A vulnerability in the way Google implements OAuth was disclosed publicly today and is still not fixed.
It can let employees retain indefinite access to applications like Slack and Zoom after they're offboarded.
Let's dig in:
Here’s a timeline of events:
August 4th- Disclosure to Google
August 7th- The issue was triaged
October 5th- Google paid $1337
November 25th- Bulk private disclosure to dozens of impacted applications
December 16th- Public disclosure 134 days after notifying Google
The crux of the bug:
You can create Google accounts off of corporate Google organization, via email aliases, and email plus sign forwarding.
youremail+anystringhere@anydomain.com will be forwarded to youremail@anydomain.com‘s inbox.
Remediation guidance if you're an org using Google Workspace:
Disable login with Google and strictly enforce SAML
To read suggestions on how Google can help fix this, or if you're a company that lets your customers login with Google and you'd like to know your options:
One of the biggest hacks of the year has mainly gone untalked about.
A Chinese hacker group compromised a $57 billion chip manufacturer in 2017.
They weren't discovered for over 2 years. Here's everything we know:
The chip company in question is NXP and they're the 2nd largest semiconductor company in the EU.
Their chips are in all sorts of devices you use including iPhones and Apple Watches, specifically NFC chips that support Apple Pay.
The hacking group is known as Chimera and they have had a long history of going after semiconductor companies to steal chip designs and other sensitive intellectual property.