Part 2: Source code and related data about device security and encryption.Part 1: Source code and related data about Security/Defense/Knox/Bootloader/TrustedApps.The data was released in three parts, as outlined by Bleeping Computer: While it's true that having the source code itself is not a vulnerability, it can help potential attackers understand how these different components work and identify flaws in their implementations. The data released would be considered highly sensitive to Samsung, and it's possible that it may make it easier for threat actors to identify exploits within the affected components in the future. We have no evidence of ransomware being deployed on the NVIDIA environment or that this is related to the Russia-Ukraine conflict." NVIDIA told The Verge in a statement, "shortly after discovering the incident, we further hardened our network, engaged cybersecurity incident response experts, and notified law enforcement. The same group also reportedly released stolen data from NVIDIA at the end of February, threatening to release more stolen information unless the company removed LHR (which limits how effective they are at mining cryptocurrency) from its graphics cards. hardware cryptography), bootloader source code, code from Qualcomm, Samsung account authorization/authentication code, and more. The leak reportedly includes source code for Trusted Applet (TA) code used for sensitive operations (e.g. Data extortion group 'Lapsus$' published a collection of confidential data over the weekend, totaling almost 190GB, according to Bleeping Computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |