Security Bits logo - a green padlock with the words Security Bits to the right and in tiny letters below ithat it says 10101010 indicating a digital lock

Security Bits — 1 March 2026

Feedback & Followups

Deep Dive 1 — 🧯 Password Manager Vulnerabilities

TL;DR — the issues identified are real, but they are not an immediate threat, and the password managers are responding by hardening their defences, so this is actually a good news story in disguise!

Security researchers at the Swiss university ETH Zurich have published the results of their research into whether or not the cloud infrastructure of three specific password managers (Bitwarden, LastPass & Dashlane) would protect user vaults if attackers were to completely compromise them.

They did discover some weaknesses, but none pose an immediate danger to users. The various attacks require a lot of luck for the attackers. If we use the Swiss cheese model of security, a lot of quite small holes in a lot of layers would need to line up for the attacks to succeed. Not impossible, but very unlikely.

In general, the companies are responding positively, embracing the findings and working to address them. The end result will be more secure password managers in the hands of millions of users.

Links

Deep Dive 2 — New AirSnitch WiFi Vulnerability

TL;DR — even on captive portal networks, time to turn back on those VPNs 🙁

An exceptionally powerful feature enterprise-grade WiFi offers is client isolation. This means devices using a wifi network (clients) can talk to the internet, but not to anything else using the same wifi network (isolation). This stops things like malicious guests in a hotel or coffee shop from intercepting other guests’ connections or attacking their devices.

A simpler form of similar technologies has made its way into many home routers in the form of a separate guest network that is theoretically isolated from the homeowner’s own network.

These features are very powerful, but they’re not actually part of the official WiFi standard; they’re bonus extras developed by vendors to out-compete their rivals. This means each router does things a little differently, but all without the kind of rigour you get from a well-studied and deeply understood open standard.

The very talented computer scientists at the KU Leuven in Belgium (their work regularly makes enough new things to get mentioned in these segments) wondered how secure these features really were, since they’re all so bespoke.

Thankfully, they didn’t find a single gaping hole that just works, but they came much closer than we’d hope. Rather than a single attack, they developed a small suite of attacks, each of which worked across multiple products, and every implementation they tested was at least somewhat vulnerable to at least some of the attacks.

The impact varied from Adversary-in-the-Middle (AiTM) attacks to full plain-text password stealing on some poorly configured enterprise networks using single-sign-on (e.g., Active Directory username+password to access WiFi). If that attack had been without caveats, it would have been a really big deal, but thankfully, that one only works when the organisation uses weak RADIUS keys.

The last time we did a deep-dive on WiFi security, it was around the question of whether or not we still needed VPNs. Thanks to the power of client isolation, I didn’t bother anymore when using wifi I recognised as enterprise grade (no pre-shared key) because I knew it almost certainly had client isolation. Now, that safety net has proven to be leaky 🙁

It’s still true that just about every website is secured, and no WiFi-level attack can break into HTTPS; it does mean that clicking past a certificate warning could be all it takes for an attacker to get into your bank account when you’re on a public WiFi network. If you’re not certain everything you do is properly encrypted, or if you’d like to work with a bit of a safety net, it probably is worth investing in a trustworthy VPN after all 😕

More details — cyberinsider.com/…

❗ Action Alerts

Worthy Warnings

Notable News

Top Tips

Excellent Explainers

Interesting Insights

Palate Cleansers

  • 🖼️ My pet-peeve about Sherlock Holmes hilariously ridiculed: xkcd.com/…
    • Reductive reasoning is terrible, it means the less imaginative you are, the more certain you are you’re being ‘logical”! This kind of smart-sounding idiocy fuels our toxic conspiracy theory culture 🙁
    • “If you’ve eliminated everything you think is possible, the weirdest thing you can think of must be true” 🤯
  • 🎧 My favourite grammar podcaster (Mignon Fogarty) chats with my favourite typography geek (Glenn Fleishman) about my least-favourite internet habit: Grammar Girl: why do we SHOUT in ALL CAPS? — bsky.app/…

Legend

When the textual description of a link is part of the link, it is the title of the page being linked to, when the text describing a link is not part of the link, it is a description written by Bart.

Emoji Meaning
🎧 A link to audio content, probably a podcast.
A call to action.
flag The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country.
📊 A link to graphical content, probably a chart, graph, or diagram.
🧯 A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂
💵 A link to an article behind a paywall.
📌 A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future.
🎩 A tip of the hat to thank a member of the community for bringing the story to our attention.
🎦 A link to video content.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top