse</em> to take the <em>correct consequences</em> and migrate away from garbage:</p><ol><li><p>You <em>just don't</em> install such garbage on <a href="https://infosec.space/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a>-esque Systems like <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>!</p></li><li><p><a href="https://infosec.space/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrowdStrike</span></a> is just yet another <a href="https://infosec.space/tags/Scareware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scareware</span></a> <a href="https://infosec.space/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a>.</p></li><li><p>The entire business model of <a href="https://infosec.space/tags/AntiVirus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AntiVirus</span></a> and other Scareware shouldn't exist to begin with.</p></li><li><p>3rd party <a href="https://infosec.space/tags/BinaryBlobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BinaryBlobs</span></a> on a non-<a href="https://infosec.space/tags/FLOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FLOSS</span></a>'d kernel are just bad!</p></li><li><p>It should be <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>'s sole tesponsibility to just not allow <a href="https://infosec.space/tags/Rootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rootkits</span></a> / <a href="https://infosec.space/tags/Bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bootkits</span></a> like that to exist eith their blessing aka. <a href="https://infosec.space/tags/Signature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signature</span></a> on.</p></li><li><p><a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> &amp; <a href="https://infosec.space/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> are unbelieveably <a href="https://infosec.space/tags/cursed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cursed</span></a> and unmaintainable mess that'll make even <a href="https://infosec.space/tags/Solaris" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Solaris</span></a> 7 look clean and sleek.</p></li><li><p>The diversity of Linux and Unix-esque distros like <a href="https://infosec.space/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a>'s make it basically impossible to bmhave such a giant and direct effect.</p></li><li><p>The whole issue should've been avoided throug extensive testing because it's certainly so rampant that it would've been picked up by <a href="https://infosec.space/tags/QA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QA</span></a> testers.</p></li><li><p>The fuckedup-ness of <a href="https://infosec.space/tags/CensorBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CensorBoot</span></a> aka. <em>"<a href="https://infosec.space/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a>"</em> (which is insecure af - see <a href="https://infosec.space/tags/GoldenKeyBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoldenKeyBoot</span></a>!) is the reason why this results in such catastrophic failures, whereas on <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> one just uses <a href="https://infosec.space/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> and can easily recover files.</p></li><li><p>Most Windows users &amp; -<a href="https://infosec.space/tags/sysadmins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmins</span></a> neglect <a href="https://infosec.space/tags/Backups" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backups</span></a> of Windows machines because there is no good way to backup them!</p></li><li><p>3rd party kernel binaryblobs are <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>, regardless if <em>"Anti-Malware"</em> or <em>"<a href="https://infosec.space/tags/AntiCheat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AntiCheat</span></a>"</em> is the claimed functionality.</p></li><li><p>If I don't trust <a href="https://infosec.space/tags/WindowsDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsDefender</span></a> then I don't trust Windows or rather Microsoft and thus have to cease using it!</p></li><li><p><a href="https://nondeterministic.computer/@mjg59/112816011370924959" rel="nofollow noopener" target="_blank">This shit would not have been possible under Linux</a>!</p></li></ol>
IT News<p>Critical vulnerability affecting most Linux distros allows for bootkits - Enlarge </p><p>Linux developers are in the process of patching a hig... - <a href="https://arstechnica.com/?p=2001542" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2001542</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkits</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://schleuss.online/tags/shim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shim</span></a> <a href="https://schleuss.online/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a></p>
Porquerias | 1312 🏴🌵G@K<p>The <a href="https://kolektiva.social/tags/LogoFail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LogoFail</span></a> <a href="https://kolektiva.social/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://kolektiva.social/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> is a perfect example of how capitalism fucks everything up. So many people worked so hard on securing UEFI against <a href="https://kolektiva.social/tags/bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkits</span></a> but having a goddamn image load was necessary for capitalist "intellectual property" to be enforced, thus opening this vulnerability for literally every Windows and Linux system with a hardware manufacturer logo loading in boot, which is most of them. <a href="https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2023/</span><span class="invisible">12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/</span></a></p><p>This isn't a security fail, it's a <a href="https://kolektiva.social/tags/capitalism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>capitalism</span></a> fail, because the social/legal regime of <a href="https://kolektiva.social/tags/intellectualproperty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intellectualproperty</span></a> is actually unnecessary and oppressive, and in this case prevented people from designing secure systems.</p>
Dennis "D.C." Dietrich<p>"Multiple security <a href="https://social.advancedsoftware.engineering/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> collectively named <a href="https://social.advancedsoftware.engineering/tags/LogoFAIL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LogoFAIL</span></a> affect image-parsing components in the <a href="https://social.advancedsoftware.engineering/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver <a href="https://social.advancedsoftware.engineering/tags/bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkits</span></a>." <a href="https://social.advancedsoftware.engineering/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.advancedsoftware.engineering/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a><br><a href="https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/</span></a></p>
IT News<p>Unkillable UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw - Enlarge (credit: Aurich Lawson | Getty Images) </p><p>Researchers on ... - <a href="https://arstechnica.com/?p=1921876" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1921876</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>features</span></a> <a href="https://schleuss.online/tags/bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkits</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a></p>
IT News<p>One of the Internet’s most aggressive threats could take UEFI malware mainstream - Enlarge (credit: Getty Images) <br>One of the Internet’s most aggressive threats has just gotten mean... - <a href="https://arstechnica.com/?p=1727276" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1727276</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/unifiedextensiblefirmwareinterface" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unifiedextensiblefirmwareinterface</span></a> <a href="https://schleuss.online/tags/bootkits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkits</span></a> <a href="https://schleuss.online/tags/trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trickbot</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://schleuss.online/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a></p>