Millions of users choose Bitwarden to protect themselves and their families
2025å¹´8æã«ã¢ã¡ãªã«ã®ã©ã¹ãã¬ã¹ã§éå¬ãããä¸çæå¤§ç´ã®ã»ãã¥ãªãã£ã¤ãã³ãã»DEF CON 33ã§ãéåã³ã³ãã¥ã¼ãã£ã³ã°ããã³ãµã¤ãã¼ã»ãã¥ãªãã£ã®ç¬¬ä¸äººè ã¨ãã¦ç¥ãããã³ã³ã¹ã¿ã³ãã£ãã¹ã»ã«ã©ã®ã¢ãã¹æ°ããããã¹ãéåãããã¯ï¼æå·è§£èªã¯ãã¤å§ã¾ãã®ããæ¤ç¥ã¯å¯è½ãï¼ãã¨ãããã¬ã¼ã³ãã¼ã·ã§ã³ã宿½ãã¾ããã DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis - YouTube éåã³ã³ãã¥ã¼ã¿ã¼ãRSAæå·ãæ¥åæ²ç·æå·(ECC)ãè§£èªãã¦ãã¾ãæ¥ã¯é ãããã¾ããããã®ãããã¢ã¡ãªã«å½ç«æ¨æºæè¡ç ç©¶æ(NIST)ã¯ã2035å¹´ã¾ã§ã«ãã¹ãéåæå·ã¸ã®ç§»è¡å®äºããæ¨å¥¨ãã¦ãã¾ãããå®éã«ã¯ãã¨5å¹´ããç¶äºã¯ãªãå¯è½æ§ãããã¾ãã ã«ã©
ã¯ããã« Tauri v2 ã«ãã¼ã¸ã§ã³ãä¸ãããã¢ãã¤ã« (iOS/Android) 対å¿ãæ£å¼ã«ãµãã¼ããããã ã¾ãããã©ã°ã¤ã³ã«é¢ãã¦å¤§å¹ ãªãµãã¼ã夿´ããããTauri ã®ã³ã¢é¨åã¾ã§ã¢ã¯ã»ã¹ã§ãããã®ã使ã§ããããã«ãªã£ãã ããã¦ãTauri v1 ã®å¦ã³ãããé«åº¦ãªã»ãã¥ãªãã£ãµãã¼ããæç¢ºã«ãªã£ã¦ãããããã㦠Tauri v2 ã®ã»ãã¥ãªãã£ãµãã¼ãã¯å¤§å¹ ãªå¤æ´ã¨å¯¾å¿æ¡å¼µãè¡ãããã¨ããçµç·¯ãããã å ¬å¼ããã¥ã¡ã³ã ã¾ãã¯å ¬å¼ããã¥ã¡ã³ãããºããã ãããèªã¿è§£ãã¤ã¤ãç¹ã«æ³¨æããããèªåã使ãã¨ãã«ã©ãè¨å®ããã°ããããèããªããã¾ã¨ãã¦ããã ãã©ã¹ãå¢ç (Trust Boundaries) ãæèãã ãã©ã¹ãå¢ç (Trust Boundaries/ãã©ã¹ããã¦ã³ããª) ã¯ãããã°ã©ã ãã¼ã¿ãå®è¡ããä¿¡é ¼ãã®ã¬ãã«ã夿´ããå¢çãã¾ãã¯ç°ãªãæ©è½ãæã¤2ã¤
ã»ãã¥ãªãã£ä¼æ¥ã®Tarlogic Securityããæ°ç¾ä¸å°ã®IoT端æ«ã«æè¼ããã¦ããWi-Fiæ¥ç¶ã»Bluetoothæ¥ç¶ç¨ã®ESP32ãããã«ãå人æ å ±ãçã¿åãç®çã§æªç¨å¯è½ãªé ãæ©è½ãããã¨å ±åãã¾ããã Tarlogic detects a hidden feature in the mass-market ESP32 chip that could infect millions of IoT devices https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ ãã®çºè¦ã¯ãã¹ãã¤ã³ã»ãããªã¼ãã§éå¬ãããã»ãã¥ãªãã£ã«ã³ãã¡ã¬ã³ã¹ãRootedCONãã§çºè¡¨ããã¾ããã Tarlogic Securityã«ããã¨ãBluetoothè¦æ ¼ã«é¢ããç ç©¶ãé²ããä¸ã§çºè¦ãããã®ã ããã§ãã å
次ã®ã¹ãããã使ç¨ãã¦ãAmazon EC2 ã§ UEFI å®å ¨ãã¼ã ãæå¹ã«ãªã£ã¦ãããã©ããã確èªã§ãã¾ãã Linux ã¤ã³ã¹ã¿ã³ã¹ã UEFI å®å ¨ãã¼ã ã«å¯¾ãã¦æå¹ã«ãªã£ã¦ãããã©ããã確èªããã«ã¯ mokutil ã¦ãã£ãªãã£ã使ç¨ã§ãã¾ããmokutil ãã¤ã³ã¹ã¿ã³ã¹ã«ã¤ã³ã¹ãã¼ã«ããã¦ããªãå ´åã¯ããããã¤ã³ã¹ãã¼ã«ããå¿ è¦ãããã¾ããAmazon Linux 2 ã®ã¤ã³ã¹ãã¼ã«ã¹ãããã«ã¤ãã¦ã¯ããFind and install software packages on an Amazon Linux 2 instanceããåç §ãã¦ãã ããããã®ä»ã® Linux ãã£ã¹ããªãã¥ã¼ã·ã§ã³ã«ã¤ãã¦ã¯ãããããã®åå¥ã®ããã¥ã¡ã³ããåç §ãã¦ãã ããã Linux ã¤ã³ã¹ã¿ã³ã¹ã UEFI å®å ¨ãã¼ã ã«å¯¾ãã¦æå¹ã«ãªã£ã¦ãããã©ããã確èªããã«ã¯ ã¤ã³ã¹ã¿ã³ã¹ã«æ¥ç¶ã
ãChatGPTããªã©åºã使ããã¦ããAIãµã¼ãã¹ã¯ãé常ã§ããã°ã»ã¼ããã£ãããããã¦ãã¦ããäººãæ®ºãæ¹æ³ããçå¼¾ãã¤ããæ¹æ³ãã¨ãã£ãå«ççã«åé¡ã®ãã質åã«ã¯çããªãããã«ãªã£ã¦ãã¾ããã¨ãããããã¾ãã«ãå¤ã質åãä¸åº¦ã«ã¶ã¤ãã¦ãã¾ããã¨ã«ããã»ã¼ããã£ãå¤ããAIãåé¡ã®ããåçãè¡ã£ã¦ãã¾ãå¯è½æ§ããããã¨ããããã¾ããã Many-shot jailbreaking \ Anthropic https://www.anthropic.com/research/many-shot-jailbreaking å¤§è¦æ¨¡è¨èªã¢ãã«(LLM)ã¯ãã¢ãã«ã®å·æ°ã¨å ±ã«ã³ã³ããã¹ãã¦ã£ã³ãã¦(æ±ããæ å ±é)ãå¢å ãã¦ãããè¨äºä½ææç¹ã§ã¯é·ç·¨å°èª¬æ°åå(100ä¸ãã¼ã¯ã³ä»¥ä¸)ãåãæ±ããã¢ãã«ãåå¨ãã¾ãã 大éã®æ å ±ãæ±ããã¨ããã®ã¯ã¦ã¼ã¶ã¼ã«ã¨ã£ã¦å©ç¹ã«ãªãã¾ããã大éã®æ å ±ãæ±ããã¨ã«ã
ç±³ãã¯ã¤ããã¦ã¹ãå°æ¥ã®ã½ããã¦ã§ã¢ã¯ã¡ã¢ãªå®å ¨ã«ãªãã¹ããã¨å£°æçºè¡¨ãã½ããã¦ã§ã¢ã³ãã¥ããã£ã«å¼ã³ãã ç±³ãã¯ã¤ããã¦ã¹ã®å½å®¶ãµã¤ãã¼å±é·å®¤ï¼The White House Office of the National Cyber Directorï¼ONCDï¼ã¯ããµã¤ãã¼ç©ºéã«ãããæ»æå¯¾è±¡é åãç©æ¥µçã«åæ¸ããç®çã§ããã¯ããã¸ã¼ã³ãã¥ããã£ãã½ããã¦ã§ã¢ã³ãã¥ããã£ã«å¯¾ãã¦ã¡ã¢ãªå®å ¨ï¼Memory Safeï¼ãªã½ããã¦ã§ã¢ã®å®ç¾ãç©æ¥µçã«å¼ã³ããããã¬ã¹ãªãªã¼ã¹ãFuture Software Should Be Memory Safeãï¼å°æ¥ã®ã½ããã¦ã§ã¢ã¯ã¡ã¢ãªå®å ¨ã«ãªãã¹ãï¼ãçºè¡¨ãã¾ããã ãã¬ã¹ãªãªã¼ã¹ã®ä¸ã§ãå½å®¶ãµã¤ãã¼å±é·Harry Cokeræ°ã¯ãç§ãã¡ã¯å½å®¶ã¨ãã¦ããµã¤ãã¼ã¹ãã¼ã¹ã«ãããæ»æå¯¾è±¡é åãæ¸ããããããã種é¡ã®ã»ãã¥ãªãã£ãã°ããã¸ã¿ã«ã¨ã³ã·ã¹ãã ã«
ä¸å½åºå¼µã§PCã¯âè身é¢ããâã§ãªããã°ãããªãããªãï¼ï¼ä¸çãèªã¿è§£ããã¥ã¼ã¹ã»ãµãã³ï¼1/5 ãã¼ã¸ï¼ 2æä¸æ¬ãããçè ã¯åæã®ããã«ã¤ã¹ã©ã¨ã«ã¨ãã¬ã¹ããèªæ²»åºã¬ã¶å¨è¾ºã訪åããããã®åæã§ç¥ãåã£ãå¤å½äººè¨è ããç¾å ´ã§éãããªããã¯ããã¯ãèè² ã£ã¦ããã®ã§è©±ããããã¨ããæµ·å¤åºå¼µã¯å¤ããã©ãã©ãã«è¡ã£ã¦ãPCãªã©ãã¸ã¿ã«ããã¤ã¹ã¯æãã¦ããã«ã«ç½®ãã¦ãããªããã ãã¨è¨ãã å®ã¯ãµã¤ãã¼ã»ãã¥ãªãã£ãã¤ã³ããªã¸ã§ã³ã¹ãåæã»ç ç©¶ãã¦ããçè ãããã®ãç¿æ§ãã¯åãã ãã©ãã¸åºå¼µã«è¡ã£ã¦ãPCãªã©ã¯å¸¸ã«æã¡æ©ãã¦ããã ããã¦æè¿ããããªç¿æ§ãæ£ããã£ããã¨ãæ¹ãã¦ç¢ºèªãããããæ å ±ãé£ã³è¾¼ãã§ãããããæ¥æ¬æ¿åºé¢ä¿è ãè¨ãããã¾ã å ¬è¡¨ããã¦ããªãããæ¨å¹´ãä¸å½ã«åºå¼µã«è¡ã£ãä¸å¤®çåºã®è·å¡3äººãæ å ±çªåå·¥ä½ã®è¢«å®³ãåããã¨ãã¦æè¿è©±é¡ã«ãªã£ã¦ããã ãã®è©±ã詳ããèãã¦ããã¨ãæå£ã¯é
SSHã¯æå·ãèªè¨¼æè¡ãå©ç¨ãã¦å®å ¨ã«ãªã¢ã¼ãã³ã³ãã¥ã¼ã¿ã¨éä¿¡ããããã®ãããã³ã«ã§ããããã®éä¿¡ã®éå§æã«è¡ãRSAç½²åã®éã«è¨ç®ã¨ã©ã¼ãçºçããã¨SSHç§å¯éµãè§£æããã¦ãã¾ããã¨ãå®è¨¼ããã¾ããã (PDF)Passive SSH Key Compromise via Lattices https://eprint.iacr.org/2023/1711.pdf In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica https://arstechnica.com/security/2023/11/hackers-can-steal-ssh-cryptographic-keys-in-new-cutting-edge-attack/ SSHã§ã¯æ¥ç¶æã«ã¦
Downfall attacks target a critical weakness found in billions of modern processors used in personal and cloud computers. This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer. For instance, a malicious app obtained from an app store could use the Downfall attack to steal sensitive information like passwords, encryptio
Gather Data Sampling (GDS) is a transient execution side channel vulnerability affecting certain Intel processors. In some situations when a gather instruction performs certain loads from memory, it may be possible for a malicious attacker to use this type of instruction to infer stale data from previously used vector registers1. Â These entries may correspond to registers previously used by the sa
If you remove the first word from the string "hello world", what should the result be? This is the story of how we discovered that the answer could be your root password! Introduction All x86-64 CPUs have a set of 128-bit vector registers called the XMM registers. You can never have enough bits, so recent CPUs have extended the width of those registers up to 256-bit and even 512-bits. The 256-bit
ããã¹ãã¼ãã¯å種ã¦ã§ããµã¤ãã«ãã¹ã¯ã¼ãä¸è¦ã§ãã°ã¤ã³ã§ããããã«ããä»çµã¿ã§ãAppleãGoogleãMicrosoftã¨ãã£ã大æãã¯ããã¸ã¼ä¼æ¥ãå©ç¨ãæ¨é²ãã¦ãã¾ããããããä½¿ãæ¹ã誤ãã¨YubiKeyãªã©ã®ãã¼ãã¦ã§ã¢èªè¨¼ããã¤ã¹ã使ãç©ã«ãªããªããªã£ã¦ãã¾ãã¨ãã¦ãRustã®WebAuthnã©ã¤ãã©ãªã使ãã¦ããã¦ã£ãªã¢ã ã»ãã©ã¦ã³ãããæ³¨æãä¿ãã¦ãã¾ãã Firstyear's blog-a-log https://fy.blackhats.net.au/blog/2023-02-02-how-hype-will-turn-your-security-key-into-junk/ ãã¹ãã¼ã®èªè¨¼ã®ä»çµã¿ã«ã¯ãã¯ã©ã¤ã¢ã³ãå´ã«éµãä¿åããªãæ¹æ³ã¨ãã¯ã©ã¤ã¢ã³ãå´ã«éµãä¿åããæ¹æ³ã®2種é¡ãåå¨ãã¦ãã¾ããã¯ã©ã¤ã¢ã³ãå´ã«éµãä¿åããªãå ´åããããããèªè¨¼ã«å©ç¨ããéµãç
1 Introduction Compilers, assemblers and similar tools generate all the binary code that processors execute. It is no surprise then that these tools play a major role in security analysis and hardening of relevant binary code. Often the only practical way to protect all binaries with a particular security hardening method is to have the compiler do it. And, with software security becoming more and
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã¡ã³ããã³ã¹
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}