kid

joined 1 year ago
MODERATOR OF
[–] kid@sh.itjust.works 3 points 3 hours ago

The incident occurred on June 12, 2025, due to a policy change that contained blank fields, causing 503 errors in Google Cloud and Google Workspace APIs. The root cause was:

  1. A new feature added to Service Control on May 29, 2025, without adequate error handling.
  2. The policy change with blank fields was globally replicated and caused Service Control binaries to crash.
[–] kid@sh.itjust.works 2 points 4 days ago

Thanks! Corrected

[–] kid@sh.itjust.works 9 points 1 week ago

The first vulnerability, CVE-2025-5054, affects Ubuntu’s Apport crash reporting system, while the second, CVE-2025-4598, impacts systemd-coredump, the default core dump handler used across Red Hat Enterprise Linux 9 and 10, as well as Fedora distributions.

[–] kid@sh.itjust.works 2 points 3 months ago (1 children)

Leak extortion is the main issue nowadays, not covered by backups, I'm afraid.

[–] kid@sh.itjust.works 6 points 3 months ago

!selfhosted@lemmy.world to the win!

[–] kid@sh.itjust.works 4 points 3 months ago

I didn't know about that tool. Apparently, it is a CDR, which I like very much. I'm not aware of any good open-source implementations.

[–] kid@sh.itjust.works 9 points 4 months ago (1 children)

Very nice approach!

Some points about the article:

Nature of the Vulnerability: The vulnerability is a security flaw that allows leaking the email associated with a YouTube channel by exploiting endpoints from both YouTube and Google Pixel Recorder.

Impact: It allows an attacker to obtain the email associated with any YouTube channel, which can lead to phishing attacks, privacy invasion, and other malicious activities. This potentially affects all YouTube users who own a channel.

Fix Status: The vulnerability has been fixed by Google. Both parts of the exploit were resolved by 02/09/2025, and the report was disclosed on 02/12/2025.

[–] kid@sh.itjust.works 51 points 5 months ago

Apparently was not related to a cyber attack, as stated in status page (https://status.proton.me/)

We have resolved all service outages, and the situation has been stable for some time. We have identified the root cause of the problem, implemented a fix, and are now monitoring the results. Jan 09, 2025 - 19:27 CET

view more: next ›