The Y2K38 bug Is a Vulnerability, not just a date problem

BLUF: The Y2K38 and related time rollover issues are critical security vulnerabilities that can be exploited by threat actors today through time manipulation to cause system failures, security bypasses, and physical damage, rather than just being a future date-related programming bug.

The Year 2038 problem (Y2K38), which affects systems using a 32-bit integer to store time as seconds since 1970, poses an immediate security risk because time manipulation techniques, such as NTP injection or GPS spoofing, allow malicious actors to force the date rollover today, causing systems to malfunction or crash.

This vulnerability impacts a wide range of critical and embedded systems, including Industrial Control Systems (ICS), potentially leading to physical harm or catastrophic operational failures, while also compromising core cybersecurity functions like logging, forensics, and time-based authentication.

Unlike the Y2K bug, remediation is significantly more challenging, potentially requiring complex and costly migration from 32-bit to 64-bit architecture, rather than simple software fixes, particularly for the millions of difficult-to-update legacy and embedded devices. Stakeholders should treat the issue as an active vulnerability and prioritise fixes using established frameworks. A global effort is necessary to identify, upgrade, and develop contingency plans for vulnerable critical assets before the inevitable rollover date.

A final thought: we are much, much closer to Y2K38 than we are to the original Y2K bug.

More discussion here.

Flights cancelled after cyber attack hits European airports as Heathrow warns of delays

From: independent.co.uk

Flights have been delayed and cancelled at several European airports after a cyber attack targeting a service provider for check-in and boarding systems.

The attack has rendered automated systems inoperable, allowing only manual check-in and boarding procedures, according to Brussels Airport.

London Heathrow and Berlin airport also said the attack was disrupting its flights, with passengers advised to confirm their travel with airlines before heading to the airport on Saturday.

Read more (& live updates)…

First known AI-powered ransomware uncovered by ESET Research

From welivesecurity.com

(made with openart)

ESET researchers have discovered what they called “the first known AI-powered ransomware”. The malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt and possibly even destroy data, though this last functionality appears not to have been implemented in the malware yet.

While PromptLock was not spotted in actual attacks and is instead thought to be a proof-of-concept (PoC) or a work in progress, ESET’s discovery shows how malicious use of publicly-available AI tools could supercharge ransomware and other pervasive cyberthreats.

Read more…

FBI seized multiple piracy sites distributing pirated video games

From securityaffairs.com

FBI seizes multiple piracy sites for Nintendo Switch and PlayStation 4 games, dismantling their infrastructure.

The FBI, with the help of the Dutch FIOD, seized multiple piracy sites distributing pirated video games, including nsw2u.com, ps4pkg.com, and mgnetu.com, dismantling their infrastructure. These sites, active for over four years, offered early access to popular game titles and logged 3.2 million downloads between February and May 2025, causing an estimated $170 million in losses.

Read more…

13-year-old hacks Microsoft Teams, rewrites rules for global security program

From interestingengineering.com

Dylan has filed over 20 vulnerabilities, earned a top-three finish at Zero Day Quest, and changed Microsoft’s security policy.

Bug bounty programs attract some of the most skilled engineers in cybersecurity. These are professionals who find their way through enterprise-level software in search of vulnerabilities for recognition, impact, or high payouts.

Photo by Clint Patterson on Unsplash

But Dylan, a high school junior, entered that world at just 13. His first major find, a critical Microsoft Teams vulnerability, didn’t just earn him accolades. It led Microsoft to rewrite the rules of its bug bounty program to allow teenage researchers.

Read more…

chwoot: Critical Linux vulnerability makes users root on most systems

From heise.de

An example exploit is available online and works on many standard systems. Admins should quickly install the available updates.

(made with openart.ai)

There is a critical security flaw in the Linux tool “sudo” and makes unprivileged users “root”, the system administrator, in no time at all. The reason for the malaise: a bug in the chroot function of sudo. This function is actually intended to “lock” users in their home directory, but allows them to break out of it and extend their rights. An update is available; admins of multi-user systems should act quickly.

The vulnerability exploits a bug in the chroot implementation. Between two function calls, this calls the “Name Service Switch” (NSS), which in turn loads the file /etc/nsswitch.conf. The attacker can now cause this function to load a file he has prepared with C code (a dynamic .so library) and execute it with root rights.

Read more…