29 June 2020
?
07:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20413

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability on the UserPickerBrowser.jspa page. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.

๐Ÿ“– Read

via "National Vulnerability Database".
07:55
ATENTIONโ€ผ New - CVE-2019-20412

The Convert Sub-Task to Issue page in affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate the following information via an Improper Authentication vulnerability: Workflow names; Project Key, if it is part of the workflow name; Issue Keys; Issue Types; Status Types. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.

๐Ÿ“– Read

via "National Vulnerability Database".
07:55
ATENTIONโ€ผ New - CVE-2019-20411

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify Wallboard settings via a Cross-site request forgery (CSRF) vulnerability. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.

๐Ÿ“– Read

via "National Vulnerability Database".
07:55
ATENTIONโ€ผ New - CVE-2019-20410

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to view sensitive information via an Information Disclosure vulnerability in the comment restriction feature. The affected versions are before version 7.6.17, from version 7.7.0 before 7.13.9, and from version 8.0.0 before 8.4.2.

๐Ÿ“– Read

via "National Vulnerability Database".
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Microsoft Edge browser: This new password monitor helps keep your data safe ๐Ÿ”

The new Edge browser will soon warn you if one of your passwords shows up in a data breach -- a feature based on an Azure service that enterprises can already use to protect user passwords.

๐Ÿ“– Read

via "Security on TechRepublic".
09:49
๐Ÿ” Non-profit launches new programs to increase diversity in cybersecurity industry ๐Ÿ”

Cybersecurity group pivots from speaking engagements and scholarships to analyzing skill gaps and connecting candidates with employers.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Beware โ€œsecure DNSโ€ scam targeting website owners and bloggers โš 

If you run a website or a blog, watch out for emails promising "DNSSEC upgrades" - these scammers are after your whole site.

๐Ÿ“– Read

via "Naked Security".
11:34
๐Ÿ•ด Tall Order for Small Businesses: 3 Tips to Find Tailored Security Solutions ๐Ÿ•ด

SMBs are responsible for nearly 44% of US economic activity, but given the current climate, it can be difficult for them to find available and/or affordable resources.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” IBM Research releases differential privacy library that works with machine learning ๐Ÿ”

The open-source repository is unique in that most tasks can be run with only a single line of code, according to the company.

๐Ÿ“– Read

via "Security on TechRepublic".
11:55
ATENTIONโ€ผ New - CVE-2019-3681

A External Control of File Name or Path vulnerability in osc of SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Software Development Kit 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP4; openSUSE Leap 15.1, openSUSE Factory allowed remote attackers that can change downloaded packages to overwrite arbitrary files. This issue affects: SUSE Linux Enterprise Module for Development Tools 15 osc versions prior to 0.169.1-3.20.1. SUSE Linux Enterprise Software Development Kit 12-SP5 osc versions prior to 0.162.1-15.9.1. SUSE Linux Enterprise Software Development Kit 12-SP4 osc versions prior to 0.162.1-15.9.1. openSUSE Leap 15.1 osc versions prior to 0.169.1-lp151.2.15.1. openSUSE Factory osc versions prior to 0.169.0 .

๐Ÿ“– Read

via "National Vulnerability Database".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Good Cyber Hygiene in a Pandemic-Driven World Starts with Us ๐Ÿ•ด

Three ways that security teams can improve processes and collaboration, all while creating the common ground needed to sustain them.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 7.5 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
12:53
๐Ÿ›  Haveged 1.9.13 ๐Ÿ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-19160

Reportexpress ProPlus contains a vulnerability that could allow an arbitrary code execution by inserted VBscript into the configure file(rxp).

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-18256

BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-18254

BIOTRONIK CardioMessenger II, The affected products do not encrypt sensitive information while at rest. An attacker with physical access to the CardioMessenger can disclose medical measurement data and the serial number from the implanted cardiac device the CardioMessenger is paired with.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-18252

BIOTRONIK CardioMessenger II, The affected products allow credential reuse for multiple authentication purposes. An attacker with adjacent access to the CardioMessenger can disclose its credentials used for connecting to the BIOTRONIK Remote Communication infrastructure.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-18248

BIOTRONIK CardioMessenger II, The affected products transmit credentials in clear-text prior to switching to an encrypted communication channel. An attacker can disclose the productรขโ‚ฌโ„ขs client credentials for connecting to the BIOTRONIK Remote Communication infrastructure.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-18246

BIOTRONIK CardioMessenger II, The affected products do not properly enforce mutual authentication with the BIOTRONIK Remote Communication infrastructure.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Unpatched Wi-Fi Extender Opens Home Networks to Remote Control โŒ

The Homeplug device, from Tenda, suffers from web server bugs as well as a DoS flaw.

๐Ÿ“– Read

via "Threatpost".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals โŒ

Comparitechโ€™s Paul Bischoff found that Amazonโ€™s facial recognition platform misidentified an alarming number of people, and was racially biased.

๐Ÿ“– Read

via "Threatpost".
?
15:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” ID theft: Fake Google alerts are now delivering malware ๐Ÿ”

E-mails telling you that your data has been compromised are now sometimes fake. Be careful what you click on.

๐Ÿ“– Read

via "Security on TechRepublic".
15:49
๐Ÿ” ID theft: Fake Google alerts are now delivering malware ๐Ÿ”

E-mails telling you that your data has been compromised are now sometimes fake. Be careful what you click on.

๐Ÿ“– Read

via "Security on TechRepublic".
?
16:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Tuesdayโ€™s Magento 1 EOL Leaves Clock Ticking on 100K Online Stores โŒ

Adobe and payment-card companies are making last-minute pleas for e-commerce sites to update to Magento 2, to avoid Magecart attacks and more.

๐Ÿ“– Read

via "Threatpost".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Files Stolen from 945 Websites Discovered on Dark Web ๐Ÿ•ด

Researchers who found the archived SQL files estimate up to 14 million people could be affected.

๐Ÿ“– Read

via "Dark Reading: ".
16:49
๐Ÿ” 2020 sees rise in invoice and payment fraud BEC attacks ๐Ÿ”

Abnormal Security found a 75% increase in this type of campaign in the first three months of the year and a spike of 200% from April to May.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Email Error Leads to Exposed PHI of 11,500 Patients ๐Ÿ”

A health plan recently disclosed a data breach of 11,500 patients that was triggered by an email mistake.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
17:49
๐Ÿ” Why everyone should care about disinformation campaigns ๐Ÿ”

Fortalice CEO and former White House CIO Theresa Payton explains why disinformation is such a potent threat.

๐Ÿ“– Read

via "Security on TechRepublic".
17:49
๐Ÿ” Why everyone should care about disinformation campaigns ๐Ÿ”

Fortalice CEO and former White House CIO Theresa Payton explains why disinformation is such a potent threat.

๐Ÿ“– Read

via "Security on TechRepublic".
17:55
ATENTIONโ€ผ New - CVE-2018-6446

A vulnerability in Brocade Network Advisor Version Before 14.3.1 could allow an unauthenticated, remote attacker to log in to the JBoss Administration interface of an affected system using an undocumented user credentials and install additional JEE applications.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ REvil Ransomware Gang Adds Auction Feature for Stolen Data โŒ

An anonymous bidding mechanism enhances the REvil group's double-extortion game.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด HackerOne Reveals Top 10 Bug-Bounty Programs ๐Ÿ•ด

Rankings based on total bounties paid, top single bounty paid, time to respond, and more.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Russian Cybercriminal Behind CardPlanet Sentenced to 9 Years ๐Ÿ•ด

Aleksei Burkov will go to federal prison for operating two websites built to facilitate payment card fraud, hacking, and other crimes.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด University of California SF Pays Ransom After Medical Servers Hit ๐Ÿ•ด

As one of at least three universities hit in June, the school paid $1.14 million to cybercriminals following an attack on "several IT systems" in the UCSF School of Medicine.

๐Ÿ“– Read

via "Dark Reading: ".
30 June 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20416

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the project configuration feature. The affected versions are before version 8.3.0.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2019-20415

Atlassian Jira Server and Data Center in affected versions allows remote attackers to modify logging and profiling settings via a cross-site request forgery (CSRF) vulnerability. The affected versions are before version 7.13.3, and from version 8.0.0 before 8.1.0.

๐Ÿ“– Read

via "National Vulnerability Database".
?
08:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  iOS 14 flags TikTok, 53 other apps spying on iPhone clipboards โš 

TikTok, for one, promised to knock this off months ago but was caught red-handed, still at it, by the new clipboard notification in iOS 14.

๐Ÿ“– Read

via "Naked Security".
?
09:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2017-18922

It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.

๐Ÿ“– Read

via "National Vulnerability Database".
10:09
โŒ How to Safeguard Data When the Majority of Your Workforce is Remote โŒ

More employees working remotely most likely means an increased reliance on cloud services and applications.

๐Ÿ“– Read

via "Threatpost".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Botnet Encyclopedia helps security teams analyze suspicious activity in data centers ๐Ÿ”

New resource lists source IPs, connect-back servers, and attack flows for established campaigns and emerging threats.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ CISA: Nation-State Attackers Likely to Exploit Palo Alto Networks Bug โŒ

An authentication-bypass vulnerability allows attackers to access network assets without credentials when SAML is enabled on certain firewalls and enterprise VPNs.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 3 Ways to Flatten the Health Data Hacking Curve ๐Ÿ•ด

With more people working from home, health data security is more challenging but vitally important. These tips can help safeguard healthcare data.

๐Ÿ“– Read

via "Dark Reading: ".
11:34
๐Ÿ•ด 3 Years After NotPetya, Many Organizations Still in Danger of Similar Attacks ๐Ÿ•ด

The same gaps that enabled ransomware to spread remain in patching, network segmentation, backup practices, security experts say.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20893

An issue was discovered in Activision Infinity Ward Call of Duty Modern Warfare 2 through 2019-12-11. PartyHost_HandleJoinPartyRequest has a buffer overflow vulnerability and can be exploited by using a crafted joinParty packet. This can be utilized to conduct arbitrary code execution on a victim's machine.

๐Ÿ“– Read

via "National Vulnerability Database".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Profile of the Post-Pandemic CISO ๐Ÿ•ด

Projects that were high priorities before the COVID-19 outbreak have taken a back seat to new business needs. For security leaders that has meant new responsibilities that could very well stick around in the pandemic's aftermath.

๐Ÿ“– Read

via "Dark Reading: ".
13:49
๐Ÿ” Why organizations often have trouble containing cyberattacks ๐Ÿ”

Many companies are hampered by the use of too many security tools and the lack of specific playbooks for common attacks, says IBM Security.

๐Ÿ“– Read

via "Security on TechRepublic".
13:55
ATENTIONโ€ผ New - CVE-2019-19163

A Vulnerability in the firmware of COMMAX WallPad(CDP-1020MB) allow an unauthenticated adjacent attacker to execute arbitrary code, because of a using the old version of MySQL.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-19161

CyMiInstaller322 ActiveX which runs MIPLATFORM downloads files required to run applications. A vulnerability in downloading files by CyMiInstaller322 ActiveX caused by an attacker to download randomly generated DLL files and MIPLATFORM to load those DLLs due to insufficient verification.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ UCSF Pays $1.14M After NetWalker Ransomware Attack โŒ

UCSF has paid more than $1 million after a ransomware attack encrypted data related to "important" academic research on several servers.

๐Ÿ“– Read

via "Threatpost".
?
14:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Google joins Apple in limiting web certificates to one year โš 

Is it fair to expect everyone to renew all their web certificates every year? Apple says yes, and now Google does too.

๐Ÿ“– Read

via "Naked Security".
14:34
๐Ÿ•ด CISA Issues Advisory on Home Routers ๐Ÿ•ด

The increase in work-from-home employees raises the importance of home router security.

๐Ÿ“– Read

via "Dark Reading: ".
14:49
๐Ÿ” How to protect your remote desktop environment from brute force attacks ๐Ÿ”

An RDP compromise provides a cybercriminal with a backdoor for ransomware and other types of malware, says security provider ESET.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ StrongPity APT Back with Kurdish-Aimed Watering Hole Attacks โŒ

The spy malware is being delivered via a complex infrastructure with multiple layers, in an effort to avoid analysis.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Don't Slow Cybersecurity Spending: Steer into the Skid with a Tight Business Plan ๐Ÿ•ด

We all know there are slippery conditions ahead, which is why it's never been more important for organizations to maintain and even increase their spending on cybersecurity.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Inventor of Anti-Corrosion Tech Allegedly Took IP to New Company ๐Ÿ”

A new lawsuit alleges the chief developer of the company's IP left the company and took some of its confidential information with him to start a new competing company.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
16:49
๐Ÿ” Developers agree: Application security processes have a negative impact on productivity ๐Ÿ”

86% of developers polled in a recent survey said every single aspect of appsec hinders their ability to push code.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด DDoS Attacks Jump 542% from Q4 2019 to Q1 2020 ๐Ÿ•ด

The shift to remote work and heavy reliance on online services has driven an increase in attacks intended to overwhelm ISPs.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ EvilQuest Mac Ransomware Has Keylogger, Crypto Wallet-Stealing Abilities โŒ

A rare, new Mac ransomware has been discovered spreading via pirated software packages.

๐Ÿ“– Read

via "Threatpost".
19:09
โŒ Verizon Media, PayPal, Twitter Top Bug-Bounty Rankings โŒ

Verizon Media has paid nearly $10 million to ethical hackers via HackerOne's platform.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Attackers Will Target Critical PAN-OS Flaw, Security Experts Warn ๐Ÿ•ด

After Palo Alto Networks alerted users to a simple-to-exploit vulnerability in its network security gear, security agencies quickly warn that attackers won't wait to jump on it.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด COVID-19 Puts ICS Security Initiatives 'On Pause' ๐Ÿ•ด

Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด FCC Designates Huawei & ZTE as National Security Threats ๐Ÿ•ด

Backdoors in 5G network equipment from these vendors could enable espionage and malicious activity, agency says.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Ripple20 Threatens Increasingly Connected Medical Devices ๐Ÿ•ด

A series of IoT vulnerabilities could put hospital networks, medical data, and patient safety at risk.

๐Ÿ“– Read

via "Dark Reading: ".
1 July 2020
?
03:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20408

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.7.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.

๐Ÿ“– Read

via "National Vulnerability Database".
?
06:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10379

In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2020-10378

In libImaging/PcxDecode.c in Pillow before 6.2.3 and 7.x before 7.0.1, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2020-10177

Pillow before 6.2.3 and 7.x before 7.0.1 has multiple out-of-bounds reads in libImaging/FliDecode.c.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2019-20892

net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2019-19506

Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the "homeplugd" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2019-19505

Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2019-16213

Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
06:55
ATENTIONโ€ผ New - CVE-2018-21268

The traceroute (aka node-traceroute) package through 1.0.0 for Node.js allows remote command injection via the host parameter. This occurs because the Child.exec() method, which is considered to be not entirely safe, is used. In particular, an OS command can be placed after a newline character.

๐Ÿ“– Read

via "National Vulnerability Database".
?
08:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Firefox 78 is out โ€“ with a mysteriously empty list of security fixes โš 

TLS 1.0 and TLS 1.1 are now considered security risks and blocked by default.

๐Ÿ“– Read

via "Naked Security".
?
08:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20408

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.7.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.

๐Ÿ“– Read

via "National Vulnerability Database".
?
09:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Google stops pushing scam ads on Americans searching for how to vote โš 

No US entity charges citizens for registering to vote, but plenty of Google ads were happy to do so - and to grab your PII in the process.

๐Ÿ“– Read

via "Naked Security".
?
09:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10379

In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2020-10378

In libImaging/PcxDecode.c in Pillow before 6.2.3 and 7.x before 7.0.1, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2020-10177

Pillow before 6.2.3 and 7.x before 7.0.1 has multiple out-of-bounds reads in libImaging/FliDecode.c.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2019-20892

net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2019-19506

Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the "homeplugd" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2019-19505

Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2019-16213

Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
09:55
ATENTIONโ€ผ New - CVE-2018-21268

The traceroute (aka node-traceroute) package through 1.0.0 for Node.js allows remote command injection via the host parameter. This occurs because the Child.exec() method, which is considered to be not entirely safe, is used. In particular, an OS command can be placed after a newline character.

๐Ÿ“– Read

via "National Vulnerability Database".
10:09
โŒ Microsoft Releases Emergency Security Updates for Windows 10, Server โŒ

The patches fix two separate RCE bugs in Windows Codecs that allow hackers to exploit playback of multimedia files.

๐Ÿ“– Read

via "Threatpost".
10:09
โŒ Email Sender Identity is Key to Solving the Phishing Crisis โŒ

Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

๐Ÿ“– Read

via "Threatpost".
?
10:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Microsoft issues critical fixes for booby-trapped images โ€“ update now! โš 

Booby-trapped images could be used to attack Windows 10 and Windows Server 2019 - update now!

๐Ÿ“– Read

via "Naked Security".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Keep the lights on: Three things power companies need to do to harden cybersecurity defenses ๐Ÿ”

IoT device makers and the US government need to collaborate with the industry to make sure digital transformation closes security gaps instead of opening new ones.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Another COVID-19 Side Effect: Rising Nation-State Cyber Activity ๐Ÿ•ด

While financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” How to protect your organization from coronavirus-related phishing attacks ๐Ÿ”

Emails exploiting COVID-19 have risen, declined, and risen again along with the changes in the pandemic and the shift to remote working, according to the security company GreatHorn.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” The next cybersecurity headache: Employees know the rules but just don't care ๐Ÿ”

Employees are still ignoring cyber security best practice despite being more aware of the risks.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” COVID-19 has spurred businesses to migrate security operations to the cloud ๐Ÿ”

Companies have increased their reliance on cloud-based security platforms to protect sensitive data as a result of the coronavirus pandemic, according to a new survey.

๐Ÿ“– Read

via "Security on TechRepublic".
11:55
ATENTIONโ€ผ New - CVE-2019-20408

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.7.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.

๐Ÿ“– Read

via "National Vulnerability Database".
12:09
โŒ Android Spyware Tools Emerge in Widespread Surveillance Campaign โŒ

Four Android spyware tools have been used in a widespread APT campaign to spy on the Uyghur ethnic minority group - since 2013.

๐Ÿ“– Read

via "Threatpost".
?
12:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  SQLMAP - Automatic SQL Injection Tool 1.4.7 ๐Ÿ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to use the Google Pixel Safety Check feature ๐Ÿ”

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature.

๐Ÿ“– Read

via "Security on TechRepublic".
13:55
ATENTIONโ€ผ New - CVE-2019-4706

IBM Security Identity Manager Virtual Appliance 7.0.2 writes information to log files which can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. IBM X-Force ID: 172016.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-4705

IBM Security Identity Manager Virtual Appliance 7.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 172015.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-4704

IBM Security Identity Manager Virtual Appliance 7.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 172014.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-4676

IBM Security Identity Manager Virtual Appliance 7.0.2 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 171512.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2017-1712

"A vulnerability in the TLS protocol implementation of the Domino server could allow an unauthenticated, remote attacker to access sensitive information, aka a Return of Bleichenbacher's Oracle Threat (ROBOT) attack. An attacker could iteratively query a server running a vulnerable TLS stack implementation to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions."

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2017-1659

"HCL iNotes is susceptible to a Cross-Site Scripting (XSS) Vulnerability. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials."

๐Ÿ“– Read

via "National Vulnerability Database".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 4 Steps to a More Mature Identity Program ๐Ÿ•ด

Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Be prepared: Why you need an incident response policy ๐Ÿ”

Smart security teams have updated incident response plans in place before a security breach happens.

๐Ÿ“– Read

via "Security on TechRepublic".
16:49
๐Ÿ” Business climate may be stabilizing for tech companies ๐Ÿ”

New CompTIA poll finds members are receiving inquiries around cybersecurity, migrating to the cloud, and managed services.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ EvilQuest: Inside A โ€˜New Classโ€™ of Mac Malware โŒ

Mac expert Thomas Reed discusses how EvilQuest is ushering in a new class of Mac malware.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Microsoft Issues Out-of-Band Patches for RCE Flaws ๐Ÿ•ด

Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.

๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด New MacOS Ransomware Hides in Pirated Program ๐Ÿ•ด

A bogus installer for Little Snitch carries a ransomware hitchhiker.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Alina Point-of-Sale Malware Spotted in Ongoing Campaign โŒ

The malware is using DNS tunneling to exfiltrate payment-card data.

๐Ÿ“– Read

via "Threatpost".
18:09
โŒ Cisco Warns of High-Severity Bug in Small Business Switch Lineup โŒ

A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด DHS Shares Data on Top Cyberthreats to Federal Agencies ๐Ÿ•ด

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Businesses Invest in Cloud Security Tools Despite Concerns ๐Ÿ•ด

A majority of organizations say the acceleration was driven by a need to support more remote employees.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Chinese Software Company Aisino Uninstalls GoldenSpy Malware ๐Ÿ•ด

Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-15312

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2019-15311

An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2019-15310

An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.

๐Ÿ“– Read

via "National Vulnerability Database".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign ๐Ÿ•ด

Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.

๐Ÿ“– Read

via "Dark Reading: ".
2 July 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20417

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate internal services via an Information Disclosure vulnerability. The vulnerability is only exploitable if WebSudo is disabled in Jira. The affected versions are before version 8.4.2.

๐Ÿ“– Read

via "National Vulnerability Database".
?
07:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  133m records for sale as fruits of data breach spree keep raining down โš 

Databases can be had for as little as $100, on up to $1,100. Most, if not all, are being sold by the hacking group Shiny Hunters.

๐Ÿ“– Read

via "Naked Security".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 7 IoT Tips for Home Users ๐Ÿ•ด

Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep every one secure.

๐Ÿ“– Read

via "Dark Reading: ".
09:49
๐Ÿ” Zoom: We've delivered on all of our security and privacy promises, apart from one ๐Ÿ”

CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด DHS Shares Data on Top Cyber Threats to Federal Agencies ๐Ÿ•ด

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ FakeSpy Android Malware Spread Via โ€˜Postal-Serviceโ€™ Apps โŒ

New โ€˜smishingโ€™ campaigns from the Roaming Mantis threat group infect Android users with the FakeSpy infostealer.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Lessons from COVID-19 Cyberattacks: Where Do We Go Next? ๐Ÿ•ด

We need to learn from the attacks and attempts that have occurred in order to prepare for the future.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  MongoDB ransom threats step up from blackmail to full-on wiping โš 

Still thinking "the crooks probably won't find me if I make a security blunder"?

๐Ÿ“– Read

via "Naked Security".
12:47
๐Ÿ” EU Data Protection Authority Wants to Promote Digital Justice ๐Ÿ”

The European Data Protection Supervisor (EDPS) announced its plans for 2020-2024 this week and stressed that the EU needs digital solidarity and to make data work for all people across Europeโ€™s borders.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
12:53
๐Ÿ›  AIEngine 2.0.0 ๐Ÿ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
12:53
๐Ÿ›  Wireshark Analyzer 3.2.5 ๐Ÿ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” US schools have lost 24.5 million records in breaches since 2005 ๐Ÿ”

A report from Comparitech found that since 2005 Kโ€“12 districts and colleges/universities have been attacked more than 1,300 times.

๐Ÿ“– Read

via "Security on TechRepublic".
13:49
๐Ÿ” Trojans, backdoors, and trojan-droppers among most analyzed cyberthreats ๐Ÿ”

Almost three quarters of all requests for analysis to Kaspersky's Threat Intelligence Portal were for trojans, backdoors, and droppers.

๐Ÿ“– Read

via "Security on TechRepublic".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Facebook Privacy Glitch Gave 5K Developers Access to โ€˜Expiredโ€™ Data โŒ

Facebook has fixed a privacy issue that gave developers access to user data long after the 90-day "expiration" date.

๐Ÿ“– Read

via "Threatpost".
14:09
โŒ Apache Guacamole Opens Door for Total Control of Remote Footprint โŒ

Several vulnerabilities can be chained together for a full exploit.

๐Ÿ“– Read

via "Threatpost".
14:09
โŒ Trojans, Backdoors and Droppers: The Most-Analyzed Malware โŒ

Even so, backdoors and droppers are rare in the wild.

๐Ÿ“– Read

via "Threatpost".
?
14:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Fed Offers Guidance on Curbing Synthetic Identity Fraud ๐Ÿ”

The Federal Reserve shared insights around mitigating synthetic identity fraud, one of the quickest growing financial threats, this week.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 22,900 MongoDB Databases Affected in Ransomware Attack ๐Ÿ•ด

An attacker scanned for databases misconfigured to expose information and wiped the data, leaving a ransom note behind.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Considerations for Seamless CCPA Compliance ๐Ÿ•ด

Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Anatomy of a Long-Con Phish ๐Ÿ•ด

A fraudster on LinkedIn used my online profile in an apparent attempt to pull off a wide-ranging scam business venture.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20894

Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Making Sense of EARN IT & LAED Bills' Implications for Crypto ๐Ÿ•ด

After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here's what to know.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด BG-IP Vulnerabilities Could be Big Trouble for Customers ๐Ÿ•ด

Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Building Security Strategies in Sub-Saharan Africa: Trends and Concerns ๐Ÿ•ด

Security experts discuss the rise in cybercrime affecting sub-Saharan Africa and the necessary changes to improve security.

๐Ÿ“– Read

via "Dark Reading: ".
3 July 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20419

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to execute arbitrary code via a DLL hijacking vulnerability in Tomcat. The affected versions are before version 8.5.5, and from version 8.6.0 before 8.7.2.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2019-20418

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to prevent users from accessing the instance via an Application Denial of Service vulnerability in the /rendering/wiki endpoint. The affected versions are before version 8.8.0.

๐Ÿ“– Read

via "National Vulnerability Database".
?
08:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Google buys AR smart-glasses company North โš 

They're not surveillance spectacles, says Google, just a piece in the jigsaw of "ambient computing", where helpfulness is all around you.

๐Ÿ“– Read

via "Naked Security".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Cybersecurity's Lament: There are No Cooks in Space ๐Ÿ•ด

Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.

๐Ÿ“– Read

via "Dark Reading: ".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Ring Doorbellโ€™s Police Partnerships Questioned Over Racial Bias โŒ

Amazon has placed a moratorium on police use of its facial recognition platform - but a congressman asked if that extends to its Ring smart doorbell in a new inquiry.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Introducing 'Secure Access Service Edge' ๐Ÿ•ด

The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Android 11 security features and improvements you need to know ๐Ÿ”

If the Android 11 beta is an indication, Jack Wallen predicts it will be the most secure and best performing release. Developers and pro users, read about security and privacy features in Android 11.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Facebook hoaxes back in the spotlight โ€“ what to tell your friends โš 

At the risk of giving you a feeling of dรฉjร  vu all over again, it's time to talk about Facebook hoaxes once more.

๐Ÿ“– Read

via "Naked Security".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ E.U. Authorities Crack Encryption of Massive Criminal and Murder Network โŒ

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.

๐Ÿ“– Read

via "Threatpost".
?
16:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” What are IT pros concerned about in the new normal? Security and flexibility ๐Ÿ”

There are a number of paramount concerns afoot among IT professionals. Learn some of the priorities from industry insiders and experts.

๐Ÿ“– Read

via "Security on TechRepublic".
4 July 2020
?
00:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to run an SSH connection through Tor ๐Ÿ”

Looking for a way to gain a bit more security and privacy for your SSH connections? Jack Wallen shows you how with the help of Tor.

๐Ÿ“– Read

via "Security on TechRepublic".
6 July 2020
?
06:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Monday review โ€“ the hot 11 stories of the week โš 

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

๐Ÿ“– Read

via "Naked Security".
?
08:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Boston bans government use of facial recognition โš 

To help end systemic racism, we'll stay away from an error-prone technology that's been shown to have racial bias, the city council said.

๐Ÿ“– Read

via "Naked Security".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Email Sender Identity is Key to Solving the Phishing Crisis โŒ

Almost 90% of email attacks manipulate sender identity to fool recipients and initiate social engineering attacks.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How to Assess More Sophisticated IoT Threats ๐Ÿ•ด

Securing the Internet of Things requires diligence in secure development and hardware design throughout the product life cycle, as well as resilience testing and system component analysis.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Collaboration, Activity Monitoring Key to Identifying Hacker ๐Ÿ”

The FBI recently reflected on the the arrest of a hacker who stole intellectual property from a tech company, including how collaboration and activity monitoring played a role in tracking him down.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Purple Fox EK Adds Microsoft Exploits to Arsenal โŒ

Two exploits for Microsoft vulnerabilities have been added to the Purple Fox EK, showing ongoing development.

๐Ÿ“– Read

via "Threatpost".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How much malware tools sell for on the Dark Web ๐Ÿ”

A low-quality batch of malicious tools can sell for as low as $70, while a premium set can go as high as $6,000, according to the security research site Privacy Affairs.

๐Ÿ“– Read

via "Security on TechRepublic".
13:49
๐Ÿ” Phishing attack spoofs Twitter to steal account credentials ๐Ÿ”

A new phishing campaign spotted by Abnormal Security attempts to trick people with a phony Twitter security notification.

๐Ÿ“– Read

via "Security on TechRepublic".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด BIG-IP Vulnerabilities Could be Big Trouble for Customers ๐Ÿ•ด

Left unpatched, pair of vulnerabilities could give attackers wide access to a victim's application delivery network.

๐Ÿ“– Read

via "Dark Reading: ".
14:34
๐Ÿ•ด Android Adware Tied to Undeletable Malware ๐Ÿ•ด

Adware on inexpensive Android smartphone can carry additional malware and be undeletable.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Lazarus Group Adds Magecart to the Mix โŒ

North Korea-based APT is targeting online payments made by American and European shoppers.

๐Ÿ“– Read

via "Threatpost".
?
15:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to secure your iOS Lock Screen ๐Ÿ”

Configure your iOS Lock Screen to block those picking up your device from reading messages, viewing the Today View, or interacting with Siri unless your device is unlocked first.

๐Ÿ“– Read

via "Security on TechRepublic".
15:49
๐Ÿ” 5 NSA-recommended strategies for improving your VPN security ๐Ÿ”

The US National Security Agency has noticed a surge in cyberattacks targeting VPNs since the COVID-19 pandemic has forced more people to work from home.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Admins Urged to Patch Critical F5 Flaw Under Active Attack โŒ

Security experts and the U.S. Cyber Command are urging admins to update a critical flaw in F5 Networks, which is under active attack.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Credit-Card Skimmer Seeks Websites Running Microsoft's ASP.NET ๐Ÿ•ด

The payment-card skimmer targets websites hosted on Microsoft IIS servers and running the ASP.NET web framework.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10760

A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-8252

Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to information disclosure.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-8251

Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to information disclosure.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-8250

Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-8249

Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-8066

Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution .

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-14900

A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ Android Users Hit with โ€˜Undeletableโ€™ Adware โŒ

Researchers say that 14.8 percent of Android users who were targeted with mobile malware or adware last year were left with undeletable files.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด North Korea's Lazarus Group Diversifies Into Card Skimming ๐Ÿ•ด

Since at least May 2019, the state-sponsored threat actor has stolen card data from dozens of retailers, including major US firms.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure ๐Ÿ•ด

The US Cybersecurity and Infrastructure Security Agency encourages organizations to patch a critical flaw in the BIG-IP family of application delivery controllers, as firms find evidence that attackers are scanning for the critical vulnerability.

๐Ÿ“– Read

via "Dark Reading: ".
18:49
๐Ÿ” How to ensure the integrity of your encrypted drive while it's hibernating in macOS ๐Ÿ”

Enabling full-disk encryption to keep documents secure is highly recommended. By default, macOS does not maintain integrity while hibernating. But there's a fix for that.

๐Ÿ“– Read

via "Security on TechRepublic".
18:53
๐Ÿ›  Sifter 7.8 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
18:53
๐Ÿ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.12 ๐Ÿ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด BEC Busts Take Down Multimillion-Dollar Operations ๐Ÿ•ด

The two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.

๐Ÿ“– Read

via "Dark Reading: ".
7 July 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-15096

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.

๐Ÿ“– Read

via "National Vulnerability Database".
?
06:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Flashy Nigerian Instagram star extradited to US to face BEC charges โš 

It's a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell.

๐Ÿ“– Read

via "Naked Security".
?
08:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ First-Ever Russian BEC Gang, Cosmic Lynx, Uncovered โŒ

Researchers warn that Cosmic Lynx targets firms that don't use DMARC and uses a "mergers and acquisitions" pretext that can lead to large sums of money being stolen.

๐Ÿ“– Read

via "Threatpost".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites โŒ

A campaign discovered by Malwarebytes Labs in mid-April has lifted credentials from a number of e-commerce portals.

๐Ÿ“– Read

via "Threatpost".
?
11:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Company web names hijacked via outdated cloud DNS records โš 

Why hack into a server when you can just send vistors to a fake alternative instead?

๐Ÿ“– Read

via "Naked Security".
11:34
๐Ÿ•ด Applying the 80-20 Rule to Cybersecurity ๐Ÿ•ด

How security teams can achieve 80% of the benefit for 20% of the work.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” Remote workers aren't taking security seriously. Now that has to change ๐Ÿ”

IT teams help can mitigate the risks of shadow IT by being more flexible and adapting to the needs of remote workers, according to a new study.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Citrix Bugs Allow Unauthenticated Code Injection, Data Theft โŒ

Admins should patch their Citrix ADC and Gateway installs immediately.

๐Ÿ“– Read

via "Threatpost".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” 65% of organizations saw at least 3 OT system intrusions within the past year ๐Ÿ”

As OT tech becomes more advanced, so do the cybersecurity concerns surrounding it, Fortinet found.

๐Ÿ“– Read

via "Security on TechRepublic".
13:49
๐Ÿ” Bitdefender unveils Human Risk Analytics to protect against human error ๐Ÿ”

Part of the company's GravityZone product, the new feature analyzes user mistakes and errors to help track and mitigate them.

๐Ÿ“– Read

via "Security on TechRepublic".
13:53
๐Ÿ›  GRR 3.4.2.0 ๐Ÿ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
13:55
ATENTIONโ€ผ New - CVE-2020-15037

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-15036

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-10745

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-10730

A NULL pointer dereference, or possible use-after-free flaw was found in the in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-4324

"HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy."

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-4323

"HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame."

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Cerberus Banking Trojan Unleashed on Google Play โŒ

The Cerberus malware can steal banking credentials, bypass security measures and access text messages.

๐Ÿ“– Read

via "Threatpost".
?
14:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to enable two-factor authentication for Bitwarden ๐Ÿ”

If you use Bitwarden as your password manager of choice, you owe it to yourself to enable two-factor authentication.

๐Ÿ“– Read

via "Security on TechRepublic".
14:49
๐Ÿ” Credit card skimmers target e-commerce websites running Microsoft IIS and ASP.NET ๐Ÿ”

Attackers are looking for credit card numbers on Microsoft IIS servers running an older and vulnerable version of ASP.NET, says Malwarebytes.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Framing the Security Story: The Simplest Threats Are the Most Dangerous ๐Ÿ•ด

Don't be distracted by flashy advanced attacks and ignore the more mundane ones.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-15032

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Incidents.php id parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-15031

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Assets-Management.php chg parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-15030

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Routes.php rtr parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-15029

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Assets-Management.php sn parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-15028

NeDi 1.9C is vulnerable to a cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Map.php xo parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-11882

The O2 Business application 1.2.0 for Android exposes the canvasm.myo2.SplashActivity activity to other applications. The purpose of this activity is to handle deeplinks that can be delivered either via links or by directly calling the activity. However, the deeplink format is not properly validated. This can be abused by an attacker to redirect a user to any page and deliver any content to the user.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2019-19935

Froala Editor before 3.0.6 allows XSS.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud ๐Ÿ•ด

Cosmic Lynx takes a sophisticated approach to business email compromise and represents a shift in tactics for Russian cybercriminals.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด Drone Path Often Reveals Operator's Location ๐Ÿ•ด

The threat posed by drones to critical infrastructure and other operational technology is made more serious by the inability of law enforcement to locate operators, researchers say.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด Microsoft Seizes Domains Used in COVID-19-Themed Attacks ๐Ÿ•ด

Court grants company's bid to shut down infrastructure used in recent campaigns against Office 365 users.

๐Ÿ“– Read

via "Dark Reading: ".
16:47
๐Ÿ” FBI Warns of Increase in Fake, COVID-Related Unemployment Claims ๐Ÿ”

The Federal Bureau of Investigation said this week that its seen a spike in fraudulent unemployment insurance claims related to the pandemic.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
16:49
๐Ÿ” CompTIA joins the battle to recruit high school and college students into cybersecurity ๐Ÿ”

The certification company will host prep sessions for the National Cyber League's cybersecurity competitions for individuals and teams.

๐Ÿ“– Read

via "Security on TechRepublic".
16:49
๐Ÿ” Why people forget their email passwords the most often ๐Ÿ”

Many users save their email password and so don't remember it if they have to enter or reset it, says NordPass.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Treasury Releases Fraud and Money Mule ID Tips ๐Ÿ•ด

A new advisory from FinCEN helps financial institutions spot illicit activities and actors.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20896

WebChess 1.0 allows SQL injection via the messageFrom, gameID, opponent, messageID, or to parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ Keeper Threat Group Rakes in $7M from Hundreds of Compromised E-Commerce Sites โŒ

Researchers warn that Keeper, using Magecart code, will launch increasingly sophisticated attacks against online merchants worldwide in the coming months.

๐Ÿ“– Read

via "Threatpost".
18:09
โŒ BEC Hotshot with Opulent Social Media Presence to Face U.S. Charges โŒ

The Nigerian native has been extradited from Dubai after a string of over-the-top Instagram posts.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด EDP Renewables Confirms Ransomware Attack ๐Ÿ•ด

Its North American branch was notified of the attack because intruders reportedly gained access to 'at least some information' stored in its systems.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-15008

A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-12821

Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-12736

Code42 environments with on-premises server versions 7.0.4 and earlier allow for possible remote code execution. When an administrator creates a local (non-SSO) user via a Code42-generated email, the administrator has the option to modify content for the email invitation. If the administrator entered template language code in the subject line, that code could be interpreted by the email generation services, potentially resulting in server-side code injection.

๐Ÿ“– Read

via "National Vulnerability Database".
8 July 2020
?
08:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Kinda sorta weakened version of EARN IT Act creeps closer โš 

Critics say the amended bill that's headed for a full Senate hearing still threatens encryption, albeit less blatantly.

๐Ÿ“– Read

via "Naked Security".
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How managed service providers can pose a risk to their customers ๐Ÿ”

The US Secret Service has warned organizations about a rise in hacks of MSPs and offers advice on how to beef up security.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ 15 Billion Credentials Currently Up for Grabs on Hacker Forums โŒ

Unprecedented amounts of data for accessing bank accounts and streaming services are being flogged on the dark web.

๐Ÿ“– Read

via "Threatpost".
?
11:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Mozilla turns off โ€œFirefox Sendโ€ following malware abuse reports โš 

Sadly, the easier and safer you make your file sharing service, the more attractive it becomes to the crooks.

๐Ÿ“– Read

via "Naked Security".
11:34
๐Ÿ•ด A Most Personal Threat: Implantable Devices in Secure Spaces ๐Ÿ•ด

Do implantable medical devices pose a threat to secure communication facilities? A Virginia Tech researcher says they do, and the problem is growing.

๐Ÿ“– Read

via "Dark Reading: ".
11:34
๐Ÿ•ด Why Cybersecurity's Silence Matters to Black Lives ๐Ÿ•ด

The industry is missing an opportunity to educate the public about bad actors who capitalize off of protest, voting rights education and police brutality petitions through social engineering and phishing attacks.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks โŒ

The phishing campaign targeted Office 365 accounts in 62 countries, using business-related reports and the coronavirus pandemic as lures.

๐Ÿ“– Read

via "Threatpost".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to encrypt an external drive or card in macOS ๐Ÿ”

Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.

๐Ÿ“– Read

via "Security on TechRepublic".
12:49
๐Ÿ” BYOD: A trend rife with security concerns ๐Ÿ”

Researchers explored the implications of allowing employees to bring their own devices for sensitive work tasks.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-14476

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-11849

Elevation of privilege and/or unauthorized access vulnerability in Micro Focus Identity Manager. Affecting versions prior to 4.7.3 and 4.8.1 hot fix 1. The vulnerability could allow information exposure that can result in an elevation of privilege or an unauthorized access.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Notorious Hacker โ€˜Fxmspโ€™ Outed After Widespread Access-Dealing โŒ

The Kazakh native made headlines last year for hacking McAfee, Symantec and Trend Micro; but the Feds say he's also behind a widespread backdoor operation spanning six continents.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Fresh Options for Fighting Fraud in Financial Services ๐Ÿ•ด

Fraud prevention requires a consumer-centric, data sharing approach.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-11994

Server-Side Template Injection and arbitrary file disclosure on Camel templating components

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2019-19417

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2019-19416

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2019-19415

The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How Advanced Attackers Take Aim at Office 365 ๐Ÿ•ด

Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs ๐Ÿ•ด

The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.

๐Ÿ“– Read

via "Dark Reading: ".
17:47
๐Ÿ” DOJ Charges "fxmsp" Hacker for Breaching 300 Organizations ๐Ÿ”

The hacker, based in Kazakhstan, sold backdoor access to over 300 victim networks, some for up to $100,000.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
18:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Advertising Plugin for WordPress Threatens Full Site Takeovers โŒ

Thousands of vulnerable websites need to apply the patch to avoid RCE.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด As More People Return to Travel Sites, So Do Malicious Bots ๐Ÿ•ด

Attacks against travel-related websites are on the rise as the industry begins to slowly recover from COVID-19, new data shows.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด More Malware Found Preinstalled on Government Smartphones ๐Ÿ•ด

Researchers report the American Network Solutions UL40 smartphone comes with compromised apps.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด New Fraud Ring "Bargain Bear" Brings Sophistication to Online Crime ๐Ÿ•ด

The ring tests the validity of stolen credentials to be used in fraud through an online marketplace.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Study Finds 15 Billion Stolen, Exposed Credentials in Criminal Markets ๐Ÿ•ด

Data is fueling account takeover attacks in a big way, Digital Shadows says.

๐Ÿ“– Read

via "Dark Reading: ".
9 July 2020
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Microsoft Cloud App Security: This software can help you to manage shadow IT and boost productivity ๐Ÿ”

How to use shadow IT discovery in Microsoft Cloud App Security to help remote workers stay secure and save bandwidth.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Cloud environments are making the security alert overload problem worse ๐Ÿ”

Companies say that automation helps ease the burden but most have a long way to go to reach full implementation, according to new survey.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ โ€˜Undeletableโ€™ Malware Shows Up in Yet Another Android Device โŒ

Researchers have found trojans and adware in preinstalled apps on a low-cost device distributed by the government-funded Lifeline Assistance Program.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Pen Testing ROI: How to Communicate the Value of Security Testing ๐Ÿ•ด

There are many reasons to pen test, but the financial reasons tend to get ignored.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ BlueLeaks Server Seized By German Police: Report โŒ

The server contained almost 270 gigabytes of data collected from 200 police departments, law enforcement training and support resources and fusion centers.

๐Ÿ“– Read

via "Threatpost".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 6 Tips for Getting the Most From Nessus ๐Ÿ•ด

Books have been written on using the powerful network-discovery and vulnerability-scanning tool. These tips will help you get started.

๐Ÿ“– Read

via "Dark Reading: ".
12:49
๐Ÿ” Joker billing fraud malware eluded Google Play security to infect Android devices ๐Ÿ”

A new variant targeted Android users to subscribe them to premium services without their consent, according to Check Point Research.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  GNU Privacy Guard 2.2.21 ๐Ÿ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
13:55
ATENTIONโ€ผ New - CVE-2020-12408

When browsing a document hosted on an IP address, an attacker could insert certain characters to flip domain and path information in the address bar. This vulnerability affects Firefox < 77.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12407

Mozilla Developer Nicolas Silva found that when using WebRender, Firefox would under certain conditions leak arbitrary GPU memory to the visible screen. The leaked memory content was visible to the user, but not observable from web content. This vulnerability affects Firefox < 77.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12406

Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12405

When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12404

For native-to-JS bridging the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token could leak when used for downloading files. This vulnerability affects Firefox for iOS < 26.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12402

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12399

NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-12398

If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection. This vulnerability affects Thunderbird < 68.9.0.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-11992

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-10096

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2018-12371

An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 16 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.1, Thunderbird < 60, and Firefox < 61.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Joker Android Malware Dupes Its Way Back Onto Google Play โŒ

A new variant of the Joker malware has hoodwinked its way onto the Google Play marketplace yet again, in 11 Android apps that were recently removed.

๐Ÿ“– Read

via "Threatpost".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Name That Toon: Tough Times, Tough Measures ๐Ÿ•ด

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

๐Ÿ“– Read

via "Dark Reading: ".
14:47
๐Ÿ” 2,500 of FBI's Counterintelligence Cases Linked to China ๐Ÿ”

The Federal Bureau of Investigationโ€™s Director Christopher Wray discussed the Chinese Communist Party's vast influence on U.S. intellectual property, the financial sector, and democracy in a talk this week.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
14:49
๐Ÿ” How to enable Canonical Livepatch from the command line ๐Ÿ”

If you have Ubuntu Servers in your data center, you should consider adding Canonical Livepatch to keep them up to date with kernel security patches.

๐Ÿ“– Read

via "Security on TechRepublic".
14:49
๐Ÿ” Microsoft warns organizations of consent phishing attacks ๐Ÿ”

In this type of phishing campaign, attackers trick people into giving a malicious app consent to access sensitive data, says Microsoft.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Fight Phishing with Intention ๐Ÿ•ด

Phishing exercises have become a staple, but it helps to be as clear as possible on exactly why you're doing them.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด 56% of Large Companies Handle 1,000+ Security Alerts Each Day ๐Ÿ•ด

For 70% of IT security professionals, the volume of security alerts has doubled in the past five years, researchers report.

๐Ÿ“– Read

via "Dark Reading: ".
15:49
๐Ÿ” Highest-paying tech jobs: Where to find them ๐Ÿ”

Find out what tech jobs and skills are most in-demand and where the positions are located.

๐Ÿ“– Read

via "Security on TechRepublic".
15:49
๐Ÿ” How to detect network abuse with Wireshark ๐Ÿ”

With a few quick clicks, you can detect network abuse with Wireshark. Jack Wallen shows you how.

๐Ÿ“– Read

via "Security on TechRepublic".
15:49
๐Ÿ” How expired domain names can redirect you to malicious websites ๐Ÿ”

Pages for inactive domain names can be exploited by cybercriminals to take you to malicious sites, says Kaspersky.

๐Ÿ“– Read

via "Security on TechRepublic".
15:55
ATENTIONโ€ผ New - CVE-2020-10756

An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.

๐Ÿ“– Read

via "National Vulnerability Database".
16:09
โŒ Zoom Zero-Day Allows RCE, Patch on the Way โŒ

Researchers said that the issue is only exploitable on Windows 7 and earlier.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด When WAFs Go Wrong ๐Ÿ•ด

Web application firewalls are increasingly disappointing enterprises today. Here's why.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-17638

In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.).

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:12
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Microsoft Warns on OAuth Attacks Against Cloud App Users โŒ

Application-based attacks that use the passwordless "log in with..." feature common to cloud services are on the rise.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 'Joker' Android Malware Pulls Another Trick to Land on Google's Play Store ๐Ÿ•ด

Authors of the malware, which signs up mobile users for premium services, are repeatedly finding ways to bypass app review checks.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Omdia Research Launches Page On Dark Reading ๐Ÿ•ด

Data and insight from a leading cybersecurity research and analysis team will broaden the information available to security professionals and technology vendors.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Secure content distribution ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Up Close with Evilnum, the APT Group Behind the Malware ๐Ÿ•ด

The group behind Evilnum malware, which continues to target financial institutions, appears to be testing new techniques.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Huge DDoS Attack Launched Against Cloudflare in Late June ๐Ÿ•ด

The 754 million packets-per-second peak was part of a four-day attack involving more than 316,000 sending addresses.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  TOR Virtual Network Tunneling Tool 0.4.3.6 ๐Ÿ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Using Adversarial Machine Learning, Researchers Look to Foil Facial Recognition ๐Ÿ•ด

For privacy-seeking users, good news: Computer scientists are finding more ways to thwart facial and image recognition. But there's also bad news: Gains will likely be short-lived.

๐Ÿ“– Read

via "Dark Reading: ".
10 July 2020
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Black Hat USA Debuts Cyber-Physical Systems Briefings Track ๐Ÿ•ด

Discover how to defend systems where computers monitor, manage, and control a physical process.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Report: Most Popular Home Routers Have โ€˜Criticalโ€™ Flaws โŒ

Common devices from Netgear, Linksys, D-Link and others contain serious security vulnerabilities that even updates donโ€™t fix.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 4 Security Tips as the July 15 Tax-Day Extension Draws Near ๐Ÿ•ด

We're continuing to see cybercriminals take advantage of COVID-19, and the extension of Tax Day will be the next technique used in their sophisticated method of attacks.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Software-defined perimeters may be the solution to remote work security concerns ๐Ÿ”

The massive remote work shift due to COVID-19 has increased interest in SDPs, with 70% of respondents polled for a new report saying they're now considering adopting one in the coming year.

๐Ÿ“– Read

via "Security on TechRepublic".
12:53
๐Ÿ›  Sifter 8 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด As Offices Reopen, Hardware from Home Threatens Security ๐Ÿ•ด

Devices out of sight for the past several months could spell trouble when employees bring them back to work.

๐Ÿ“– Read

via "Dark Reading: ".
13:34
๐Ÿ•ด Zoom Patches Zero-Day Vulnerability in Windows 7 ๐Ÿ•ด

The flaw also affects older versions of the operating system, even if they're fully patched.

๐Ÿ“– Read

via "Dark Reading: ".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2013-1703

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2013-0802

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6492

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6491

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6490

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6489

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6488

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6487

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6486

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6485

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6484

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6483

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6482

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6481

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6480

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6479

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6478

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6477

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6476

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2012-6475

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Smartwatch Hack Could Trick Dementia Patients into Overdosing โŒ

Attackers could hack the smartwatch and send dementia patients alerts for taking their medication.

๐Ÿ“– Read

via "Threatpost".
?
14:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2012-6474

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
14:55
ATENTIONโ€ผ New - CVE-2012-6473

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
?
15:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Friday Five: 7/10 Edition ๐Ÿ”

Lebron James' legal files put up for auction, US Secret Service warns of increase in MSP hacks, and Andoid Apps stealing user data - catch up on all the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Google Bans Stalkerware Ads โ€“ With a Loophole โŒ

Starting in August Google is banning ads of products or services promoting stalkerware.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Biden Campaign Hires 2 Top Cybersecurity Executives ๐Ÿ•ด

The campaign has filled the positions of CISO and CTO in the runup to the 2020 presidential election.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers ๐Ÿ•ด

RSA data reveals a continued shift away from browser-based fraud as attackers target mobile apps.

๐Ÿ“– Read

via "Dark Reading: ".
?
20:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Popular TP-Link Family of Kasa Security Cams Vulnerable to Attack โŒ

Researcher warns the highly-rated Kasa family of security cameras have bugs that gives hackers access to private video feeds and settings.

๐Ÿ“– Read

via "Threatpost".
12 July 2020
?
16:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  nfstream 5.1.6 ๐Ÿ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
13 July 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20898

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2019-20897

The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1.

๐Ÿ“– Read

via "National Vulnerability Database".
?
07:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Monday review โ€“ the hot stories of the week โš 

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

๐Ÿ“– Read

via "Naked Security".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ How CARTA Strategies for Web Applications are Met with Indusface AppTrana Solution โŒ

From an operational standpoint, the foundation of CARTA starts with an assessment and then building the zero-trust principles on top of that with an adaptive security model.

๐Ÿ“– Read

via "Threatpost".
10:09
โŒ A โ€˜New Ageโ€™ of Sophisticated Business Email Compromise is Coming โŒ

A new BEC threat group is heralding more sophisticated email scams that target organizations without DMARC and squeeze as much money out of victims as possible.

๐Ÿ“– Read

via "Threatpost".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Learn About the Latest Election Security Threats and Defenses at Black Hat USA ๐Ÿ•ด

Christopher Krebs, director of the CISA, will explain how the organization is leading the federal effort to support state and local officials in their mission to secure US elections this year.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ The Enemy Within: How Insider Threats Are Changing โŒ

Insider-threat security experts unravel the new normal during this time of remote working, and explain how to protect sensitive data from this escalating risk.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines ๐Ÿ•ด

To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Digicert revokes a raft of web security certificates โš 

The good news is that this was a bureaucratic necessity rather than an actual cybersecurity attack.

๐Ÿ“– Read

via "Naked Security".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Secret Service Creates Cyber Fraud Task Forces โŒ

Traditional financial crime and cyberattacks are converging, requiring new skills and approaches to the problem, officials said.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Experts Predict Rise of Data Theft in Ransomware Attacks ๐Ÿ•ด

The most attractive targets for data theft are businesses perceived as most likely to pay to prevent exposure of their information.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 8.2 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
18:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ TrickBot Sample Accidentally Warns Victims Theyโ€™re Infected โŒ

A data-stealing module in a recent sandboxed sample triggers browser-based fraud alerts for Trickbot victims -- and shows something of the inner working of the malware's operators.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Russian Hacker Convicted for Social Network Hacks ๐Ÿ•ด

The Russian national was convicted of hacking into accounts at LinkedIn, Dropbox, and Formspring.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Lost in Translation: Serious Flaws Found in ICS Protocol Gateways ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด A Paramedic's Lessons for Cybersecurity Pros ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Zero-Trust Efforts Rise with the Tide of Remote Working ๐Ÿ•ด

With employees likely to continue to spend much, if not all, of their time working from home, companies are focusing more on technologies to boost the security of their now-distributed workplace.

๐Ÿ“– Read

via "Dark Reading: ".
14 July 2020
?
03:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical SAP Bug Allows Full Enterprise System Takeover โŒ

Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more.

๐Ÿ“– Read

via "Threatpost".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 99% of Websites at Risk of Attack Via JavaScript Plug-ins ๐Ÿ•ด

The average website includes content from 32 different third-party JavaScript programs, new study finds.

๐Ÿ“– Read

via "Dark Reading: ".
09:49
๐Ÿ” New Google Cloud tech gives users control of data confidentiality ๐Ÿ”

Confidential computing encrypts data in use as it's being processed and keeps that data encrypted in memory and elsewhere outside the CPU.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web โŒ

Last summerโ€™s data leak at the hotel chain appears to be far more expansive than previously thought -- or the credentials could come from a hack of DataViper.

๐Ÿ“– Read

via "Threatpost".
10:09
โŒ Most Companies Are Ignoring Your Most Vulnerable Endpointโ€ฆand Itโ€™s Not the Laptop โŒ

Cybercriminals know that mobile devices are less secure, so itโ€™s no surprise that last year Verizon found that 4 in 10 companies were breached through a mobile device.

๐Ÿ“– Read

via "Threatpost".
?
10:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  RATicate malware gang goes commercial โš 

O, what tangled code we weave, when first we practise to deceive!

๐Ÿ“– Read

via "Naked Security".
10:34
๐Ÿ•ด Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA ๐Ÿ•ด

Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Leaked Details of 142 Million MGM Hotel Guests Found for Sale Online โŒ

Scope of last summerโ€™s data leak at the hotel chain appears to be far more expansive than previously thought.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Crypto-Primer: Encryption Basics Every Security Pro Should Know ๐Ÿ•ด

With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.

๐Ÿ“– Read

via "Dark Reading: ".
11:34
๐Ÿ•ด New Mirai Variant Surfaces With Exploits for 9 Vulnerabilities Products ๐Ÿ•ด

Impacted products include routers, IP cameras, DVRs, and smart TVs.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” Why the gym of the future is your living room ๐Ÿ”

Sweat tech: Tonal CEO Aly Orady explains why big data and AI are the pedals that power the future of fitness.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” Why the gym of the future is your living room ๐Ÿ”

Sweat tech: Tonal CEO Aly Orady explains why big data and AI are the pedals that power the future of fitness.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” Major websites plagued by lack of effective security against JavaScript vulnerabilities ๐Ÿ”

Code running on sites can be exploited to steal or leak data via client-side attacks enabled by the programming language, says Tala Security.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ DMARC Adoption Spikes, Higher Ed Remains Behind โŒ

As colleges and universities prepare for the fall semester, email protections against surging threats like BEC and phishing are lagging.

๐Ÿ“– Read

via "Threatpost".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Critical Vulnerability Hits SAP Enterprise Applications ๐Ÿ•ด

RECON could allow an unauthenticated attacker to take control of SAP enterprise applications through the web interface.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to use the Whonix advanced security and privacy distribution ๐Ÿ”

Whonix is a Linux desktop dedicated to absolute security and privacy. Find out how to use this unique take on the desktop operating system.

๐Ÿ“– Read

via "Security on TechRepublic".
12:49
๐Ÿ” Demand for video surveillance cameras expected to skyrocket ๐Ÿ”

Video cameras can be used in a variety of situations beyond simple surveillance, says research firm IDC.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Google Cloud Unveils 'Confidential VMs' to Protect Data in Use ๐Ÿ•ด

Confidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.

๐Ÿ“– Read

via "Dark Reading: ".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Adobe Discloses Critical Code-Execution Bugs in July Update โŒ

The software giant released patches for four critical vulnerabilities and five different platforms.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 'Make Your Bed' and Other Life Lessons for Security ๐Ÿ•ด

Follow this advice from a famous military commanders' commencement speech and watch your infosec team soar.

๐Ÿ“– Read

via "Dark Reading: ".
15:47
๐Ÿ” The Ultimate Guide to BYOD Security: Overcoming Challenges, Creating Effective Policies, and Mitigating Risks to Maximize Benefits ๐Ÿ”

Bring Your Own Device (BYOD) remains both a major opportunity and challenge for enterprises. By following the right approach to identifying BYOD risk and developing effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
16:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical DNS Bug Opens Windows Servers to Infrastructure Takeover โŒ

Microsoft gives the โ€˜wormableโ€™ flaw a security rating of 10 โ€“ the most severe warning possible.

๐Ÿ“– Read

via "Threatpost".
?
17:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Data breaches decline 33% in the first half of 2020 ๐Ÿ”

The Identity Theft Resource Center projects 2020 is on pace to see the lowest number of breaches and exposures since 2015.

๐Ÿ“– Read

via "Security on TechRepublic".
17:55
ATENTIONโ€ผ New - CVE-2019-15886

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-15885

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-15884

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-15883

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-15882

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-15881

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to use NGINX as a reverse proxy ๐Ÿ”

A reverse proxy can do wonders for your network and its security. Learn how to configure NGINX to serve this very purpose.

๐Ÿ“– Read

via "Security on TechRepublic".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Microsoft Tackles 123 Fixes for July Patch Tuesday โŒ

Eighteen critical bugs, impacting Windows Server, Office and Outlook, were fixed as part of the patch roundup.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Microsoft Patches Wormable RCE Flaw in Windows DNS Servers ๐Ÿ•ด

Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด DevSecOps Requires a Different Approach to Security ๐Ÿ•ด

Breaking applications into microservices means more difficulty in gaining good visibility into runtime security and performance issues, says startup Traceable.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-12784

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the login form can accept submissions from external websites. In conjunction with CVE-2019-12783, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2019-12783

An issue was discovered in Verint Impact 360 15.1. At wfo/control/signin, the rd parameter can accept a URL, to which users will be redirected after a successful login. In conjunction with CVE-2019-12784, this can be used by attackers to "crowdsource" bruteforce login attempts on the target site, allowing them to guess and potentially compromise valid credentials without ever sending any traffic from their own machine to the target site.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2019-12773

An issue was discovered in Verint Impact 360 15.1. At wfo/help/help_popup.jsp, the helpURL parameter can be changed to embed arbitrary content inside of an iFrame. Attackers may use this in conjunction with social engineering to embed malicious scripts or phishing pages on a site where this product is installed, given the attacker can convince a victim to visit a crafted link.

๐Ÿ“– Read

via "National Vulnerability Database".
15 July 2020
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ The TLS 1.2 Deadline is Looming, Do You Have Your Act Together? โŒ

Sectors such as Education (47%), Energy (40%), and Public Administration (37%) have struggled to implement TLS 1.2 protocols

๐Ÿ“– Read

via "Threatpost".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Stay on the Cutting Edge of Mobile Security ๐Ÿ•ด

Here are some of the mobile-focused Briefings, Trainings, and Arsenal tools that will be explored at Black Hat USA.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Top 5 Questions (and Answers) About GRC Technology ๐Ÿ•ด

For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain circumstances.

๐Ÿ“– Read

via "Dark Reading: ".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Brazilโ€™s Banking Trojans Go Global โŒ

Four sophisticated malware families are ramping up their techniques and actively spreading to new countries, including the U.S.

๐Ÿ“– Read

via "Threatpost".
?
14:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Patch now! SIGRED โ€“ the wormable hole in your Windows servers โš 

The bug can definitely crash your Windows DNS servers, and it could end up being used for much worse than that. Please patch now!

๐Ÿ“– Read

via "Naked Security".
?
14:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Microsoft patches critical 17-year-old DNS bug in Windows Server ๐Ÿ”

The bug has been deemed "wormable," which means a single exploit could spread from one unpatched server to another.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How Nanotechnology Will Disrupt Cybersecurity ๐Ÿ•ด

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” What is CSPM (Cloud Security Posture Management)? ๐Ÿ”

Modern businesses are moving their data to the cloud, and for good reason. But as cloud platform services see an increase in use, there has been an explosion in the number of unmanaged risks in the mission-critical digital industry. This is where Cloud Security Posture Management (CSPM) comes into play.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Vulns in Open Source EHR Puts Patient Health Data at Risk ๐Ÿ•ด

Five high-risk flaws in health IT software from LibreHealth, a researcher at Bishop Fox finds.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 'Patch ASAP': Cisco Issues Updates for Routers, VPN Firewall ๐Ÿ•ด

Cisco issues five critical security patches among a batch of some 31 updates.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Puzzles and Riddles Help InfoSec Pros Solve Real-World Problems ๐Ÿ•ด

A researcher shares the unexpected lessons learned in years of creating puzzles and riddles for his cybersecurity colleagues.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด New Attack Technique Uses Misconfigured Docker API ๐Ÿ•ด

A new technique builds and deploys an attack on the victim's own system

๐Ÿ“– Read

via "Dark Reading: ".
18:49
๐Ÿ” Ransomware accounts for a third of all cyberattacks against organizations ๐Ÿ”

Government agencies were most heavily hit by ransomware during the first quarter, says Positive Technologies.

๐Ÿ“– Read

via "Security on TechRepublic".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Cryptocurrency Scam Spreads Across High-Profile Twitter Accounts ๐Ÿ•ด

Twitter accounts belonging to former president Barack Obama, Joe Biden, Jeff Bezos, Elon Musk, and Bill Gates are among those hijacked in a massive cryptocurrency scam.

๐Ÿ“– Read

via "Dark Reading: ".
?
20:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Twitter accounts of Elon Musk, Bill Gates and others hijacked to promote crypto scam ๐Ÿ”

The verified accounts for Gates, Musk and Apple issued tweets promoting a cryptocurrency scam, asking followers to send money to a blockchain address.

๐Ÿ“– Read

via "Security on TechRepublic".
?
21:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Twitter Elite Accounts Are Hijacked in Unprecedented Cryptocurrency Scam โŒ

The Twitter accounts of Gates, Musk, Biden, Apple and Uber have each been hijacked at the same time to push a cryptocurrency scam in an unprecedented breach of Twitter accounts.

๐Ÿ“– Read

via "Threatpost".
?
22:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Twitter limits tweeting as prominent accounts spam out cryptocoin scams โš 

Twitter is investigating a rash of fraudulent tweets from prominent accounts - don't fall for these scams!

๐Ÿ“– Read

via "Naked Security".
16 July 2020
?
04:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ LokiBot Redux Attacks Massive List of Common Android Apps โŒ

BlackRock, based on the Xerxes source code, can steal info not only from financial apps but also TikTok, Tinder, Instagram, Uber and many others.

๐Ÿ“– Read

via "Threatpost".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Threat Actors Introduce Unique โ€˜Newbieโ€™ Hacker Forum โŒ

CryptBB becomes more inclusive by inviting less experienced hackers to learn from expert cybercriminals and one another.

๐Ÿ“– Read

via "Threatpost".
10:09
โŒ Amazon-Themed Phishing Campaigns Swim Past Security Checks โŒ

A pair of recent campaigns aim to lift credentials and other personal information under the guise of Amazon package-delivery notices.

๐Ÿ“– Read

via "Threatpost".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Level Up Your Kubernetes Security Skills at Black Hat USA ๐Ÿ•ด

Gain access to a broad spectrum of in-depth cybersecurity Briefings and Trainings.

๐Ÿ“– Read

via "Dark Reading: ".
10:49
๐Ÿ” Watch out for these subject lines in email phishing attacks ๐Ÿ”

Campaigns exploiting COVID-19 remained popular last quarter, but cybercriminals also relied on tried and true subjects, says KnowBe4.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift ๐Ÿ•ด

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Check Point helps Zoom resolve "Vanity URL" security problem ๐Ÿ”

The loophole gave cybercriminals an opening through specialized Zoom URL links.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” How COVID-19 has increased the risk of security threats ๐Ÿ”

During the first half of the year, 80% of companies surveyed saw "slightly to considerably more" cyberattack attempts, says Exabeam.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to use the Google Pixel Safety Check feature ๐Ÿ”

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature.

๐Ÿ“– Read

via "Security on TechRepublic".
12:49
๐Ÿ” Credential stuffing attacks on global media companies are spiking ๐Ÿ”

A new report from Akamai also finds a staggering increase in attacks targeting published content.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” 820% jump in e-gift card bot attacks since COVID-19 lockdowns began ๐Ÿ”

The biggest victims were online food-delivery services and retailers, says cybersecurity firm PerimeterX.

๐Ÿ“– Read

via "Security on TechRepublic".
13:55
ATENTIONโ€ผ New - CVE-2019-4748

IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173174.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-4747

IBM Team Concert (RTC) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172887.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Zoom Addresses Vanity URL Zero-Day โŒ

An attacker could pose as a company employee, invite customers or partners to meetings, then use socially engineered conversation to extract sensitive information.

๐Ÿ“– Read

via "Threatpost".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Russian Cyberattacks Target COVID-19 Research, Vaccine Development ๐Ÿ•ด

Government agencies in the US, UK, and Canada report Russian group Cozy Bear is targeting organizations developing coronavirus vaccines.

๐Ÿ“– Read

via "Dark Reading: ".
14:49
๐Ÿ” How to protect your Twitter account from being hacked ๐Ÿ”

Following the hacks of verified Twitter accounts for several high-profile people, including Bill Gates and Joe Biden, how can you prevent your own account from falling into the wrong hands?

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ State-Sponsored Hackers Look to Steal COVID-19 Vaccine Research โŒ

The Russia-linked APT29 has set its sights on pharma research in Western nations in a likely attempt to get ahead on a cure for coronavirus.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Cybersecurity Leaders: Invest In Your People ๐Ÿ•ด

Training, especially cross-training, is insanely powerful when team members are able to experience, train, and work together. It also builds trust.

๐Ÿ“– Read

via "Dark Reading: ".
15:49
๐Ÿ” Cybercriminals disguising as top streaming services to spread malware ๐Ÿ”

Malicious actors are posing as Netflix, Hulu, and more, to launch phishing attacks, steal passwords, launch spam, and distribute viruses.

๐Ÿ“– Read

via "Security on TechRepublic".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Twitter Attack Raises Concerns Over its Internal Controls ๐Ÿ•ด

Attackers temporarily gained control of the accounts of Joe Biden, Barack Obama, Bill Gates, and others, to tweet a bitcoin scam.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Falco 0.24.0 ๐Ÿ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด EU Court Ruling Means New Global Protections for EU Customer Data ๐Ÿ•ด

The ruling in a case involving Facebook means that international companies must provide EU-level privacy controls for EU-generated data no matter where it's stored or transferred.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20915

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in bit_write_TF in bits.c.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20914

An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_common_entity_handle_data in common_entity_handle_data.spec.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20913

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20912

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a stack overflow in bits.c, possibly related to bit_read_TF.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20911

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to denial of service in bit_calc_CRC in bits.c, related to a for loop.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20910

An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in decode_R13_R2000 in decode.c, a different vulnerability than CVE-2019-20011.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20909

An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ Enterprise Data Security: Itโ€™s Time to Flip the Established Approach โŒ

Companies should forget about auditing where data resides and who has access to it.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Major Flaws Open the Edge to Attack ๐Ÿ•ด

Attackers are using critical exploits for flaws in VPN appliances, app-delivery services, and other network-edge hardware and software to punch through corporate perimeters. What can companies do?

๐Ÿ“– Read

via "Dark Reading: ".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 8 Signs of a Smartphone Hack ๐Ÿ•ด

A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.

๐Ÿ“– Read

via "Dark Reading: ".
17 July 2020
?
11:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” CISOs discuss cybersecurity in the COVID-19 environment ๐Ÿ”

A digital panel discussion sponsored by MIT's Sloan CIO Digital Learning Series covered a range of topics from protecting remote workers to phishing to how to manage risk.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Appleโ€™s latest updates are out for iPhones and Macs โ€“ get them now! โš 

None of Apple's bugs have nicknames like Microsoft's recent "SIGRed" - but there are nevertheless kernel-level code holes to be patched...

๐Ÿ“– Read

via "Naked Security".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to install Malware Information Sharing Platform on Ubuntu Server 18.04 ๐Ÿ”

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ CISA Emergency Directive Orders Immediate Fix of Windows DNS Server Bug โŒ

An emergency directive orders some federal agencies to apply Microsoftโ€™s patch for a critical DNS vulnerability by Friday, July 17 at 2 p.m. (ET).

๐Ÿ“– Read

via "Threatpost".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Phishing: Email fraudsters are impersonating colleagues, customers, and vendors, report says ๐Ÿ”

Nearly a third of professionals said they have to remediate email-based attacks every day, GreatHorn found.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Twitter Hack Update: What We Know (and What We Donโ€™t) โŒ

With limited confirmed information, a raft of theories and circumstantial evidence has come to light as to who was behind the attack and how they carried it out.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Cybercriminals Targeted Streaming Services to Provide Pandemic Entertainment ๐Ÿ•ด

Prior to 2020, about 1 in 5 credential attacks targeted video services, but that's nothing compared to the first quarter of 2020, according to newly published data.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Election Security: Recovering from 2016, Looking Toward 2020 ๐Ÿ•ด

Researchers publish the results of a four-year investigation and discuss whether the US is ready to secure its largest elections.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Friday Five: 7/17 Edition ๐Ÿ”

US Secret Service forms a cyber fraud task force, Twitter deals with the hacking of high-profile Twitter accounts, and more - catch up on all the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
16:53
๐Ÿ›  Sifter 8.5 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
16:53
๐Ÿ›  SMB12 Information Gathering ๐Ÿ› 

SMB12 Information Gathering is a data gathering python script that inspects SMB1 and SMB2 endpoints. It will extract various attributes from the remote server such as OS version (only supported by SMB1 as per protocol definition), DNS computer name, DNS domain name, NetBIOS computer name and NetBIOS domain name (SMB1 and SMB2).

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
18:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Thousands of Vulnerable F5 BIG-IP Users Still Open to Takeover โŒ

Less than 500 machines have been patched since U.S. Cyber Command issued an alert to patch a critical bug that's under active exploit.

๐Ÿ“– Read

via "Threatpost".
?
18:36
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Emotet Lives! ๐Ÿ•ด

Emotet malware has back to action after a four-month hiatus that allowed cybersecurity experts to worry about other things.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-4090

"HCL Campaign is vulnerable to cross-site scripting when a user provides XSS scripts in Campaign Description field."

๐Ÿ“– Read

via "National Vulnerability Database".
?
20:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” This new open source project could be key to securing database applications ๐Ÿ”

Commentary: Cyral has been on a roll with two open source projects designed to make security a natural part of the development workflow.

๐Ÿ“– Read

via "Security on TechRepublic".
18 July 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-12000

HPE has found a potential Remote Access Restriction Bypass in HPE MSE Msg Gw application E-LTU prior to version 3.2 when HTTPS is used between the USSD and an external USSD service logic application. Update to version 3.2 and update the HTTPS configuration as described in the HPE MSE Messaging Gateway Configuration and Operations Guide.

๐Ÿ“– Read

via "National Vulnerability Database".
20 July 2020
?
07:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Monday review โ€“ the hot stories of the week โš 

Catch up on the past week's stories, and watch our latest Naked Security Live video.

๐Ÿ“– Read

via "Naked Security".
?
08:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Microsoft Defender ATP for Android: This security software can help protect your devices and data ๐Ÿ”

Microsoft recently announced its first Android security tooling. But what is it for, and should you deploy it to your users?

๐Ÿ“– Read

via "Security on TechRepublic".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Keys for a Safe Return to the Post-Coronavirus Office ๐Ÿ•ด

Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.

๐Ÿ“– Read

via "Dark Reading: ".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Paving the Path to Passwordless โŒ

Password management tools and apps can help ease the pain of passwords, but even those donโ€™t totally solve all of the password challenges all of the time.ย 

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด What Organizations Need to Know About IoT Supply Chain Risk ๐Ÿ•ด

Here are some factors organizations should consider as they look to limit the risk posed by risks like Ripple20.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Cybersecurity spending to grow this year but may be hit by budget constraints ๐Ÿ”

Spending on security products and services for 2020 could increase as much as 5.6%, or as little as 2.5%, depending on the economic impact of the coronavirus on IT budgets, says Canalys.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Keys for a Safe Return to the Post-Quarantine Office ๐Ÿ•ด

Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.

๐Ÿ“– Read

via "Dark Reading: ".
13:47
๐Ÿ” What is Cloud Security? ๐Ÿ”

With more businesses running vital business computing functions in the cloud today, cloud security is a must as attackers seek to exploit vulnerabilities and gain unauthorized access to sensitive data. In this post, weโ€™ll talk about the benefits of cloud security as well as some best practices to follow.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Mac Cryptocurrency Traders Targeted by Trojanized Apps โŒ

Four trojanized cryptocurrency trading apps have been found spreading malware that drains cryptocurrency wallets and collects Mac users' browsing data.

๐Ÿ“– Read

via "Threatpost".
?
14:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  7 VPNs that leaked their logs โ€“ the logs that โ€œdidnโ€™t existโ€ โš 

Just how private is your Virtual Private Network?

๐Ÿ“– Read

via "Naked Security".
?
14:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Phishing attacks aim to steal sensitive data by prompting people to renew Microsoft subscription ๐Ÿ”

The initial scam emails claim that the recipient must renew their Microsoft Office 365 subscription, says Abnormal Security.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Facebookโ€™s NSO Group Lawsuit Over WhatsApp Spying Set to Proceed โŒ

A federal judge in California ruled that the spyware vendor does not have sovereign immunity.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด UK Data Privacy Legislation Cannot Be Bypassed to Limit Spread of COVID-19 ๐Ÿ•ด

The UK faces GDPR data privacy challenges regarding its COVID-19 "Test and Trace" program. Despite the importance of contact tracing, its intent to ignore privacy legislation is extremely worrying.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  nfstream 5.2.0 ๐Ÿ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
16:53
๐Ÿ›  Scapy Packet Manipulation Tool 2.4.4rc1 ๐Ÿ› 

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด England 'Test and Trace' Program Violates GDPR Privacy Law ๐Ÿ•ด

The UK government confirms the program launched in May without a Data Protection Impact Assessment, as required under GDPR.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Number of Reported Breaches Decrease In First Half of 2020 ๐Ÿ•ด

With the pandemic as a backdrop, publicly reported US data breaches dropped as more employees and suppliers stayed home.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด SIGRed: What You Should Know About the Windows DNS Server Bug ๐Ÿ•ด

DNS experts share their thoughts on the wormable vulnerability and explain why it should be a high priority for businesses.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Internet Scan Shows Decline in Insecure Network Services ๐Ÿ•ด

While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.

๐Ÿ“– Read

via "Dark Reading: ".
?
21:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Twitter Breach Highlights Privileged Account Security Issue ๐Ÿ•ด

Security incident that allowed attackers to hijack high-profile accounts suggests social media giant's controls for spotting insider abuse were not strong enough, security experts say.

๐Ÿ“– Read

via "Dark Reading: ".
21 July 2020
?
07:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Companies with poor privacy practices are 80% more apt to suffer data breach ๐Ÿ”

Poor privacy=data breach as reported by Osano was proven July 15 when Twitter was hacked and 130 accounts--including Joe Biden's and Kanye West's--were exposed.

๐Ÿ“– Read

via "Security on TechRepublic".
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Google Cloud adds 11 security features to G Suite ๐Ÿ”

The updates include BIMI in Gmail, better protection in Meet, phishing protections in Chat, and more.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Diebold ATM Terminals Jackpotted Using Machineโ€™s Own Software โŒ

The company warned that cybercriminals are using a black box with proprietary code in attacks to illegally dispense cash across Europe.

๐Ÿ“– Read

via "Threatpost".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Phishing attacks hiding in Google Cloud to steal Microsoft account credentials ๐Ÿ”

By hosting phishing pages at a legitimate cloud service, cybercriminals try to avoid arousing suspicion, says Check Point Research.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Leading Through Uncertainty: Be Proactive in Your Dark Web Intelligence Strategy ๐Ÿ•ด

Having a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” 5 apps for cleaning and speeding up your PC ๐Ÿ”

Before you ditch your slow computer in favor of a new model, try using one of these apps to clean and speed it up.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical Adobe Photoshop Flaws Patched in Emergency Update โŒ

Adobe issued out-of-band patches for critical flaws tied to 12 CVEs in Photoshop and other applications.

๐Ÿ“– Read

via "Threatpost".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด G Suite Security Updates Bring New Features to Gmail, Meet & Chat ๐Ÿ•ด

New security features include support for a new standard in Gmail, phishing protection in Chat, and additional admin controls.

๐Ÿ“– Read

via "Dark Reading: ".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2018-21036

Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.

๐Ÿ“– Read

via "National Vulnerability Database".
?
14:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” What is Threat Intelligence? ๐Ÿ”

Threat intelligence is what becomes of data after it has been gathered, processed, and analyzed. Organizations can use threat intelligence against cyber threats. In this article, weโ€™ll discuss what threat intelligence is, its types, how it works, and why itโ€™s important.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด The Data Privacy Loophole Federal Agencies Are Still Missing ๐Ÿ•ด

Why knowledge-based authentication is leaving federal contact centers vulnerable to an increasingly sophisticated hacker community.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2016-7064

A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakage

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2016-7063

A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.

๐Ÿ“– Read

via "National Vulnerability Database".
16:09
โŒ Chris Vickery: AI Will Drive Tomorrowโ€™s Data Breaches โŒ

Chris Vickery talks about his craziest data breach discoveries and why "vishing" is the next top threat no one's ready for.

๐Ÿ“– Read

via "Threatpost".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2015-5238

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-3796. Reason: This candidate is a reservation duplicate of CVE-2015-3796. Notes: All CVE users should reference CVE-2015-3796 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Fortinet Buys Cloud Security Firm OPAQ ๐Ÿ•ด

The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Microsoft 365 Updated with New Security, Risk, Compliance Tools ๐Ÿ•ด

Updates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด US Indicts 2 Chinese Nationals for Stealing IP & Business Secrets, Including COVID-19 Research ๐Ÿ•ด

Pair working on behalf of themselves and China's Ministry of State Security, Justice Department says.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด The State of Hacktivism in 2020 ๐Ÿ•ด

Activism via hacking might not be as noisy as it once was, but it hasn't been silenced yet.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Emotet Returns in Malspam Attacks Dropping TrickBot, QakBot โŒ

Emotet has resurfaced after a five-month hiatus, with more than 250,000 malspam messages being sent to email recipients worldwide.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records ๐Ÿ•ด

China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.

๐Ÿ“– Read

via "Dark Reading: ".
22 July 2020
?
07:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Remote working: We're stressed and distracted and making these security errors ๐Ÿ”

Stress, burnout and distractions in the home could result in more cybersecurity breaches as a result of human error, a report from Tessian has found.

๐Ÿ“– Read

via "Security on TechRepublic".
07:55
ATENTIONโ€ผ New - CVE-2020-12774

D-Link DSL-7740C does not properly validate user input, which allows an authenticated LAN user to inject arbitrary command.

๐Ÿ“– Read

via "National Vulnerability Database".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Leak Exposes Private Data of Genealogy Service Users โŒ

An exposed ElasticSearch server belonging to Software MacKiev put 60,000 users of Ancestry.comโ€™s Family Tree Maker software at risk.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Cybersecurity Lessons from the Pandemic ๐Ÿ•ด

How does cybersecurity support business and society? The pandemic shows us.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Q&A: How Systemic Racism Weakens Cybersecurity ๐Ÿ•ด

Cybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry - and build a more diverse and representative workforce.

๐Ÿ“– Read

via "Dark Reading: ".
12:49
๐Ÿ” Phishing is the leading type of COVID-19 fraud ๐Ÿ”

TransUnion surveyed consumers in six countries and found that phishing was the preferred method of attack 27% of the time.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Threat actors have evolved during the pandemic ๐Ÿ”

McAfee sees a surge of COVID-19-themed malicious apps and other attacks in the first quarter.

๐Ÿ“– Read

via "Security on TechRepublic".
13:49
๐Ÿ” How cybercriminals have exploited the coronavirus pandemic ๐Ÿ”

Phishing campaigns, deceptive domains, and malicious apps are just some of the tactics that have taken advantage of the virus and its repercussions, says Check Point Research.

๐Ÿ“– Read

via "Security on TechRepublic".
13:55
ATENTIONโ€ผ New - CVE-2019-18619

Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-18618

Incorrect access control in the firmware of Synaptics VFS75xx family fingerprint sensors that include external flash (all versions prior to 2019-11-15) allows a local administrator or physical attacker to compromise the confidentiality of sensor data via injection of an unverified partition table.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware โŒ

An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group - since 2013.

๐Ÿ“– Read

via "Threatpost".
14:09
โŒ Lazarus Group Surfaces with Advanced Malware Framework โŒ

The North Korean APT has been using the framework, called MATA, for a number of purposes, from spying to financial gain.

๐Ÿ“– Read

via "Threatpost".
?
14:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Logwatch 7.5.4 ๐Ÿ› 

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด The InfoSec Barrier to AI ๐Ÿ•ด

Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-16244

OMERO.server before 5.6.1 allows attackers to bypass the security filters and access hidden objects via a crafted query.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด COVID-19-Related Attacks Exploded in the First Half of 2020 ๐Ÿ•ด

COVID-19 as part of a cyberattack increased by more than 3,900% between February and June.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด Ripple20's Effects Will Impact IoT Cybersecurity for Years to Come ๐Ÿ•ด

A series of newly discovered TCP/IP software vulnerabilities pose a threat to millions of IoT devices. Undiscovered since the early 1990s, they highlight the need to improve security in an increasingly precarious IoT supply chain.

๐Ÿ“– Read

via "Dark Reading: ".
16:49
๐Ÿ” Phishing attacks and ransomware are the most challenging threats for many organizations ๐Ÿ”

Unpatched systems and misconfigurations are also major concerns for security professionals, Balbix says.

๐Ÿ“– Read

via "Security on TechRepublic".
16:49
๐Ÿ” How to add two-factor authentication to the Bitwarden desktop client ๐Ÿ”

If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.

๐Ÿ“– Read

via "Security on TechRepublic".
16:49
๐Ÿ” How to add two-factor authentication to the Bitwarden desktop client ๐Ÿ”

If you've added two-factor authentication to Bitwarden, but are wondering why it's not working on the desktop client, fear not. Jack Wallen shows you how to unlock this particular magic.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด North Korea's Lazarus Group Developing Cross-Platform Malware Framework ๐Ÿ•ด

The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux.

๐Ÿ“– Read

via "Dark Reading: ".
17:47
๐Ÿ” Our Ongoing Investments to Make it Easier to Switch from Symantec DLP ๐Ÿ”

When Broadcom acquired Symantec in the fall of 2019, there were many questions in the market from their customer base. Many of them came to us asking for assistance in protecting their most critical data and reducing their vendor uncertainty.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
17:55
ATENTIONโ€ผ New - CVE-2014-1422

In Ubuntu's trust-store, if a user revokes location access from an application, the location is still available to the application because the application will honour incorrect, cached permissions. This is because the cache was not ordered by creation time by the Select struct in src/core/trust/impl/sqlite3/store.cpp. Fixed in trust-store (Ubuntu) version 1.1.0+15.04.20150123-0ubuntu1 and trust-store (Ubuntu RTM) version 1.1.0+15.04.20150123~rtm-0ubuntu1.

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด CISA Hires Security Experts to Boost COVID-19 Response ๐Ÿ•ด

The agency brings in expertise from the private sector to improve its technical capabilities and engagement with industry partners.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Apple Security Research Device Program Draws Mixed Reactions โŒ

Apple's Security Research Device program is now open to select researchers - but some are irked by the program's vulnerability disclosure restrictions.

๐Ÿ“– Read

via "Threatpost".
19:09
โŒ OilRig APT Drills into Malware Innovation with Unique Backdoor โŒ

The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside images.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด VC Investment in Cybersecurity Dips & Shifts with COVID-19 ๐Ÿ•ด

While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.

๐Ÿ“– Read

via "Dark Reading: ".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Surge in Consumer-Grade IoT Devices Undermining Enterprise Security ๐Ÿ•ด

Individuals and business groups are connecting everything from Amazon Echo devices to data-sampling sensors on networks with sensitive systems with little regard to safety, two reports show.

๐Ÿ“– Read

via "Dark Reading: ".
?
21:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10917

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10007.

๐Ÿ“– Read

via "National Vulnerability Database".
23 July 2020
?
03:42
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
B
Borrado 23.07.2020 03:41:07
โ€‹โ€‹๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ

Have you seen ๐Ÿ‘€ these Telegram channels ๐Ÿ“จ?

๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ๐ŸงŸโ€โ™‚๏ธ๐ŸงŸโ€โ™€๏ธ๐ŸงŸ
?
07:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Hiring managers should look outside traditional tech hubs to fill cybersecurity jobs ๐Ÿ”

Security professionals are still in high demand amid layoffs in other sectors, a new report finds.

๐Ÿ“– Read

via "Security on TechRepublic".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 8 Cybersecurity Themes to Expect at Black Hat USA 2020 ๐Ÿ•ด

Here are the trends and topics that'll capture the limelight at next month's virtual event.

๐Ÿ“– Read

via "Dark Reading: ".
09:49
๐Ÿ” Hackers will lurk in your email for more than a week after breaking in ๐Ÿ”

Beware - cybercriminals could be spending days rooting around in employee inboxes for information they can sell to other crooks, or use to mount further attacks.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Twitter: Hackers Accessed Private Messages for Elite Accounts โŒ

A Dutch elected official is among those whose DMs were hijacked, the company said.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Deepfakes & James Bond Research Project: Cool but Dangerous ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
11:47
๐Ÿ” Best Practices for Data Security in Hybrid Environments ๐Ÿ”

20 Data Security Experts Share Best Practices for Data Security in Hybrid Environments.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Vulnerable Invisible Salamanders and You: A Tale of Encryption Weakness ๐Ÿ•ด

A Black Hat presentation will discuss how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.

๐Ÿ“– Read

via "Dark Reading: ".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Cisco, Zoom and Others Must Bolster Security, Say Privacy Chiefs โŒ

Privacy commissioners worldwide urged video conferencing systems like Microsoft, Cisco and Zoom to adopt end-to-end encryption, two-factor authentication and other security measures.

๐Ÿ“– Read

via "Threatpost".
13:09
โŒ ASUS Home Router Bugs Open Consumers to Snooping Attacks โŒ

The two flaws allow man-in-the-middle attacks that would give an attacker access to all data flowing through the router.

๐Ÿ“– Read

via "Threatpost".
?
13:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Sports team nearly paid a $1.25m transfer feeโ€ฆ to cybercrooks โš 

If a crook is already inside your email, occasionally adding in believable emails of their own... how on earth do you spot the fake ones?

๐Ÿ“– Read

via "Naked Security".
?
13:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Malware is down, but IoT and ransomware attacks are up ๐Ÿ”

Malicious attacks disguised as Microsoft Office files increased 176%, according to SonicWall's midyear threat report.

๐Ÿ“– Read

via "Security on TechRepublic".
13:55
ATENTIONโ€ผ New - CVE-2020-11440

httpRpmFs in WebCLI in Wind River VxWorks 5.5 through 7 SR0640 has no check for an escape from the web root.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-11252

The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Sharp Spike in Ransomware in U.S. as Pandemic Inspires Attackers โŒ

COVID-19 has changed the face of cybercrime, as the latest malware statistics show.

๐Ÿ“– Read

via "Threatpost".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด CouchSurfing Investigates Potential Data Breach ๐Ÿ•ด

The service has reportedly hired a security firm after 17 million user records were found on a public hacking forum.

๐Ÿ“– Read

via "Dark Reading: ".
?
14:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 8.5_2 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Data Privacy Challenges for California COVID-19 Contact Tracing Technology ๐Ÿ•ด

Developers, governments, and regulators must work with the cybersecurity industry to apply rigorous standards to contact-tracing apps to make sure that the societal impact of COVID-19 doesn't extend into personal privacy.

๐Ÿ“– Read

via "Dark Reading: ".
15:49
๐Ÿ” How to enable guest accounts from the lock screen in Android ๐Ÿ”

If you frequently hand your phone over to others, Guest Mode is a feature you should be using on Android. Jack Wallen shows you how to access the feature from your lock screen.

๐Ÿ“– Read

via "Security on TechRepublic".
15:55
ATENTIONโ€ผ New - CVE-2020-12638

An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryption.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-10922

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the EA-HTTP.exe process. The issue results from the lack of proper input validation prior to further processing user requests. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-10527.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-10921

This vulnerability allows remote attackers to issue commands on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the EA-HTTP.exe process. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to issue commands to the physical equipment controlled by the device. Was ZDI-CAN-10482.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-10920

This vulnerability allows remote attackers to execute arbitrary code on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the control service, which listens on TCP port 9999 by default. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-10493.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-10919

This vulnerability allows remote attackers to disclose sensitive information on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. When transmitting passwords, the process encrypts them in a recoverable format using a hard-coded key. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-10185.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-10918

This vulnerability allows remote attackers to bypass authentication on affected installations of C-MORE HMI EA9 Firmware version 6.52 touch screen panels. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authentication mechanism. The issue is due to insufficient authentication on post-authentication requests. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from unauthenticated users. Was ZDI-CAN-10182.

๐Ÿ“– Read

via "National Vulnerability Database".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Garmin Suffers Reported Ransomware Attack โŒ

Garmin's services, websites and customer service have all been down since Wednesday night.

๐Ÿ“– Read

via "Threatpost".
17:09
โŒ Cisco Network Security Flaw Leaks Sensitive Data โŒ

The flaw exists in Cisco's network security Firepower Threat Defense (FTD) software and its Adaptive Security Appliance (ASA) software.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Twitter Breach a Reminder of Need to Protect Corporate Social Media Use ๐Ÿ•ด

Intruders had access to direct messages associated with 36 accounts in last week's attack, social media giant discloses.

๐Ÿ“– Read

via "Dark Reading: ".
17:49
๐Ÿ” A quick and easy way to lock down SSH ๐Ÿ”

Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.

๐Ÿ“– Read

via "Security on TechRepublic".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด DNA Site Leaves Records Open to Law Enforcement ๐Ÿ•ด

A pair of breaches reset user accounts to allow access for two days.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” The challenges and opportunities of shadow IT ๐Ÿ”

The shadow IT genie is out of the bottle and offers benefits and threats. Learn some tips from the experts on how to effectively harness shadow IT in your company.

๐Ÿ“– Read

via "Security on TechRepublic".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Fundamentals of Network Traffic Decryption and Risk Management ๐Ÿ•ด

Visibility into and inspection of inbound encrypted network traffic is essential for sound enterprise network security. Decryption approaches must soon change due to increasing cost and complexity, but alternative technologies are emerging.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Twilio Security Incident Shows Danger of Misconfigured S3 Buckets ๐Ÿ•ด

Twilio says attackers accessed its misconfigured cloud storage system and altered a copy of the JavaScriptSDK it shares with customers.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-11625

An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. Failed web UI login attempts elicit different responses depending on whether a user account exists. Because the responses indicate whether a submitted username is valid or not, they make it easier to identify legitimate usernames. If a login request is sent to ISAPI/Security/sessionLogin/capabilities using a username that exists, it will return the value of the salt given to that username, even if the password is incorrect. However, if a login request is sent using a username that is not present in the database, it will return an empty salt value. This allows attackers to enumerate legitimate usernames, facilitating brute-force attacks. NOTE: this is different from CVE-2020-7057.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-11624

An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. They do not require users to change the default password for the admin account. They only show a pop-up window suggesting a change but there's no enforcement. An administrator can click Cancel and proceed to use the device without changing the password. Additionally, they disclose the default username within the login.js script. Since many attacks for IoT devices, including malware and exploits, are based on the usage of default credentials, it makes these cameras an easy target for malicious actors.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-11623

An issue was discovered in AvertX Auto focus Night Vision HD Indoor/Outdoor IP Dome Camera HD838 and Night Vision HD Indoor/Outdoor Mini IP Bullet Camera HD438. An attacker with physical access to the UART interface could access additional diagnostic and configuration functionalities as well as the camera's bootloader. Successful exploitation could compromise confidentiality, integrity, and availability of the affected system. It could even render the device inoperable.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2019-18834

Persistent XSS in the WooCommerce Subscriptions plugin before 2.6.3 for WordPress allows remote attackers to execute arbitrary JavaScript because Billing Details are mishandled in WCS_Admin_Post_Types in class-wcs-admin-post-types.php.

๐Ÿ“– Read

via "National Vulnerability Database".
24 July 2020
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Malicious โ€˜Blurโ€™ Photo App Campaign Discovered on Google Play โŒ

Twenty-nine bad mobile apps with a combined 3.5 million downloads bombard users with out-of-context ads.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Banning TikTok Won't Solve Our Privacy Problems ๐Ÿ•ด

Preventing the use of an apps based solely on its country of origin (no matter how hostile) is merely a Band-Aid that won't fully address all privacy and security concerns.

๐Ÿ“– Read

via "Dark Reading: ".
11:34
๐Ÿ•ด Email Security Features Fail to Prevent Phishable 'From' Addresses ๐Ÿ•ด

The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.

๐Ÿ“– Read

via "Dark Reading: ".
11:47
๐Ÿ” Friday Five: 7/24 Edition ๐Ÿ”

A new phishing campaign abuses enterprise cloud services, BadPower attack could set your device on fire, and the UK sports industryย under near constant cyber attack - catch up on all the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
11:53
๐Ÿ›  Sifter 8.6 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
12:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  ASUS routers could be reflashed with malware โ€“ patch now! โš 

Responsible disclosure means the bugs are already fixed - but don't forget to check that you applied the patch.

๐Ÿ“– Read

via "Naked Security".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Companies turning to isolation technology to protect against the internet's biggest threats ๐Ÿ”

Isolation technology allows companies to keep employee browsers siloed in the cloud.

๐Ÿ“– Read

via "Security on TechRepublic".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags โŒ

Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.

๐Ÿ“– Read

via "Threatpost".
14:09
โŒ NSA Urgently Warns on Industrial Cyberattacks, Triconex Critical Bug โŒ

Power plants, factories, oil and gas refineries and more are all in the sights of foreign adversaries, the U.S. warns.

๐Ÿ“– Read

via "Threatpost".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Rise of the Robots: How You Should Secure RPA ๐Ÿ•ด

Robotic Process Automation (RPA) is the next big thing in innovation and digital strategy. But what security details are overlooked in the rush to implement bots?

๐Ÿ“– Read

via "Dark Reading: ".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Access to Internal Twitter Admin Tools Is Widespread ๐Ÿ•ด

More than 1,000 individuals have access to tools that could have aided the attackers in the recent Twitter attack on high-profile accounts.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Remote Work Could Help Cybersecurity's Diversity Problem - But Will It? ๐Ÿ•ด

Job market data from the second quarter suggests there are increasing opportunities for women and minorities in the world of remote work, but long-standing biases may provide resistance.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ DJI Drone App Riddled With Privacy Issues, Researchers Allege โŒ

The DJI GO 4 application open usersโ€™ sensitive data up for the taking, researchers allege.

๐Ÿ“– Read

via "Threatpost".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Garmin Takes App & Services Offline After Suspected Ransomware Attack ๐Ÿ•ด

Wearables company Garmin shut down its website, app, call centers, and other services in the aftermath of a security incident.

๐Ÿ“– Read

via "Dark Reading: ".
16:49
๐Ÿ” DevSecOps tutorial: What is it, and how can it improve application security? ๐Ÿ”

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve security.

๐Ÿ“– Read

via "Security on TechRepublic".
16:49
๐Ÿ” Social engineering: A cheat sheet for business professionals ๐Ÿ”

People, like computers, can be hacked using a process called social engineering, and there's a good chance a cybersecurity attack on your organization could start with this technique.

๐Ÿ“– Read

via "Security on TechRepublic".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Organizations Continue to Struggle With App Vulns ๐Ÿ•ด

A high percentage of discovered bugs remain unremediated for a long time, a new study shows.

๐Ÿ“– Read

via "Dark Reading: ".
?
21:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10610

In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.

๐Ÿ“– Read

via "National Vulnerability Database".
21:55
ATENTIONโ€ผ New - CVE-2020-10608

In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.

๐Ÿ“– Read

via "National Vulnerability Database".
21:55
ATENTIONโ€ผ New - CVE-2020-10606

In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.

๐Ÿ“– Read

via "National Vulnerability Database".
21:55
ATENTIONโ€ผ New - CVE-2020-10602

In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data Archive.

๐Ÿ“– Read

via "National Vulnerability Database".
21:55
ATENTIONโ€ผ New - CVE-2020-10600

In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Archive Subsystem when the subsystem is working under memory pressure. This can result in blocking queries to PI Data Archive.

๐Ÿ“– Read

via "National Vulnerability Database".
25 July 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10614

In OSIsoft PI System multiple products and versions, an authenticated remote attacker with write access to PI Vision databases could inject code into a display. Unauthorized information disclosure, deletion, or modification is possible if a victim views the infected display.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-10604

In OSIsoft PI System multiple products and versions, a remote, unauthenticated attacker could crash PI Network Manager service through specially crafted requests. This can result in blocking connections and queries to PI Data Archive.

๐Ÿ“– Read

via "National Vulnerability Database".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 7 Summer Travel Security Tips ๐Ÿ•ด

With staying safe during the pandemic high priority, it's easy to let your guard down about the security of the devices you take along your travels.

๐Ÿ“– Read

via "Dark Reading: ".
27 July 2020
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Block/Allow: The Changing Face of Hacker Linguistics ๐Ÿ•ด

Terms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.

๐Ÿ“– Read

via "Dark Reading: ".
?
10:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  ProLock ransomware โ€“ new report reveals the evolution of a threat โš 

Ransomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they'd never pay up.

๐Ÿ“– Read

via "Naked Security".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Pandemic Credential Stuffing: Cybersecurity's Ultimate Inside Job ๐Ÿ•ด

How stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Which workers are your biggest security nightmare? It might not be the people you expect ๐Ÿ”

Businesses need to approach cybersecurity in a way that resonates with employees, namely by putting them at the centre.

๐Ÿ“– Read

via "Security on TechRepublic".
11:55
ATENTIONโ€ผ New - CVE-2020-11110

Grafana through 6.7.1 allows stored XSS.

๐Ÿ“– Read

via "National Vulnerability Database".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Encryption Under โ€˜Full-Frontal Nuclear Assaultโ€™ By U.S. Bills โŒ

The U.S. government and tech companies continue to butt heads over the idea of encryption and what that means for law enforcement.

๐Ÿ“– Read

via "Threatpost".
?
13:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Monday review โ€“ our recent stories revisited โš 

Our most recent articles and videos, all in one place.

๐Ÿ“– Read

via "Naked Security".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Attackers Exploiting High-Severity Network Security Flaw, Cisco Warns โŒ

Attackers are exploiting a high-severity vulnerability in Cisco's network security software products, which is used by Fortune 500 companies.

๐Ÿ“– Read

via "Threatpost".
?
14:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” What is AWS Security? ๐Ÿ”

Amazon Web Services (AWS) is a leading cloud service provider, equipped with various security features. In this post, weโ€™ll discuss the security components that make AWS a secure cloud platform.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
15:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 8.7 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
15:53
๐Ÿ›  Scapy Packet Manipulation Tool 2.4.4rc2 ๐Ÿ› 

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-1425

A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1457.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10609

Grundfos CIM 500 v06.16.00 stores plaintext credentials, which may allow sensitive information to be read or allow modification to system settings by someone with access to the device.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ Microsoft Revamps Windows Insider Preview Bug Bounty Program โŒ

Researchers can earn up to $100,000 for finding vulnerabilities in Microsoft's revamped Windows Insider Preview bug bounty program.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Ratings for Open Source Projects Aim to Make Software More Secure ๐Ÿ•ด

Two companies have teamed up to rate open source projects, but can adopting repository ratings help developers make better decisions regarding open source?

๐Ÿ“– Read

via "Dark Reading: ".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด ShinyHunters Offers Stolen Data on Dark Web ๐Ÿ•ด

The threat actor offers more than 26 million records from a series of data breaches.

๐Ÿ“– Read

via "Dark Reading: ".
?
21:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-12460

OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null termination in the function opendmarc_xml_parse that can result in a one-byte heap overflow in opendmarc_xml when parsing a specially crafted DMARC aggregate report. This can cause remote memory corruption when a '\0' byte overwrites the heap metadata of the next chunk and its PREV_INUSE flag.

๐Ÿ“– Read

via "National Vulnerability Database".
21:55
ATENTIONโ€ผ New - CVE-2020-10643

An authenticated remote attacker could use specially crafted URLs to send a victim using PI Vision 2019 mobile to a vulnerable web page due to a known issue in a third-party component.

๐Ÿ“– Read

via "National Vulnerability Database".
28 July 2020
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Why security professionals are facing more work stress ๐Ÿ”

A lack of time and a lack of executive support are two of the top causes of stress, according to a LogRhythm report.

๐Ÿ“– Read

via "Security on TechRepublic".
09:49
๐Ÿ” Distance learning makes universities more vulnerable to cyberattack ๐Ÿ”

Expert suggests universities take extra care to prevent attacks while students are learning from home.

๐Ÿ“– Read

via "Security on TechRepublic".
09:49
๐Ÿ” Distance learning makes universities more vulnerable to cyberattack ๐Ÿ”

Expert suggests universities take extra care to prevent attacks while students are learning from home.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Researchers Warn of High-Severity Dell PowerEdge Server Flaw โŒ

A path traversal vulnerability in the iDRAC technology can allow remote attackers to take over control of server operations.

๐Ÿ“– Read

via "Threatpost".
11:09
โŒ Podcast: Security Lessons Learned In Times of Uncertainty โŒ

Derek Manky, Chief, Security Insights & Global Threat Alliances atย Fortinet's FortiGuard Labs, discusses the top threats and lessons learned from the first half of 2020.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด As Businesses Move to the Cloud, Cybercriminals Follow Close Behind ๐Ÿ•ด

In the wake of COVID-19, data theft is by far the top tactic, followed by cryptomining and ransomware.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Zeek 3.1.5 ๐Ÿ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
11:55
ATENTIONโ€ผ New - CVE-2019-4731

IBM MQ Appliance 9.1.4.CD could allow a local attacker to obtain highly sensitive information by inclusion of sensitive data within trace. IBM X-Force ID: 172616.

๐Ÿ“– Read

via "National Vulnerability Database".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Box announces added security to Box Shield solution with automation classification ๐Ÿ”

Using machine learning, Shield automatically scans files and classifies them based on content, detecting and securing sensitive information.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13915

Insecure permissions in emfd/libemf in Ruckus Wireless Unleashed through 200.7.10.102.92 allow a remote attacker to overwrite admin credentials via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13914

webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to cause a denial of service (Segmentation fault) to the webserver via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13913

An XSS issue in emfd in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute JavaScript code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.

๐Ÿ“– Read

via "National Vulnerability Database".
?
14:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Firefox 79 is out โ€“ itโ€™s a double-update month so patch now! โš 

It's a Blue Moon month for Firefox - the second full update in July!

๐Ÿ“– Read

via "Naked Security".
?
14:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Experts: Devastating ransomware attack on Garmin highlights danger of haphazard breach responses ๐Ÿ”

The GPS maker scrambled to contain the aftermath of an attack as employees took to social media to describe what was happening.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Autonomous IT: Less Reacting, More Securing ๐Ÿ•ด

Keeping data secure requires a range of skills and perfect execution. AI makes that possible.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด 7.5M Banking Customers Affected in Dave Security Breach ๐Ÿ•ด

The financial services app confirms user data was compromised in a data breach at its former third-party provider, WayDev.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Researchers Foil Phishing Attempt on Netflix Customers ๐Ÿ•ด

Hackers use two stolen domains to steal credentials from Netflix users and then send them to the real Netflix site.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness ๐Ÿ•ด

More than 80% of companies have at least one Internet-facing cloud asset that is more than six months out of date or running software that is no longer supported, according to scan data.

๐Ÿ“– Read

via "Dark Reading: ".
16:47
๐Ÿ” US Indicts Two Chinese Hackers Following Theft of Trade Secrets ๐Ÿ”

The two hackers were also linked to attempts to hack American biotech firms working on a coronavirus (COVID-19) vaccine.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
16:49
๐Ÿ” Facebook data privacy scandal: A cheat sheet ๐Ÿ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10930

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of URLs. The issue results from the lack of proper routing of URLs. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-9618.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10929

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-9768.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10928

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9767.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10927

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the encryption of firmware update images. The issue results from the use of an inappropriate encryption algorithm. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9649.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10926

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from the lack of proper validation of the firmware image prior to performing an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9648.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10925

This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9647.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10924

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-10923

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642.

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Avon Server Leaks User Info and Administrative Data ๐Ÿ•ด

An unprotected server has exposed more than 7GB of data from the beauty brand.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Lazarus Group Brings APT Tactics to Ransomware โŒ

A new ransomware, VHD, was seen being delivered by the nation-state group's multiplatform malware platform, MATA.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Lazarus Group Shifts Gears with Custom Ransomware ๐Ÿ•ด

The North Korea-linked APT group has developed its own ransomware strain to better conduct financial theft, researchers report.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10985

Gambio GX before 4.0.1.0 allows XSS in admin/coupon_admin.php.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-10984

Gambio GX before 4.0.1.0 allows admin/admin.php CSRF.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-10983

Gambio GX before 4.0.1.0 allows SQL Injection in admin/mobile.php.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-10982

Gambio GX before 4.0.1.0 allows SQL Injection in admin/gv_mail.php.

๐Ÿ“– Read

via "National Vulnerability Database".
29 July 2020
?
01:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” IBM finds cyberattacks costing companies nearly $4 million per breach ๐Ÿ”

The study showed concrete financial benefits to having security systems and teams in place.

๐Ÿ“– Read

via "Security on TechRepublic".
?
06:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” The future of encryption: Getting ready for the quantum computer attack ๐Ÿ”

PQShield, a spin-out from the UK's Oxford University, is developing advanced cryptographic solutions for hardware, software and communications to protect businesses' data from the quantum threat.

๐Ÿ“– Read

via "Security on TechRepublic".
?
07:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ OkCupid Security Flaw Threatens Intimate Dater Details โŒ

Attackers could exploit various flaws in OkCupid's mobile app and webpage to steal victims' sensitive data and even send messages out from their profiles.

๐Ÿ“– Read

via "Threatpost".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Facial-Recognition Flop: Face Masks Thwart Virus, Stump Security Systems โŒ

Algorithms clocked error rates of between 5% to 50% when comparing photos of people wearing digitally created masks with unmasked faces.

๐Ÿ“– Read

via "Threatpost".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” 87% of Americans view data privacy as a human right, but most still use risky security practices ๐Ÿ”

While 56% of Americans want more control over personal data, more than 40% said they reuse passwords, use public Wi-Fi, or save a credit card to an online store, KPMG found.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด The Future's Biggest Cybercrime Threat May Already Be Here ๐Ÿ•ด

Current attacks will continue to be refined, and what may seem a weakness now could turn out to be a disaster.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” How to protect your website's database from hackers ๐Ÿ”

A recent investigation by NordPass and a white hat hacker discovered more than 9,000 unsecured databases online with more than 10 billion individual entries.

๐Ÿ“– Read

via "Security on TechRepublic".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How to Decipher InfoSec Job Titles' Mysteries ๐Ÿ•ด

Figuring out which cybersecurity job you want -- or are qualified for -- can be difficult when words have no consistent meaning in the industry.

๐Ÿ“– Read

via "Dark Reading: ".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How IT leaders were unprepared for the security challenges posed by COVID-19 ๐Ÿ”

The top three challenges cited in a Tanium survey were identifying new computing devices, overwhelmed IT capacity due to VPN requirements, and increased risks from video conferencing.

๐Ÿ“– Read

via "Security on TechRepublic".
12:49
๐Ÿ” Most consumers do not trust big tech with their privacy ๐Ÿ”

Social media and online shopping sites top the list of services consumers feel do not adequately protect their personal information.

๐Ÿ“– Read

via "Security on TechRepublic".
12:49
๐Ÿ” It's not OK, Cupid: Security flaws could expose user data and more ๐Ÿ”

Researchers found a number of vulnerabilities that could give attackers access to a treasure trove of personally identifying information about members.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  US tax service says, โ€œ2FA is a must!โ€ โš 

We know it's an old drum, but we're not tired of beating it yet: 2FA is your friend.

๐Ÿ“– Read

via "Naked Security".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical Security Flaw in WordPress Plugin Allows RCE โŒ

WordPress plugin Comments โ€“ wpDiscuz, which is installed on over 70,000 sites, has issued a patch.

๐Ÿ“– Read

via "Threatpost".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical Bugs in Utilities VPNs Could Cause Physical Damage โŒ

Gear from Secomea, Moxa and HMS Networks are affected by remote code-execution flaws, researchers warn.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Technical Challenges of IoT Cybersecurity in a Post-COVID-19 World ๐Ÿ•ด

Effective management of vulnerabilities can be done only when information about supply chain dependencies is accurate and recent.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 9 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
15:53
๐Ÿ›  Hydra Network Logon Cracker 9.1 ๐Ÿ› 

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
15:55
ATENTIONโ€ผ New - CVE-2020-11934

It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-11933

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Dark Reading Video News Desk Returns to Black Hat ๐Ÿ•ด

Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด 70,000+ WordPress Sites Affected by Critical Plug-in Flaw ๐Ÿ•ด

A vulnerability in the wpDiscuz plug-in could let attackers remotely execute code on the servers of affected websites.

๐Ÿ“– Read

via "Dark Reading: ".
16:47
๐Ÿ” NYDFS Charges First Company for Violating Its Cybersecurity Regulation ๐Ÿ”

NYDFS made its first enforcement action around its Cybersecurity Regulation, 23 NYCRR 500, alleging errors and deficient controls led to a breach at an insurance company.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Billions of Devices Impacted by Secure Boot Bypass โŒ

The "BootHole" bug could allow cyberattackers to load malware, steal information and move laterally into corporate, OT ,IoT and home networks.

๐Ÿ“– Read

via "Threatpost".
?
17:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20033

On Aspire-derived NEC PBXes, including all versions of SV8100 devices, a set of documented, static login credentials may be used to access the DIM interface.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20032

An attacker with access to an InMail voicemail box equipped with the find me/follow me feature on Aspire-derived NEC PBXes, including all versions of SV8100, SV9100, SL1100 and SL2100 devices, may access the system's administration modem.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20031

NEC UM8000, UM4730 and prior non-InMail voicemail systems with all known software versions may permit an infinite number of login attempts in the telephone user interface (TUI), effectively allowing brute force attacks.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20030

An attacker with knowledge of the modem access number on a NEC UM8000 voicemail system may use SSH tunneling or standard Linux utilities to gain access to the system's LAN port. All versions are affected.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20029

An exploitable privilege escalation vulnerability exists in the WebPro functionality of Aspire-derived NEC PBXes, including all versions of SV8100, SV9100, SL1100 and SL2100 devices. A specially crafted HTTP POST can cause privilege escalation resulting in a higher privileged account, including an undocumented developer level of access.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20028

Aspire-derived NEC PBXes operating InMail software, including all versions of SV8100, SV9100, SL1100 and SL2100 devices allow unauthenticated read-only access to voicemails, greetings, and voice response system content through a system's WebPro administration interface.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20027

Aspire-derived NEC PBXes, including the SV8100, SV9100, SL1100 and SL2100 with software releases 7.0 or higher contain the possibility if incorrectly configured to allow a blank username and password combination to be entered as a valid, successfully authenticating account.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20026

The WebPro interface in NEC SV9100 software releases 7.0 or higher allows unauthenticated remote attackers to reset all existing usernames and passwords to default values via a crafted request.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2019-20025

Certain builds of NEC SV9100 software could allow an unauthenticated, remote attacker to log into a device running an affected release with a hardcoded username and password, aka a Static Credential Vulnerability. The vulnerability is due to an undocumented user account with manufacturer privilege level. An attacker could exploit this vulnerability by using this account to remotely log into an affected device. A successful exploit could allow the attacker to log into the device with manufacturer level access. This vulnerability affects SV9100 PBXes that are running software release 6.0 or higher. This vulnerability does not affect SV9100 software releases prior to 6.0.

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Qualys Enters Crowded Endpoint Detection and Response Market ๐Ÿ•ด

The company, already known for its vulnerability management capabilities, announces the acquisition of EDR provider Spell Security and the launch of its own service for managing endpoints and responding to threats.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Security Flaws Discovered in OKCupid Dating Service ๐Ÿ•ด

Researchers identified a variety of vulnerabilities in apps and websites for the popular online dating platform.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical Magento Flaws Allow Code Execution โŒ

Adobe has released patches for critical and important-severity flaws in its popular Magento e-commerce platform.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 'BootHole' Vulnerability Exposes Secure Boot Devices to Attack ๐Ÿ•ด

A flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Average Cost of a Data Breach: $3.86 Million ๐Ÿ•ด

New IBM study shows that security system complexity and cloud migration can amplify breach costs.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด 11 Security Tools to Expect at the Black Hat USA 2020 Arsenal Virtual Event ๐Ÿ•ด

More than 130 security researchers and developers are ready to showcase their work.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2017-18923

beroNet VoIP Gateways before 3.0.16 have a PHP script that allows downloading arbitrary files, including ones with credentials.

๐Ÿ“– Read

via "National Vulnerability Database".
?
21:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” DevSecOps tutorial: What is it, and how can it improve application security? ๐Ÿ”

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve security.

๐Ÿ“– Read

via "Security on TechRepublic".
30 July 2020
?
07:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How security leaders can help SOC analysts adjust to working from home ๐Ÿ”

RSA experts discussed how to recreate the collaborative in-person environment that security teams usually work in when there's not a pandemic.

๐Ÿ“– Read

via "Security on TechRepublic".
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Security: This nasty surprise could be waiting for retailers when they open up again ๐Ÿ”

During the COVID-19 pandemic, retailers' point-of-sale and merchant systems have remained dormant behind closed doors. As businesses begin to reopen their physical stores, hackers could be ready to pounce.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” 9 essential apps for Android users ๐Ÿ”

Open source expert Jack Wallen lists the apps he considers a must-have for every Android user.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Vermont Taxpayers Warned of Data Leak Over the Past Three Years โŒ

A vulnerability in the stateโ€™s system may have exposed personal data that can be used for credential theft for those who filed Property Transfer Tax returns online.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Using the Attack Cycle to Up Your Security Game ๐Ÿ•ด

Like the universe, the attack surface is always expanding. Here's how to keep up and even get ahead.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10713

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14130

Memory corruption can occurs in trusted application if offset size from HLOS is more than actual mapped buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14124

Memory failure in content protection module due to not having pointer within the scope in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14123

Possible buffer overflow and over read possible due to missing bounds checks for fixed limits if we consider widevine HLOS client as non-trustable in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14101

Out of bounds read can happen in diag event set mask command handler when user provided length in the command request is less than expected length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14100

Register write via debugfs is disabled by default to prevent register writing via debugfs. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9207C, MDM9607, Nicobar, QCS405, SA6155P, SC8180X, SDX55, SM8150

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14099

Device misbehavior may be observed when incorrect offset, length or number of buffers is passed by user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8953, Nicobar, QCM2150, QCS405, QCS605, QM215, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14093

Array out of bound access can occur in display module due to lack of bound check on input parcel received in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, QCM2150, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM636, SDM660, SDX20

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-14037

Close and bind operations done on a socket can lead to a Use-After-Free condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8996, MSM8996AU, QCN7605, QCN7606, QCS605, SC8180X, SDA660, SDA845, SDM439, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM8150, SXR1130

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-10580

When kernel thread unregistered listener, Use after free issue happened as the listener client`s private data has been already freed in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9607, MSM8909W, Nicobar, QCM2150, QCS405, QCS605, Saipan, SC8180X, SDM429W, SDX55, SM8150, SM8250, SXR2130

๐Ÿ“– Read

via "National Vulnerability Database".
12:09
โŒ Critical, High-Severity Cisco Flaws Fixed in Data Center Network Manager โŒ

The flaw could allow a remote, unauthenticated attacker to bypass authentication on vulnerable devices.

๐Ÿ“– Read

via "Threatpost".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to find and fix vulnerable default credentials on your network ๐Ÿ”

Network appliances and devices that still have their default credentials present a risk to your organization, says SecurityHQ.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Servers at risk from โ€œBootHoleโ€ bug โ€“ what you need to know โš 

We explain the "BootHole" vulnerablity - as usual, in plain English and without hype. Find if you're affected and what to do.

๐Ÿ“– Read

via "Naked Security".
13:34
๐Ÿ•ด Black Hat Virtually: An Important Time to Come Together as a Community ๐Ÿ•ด

The significance of this year's event hasn't changed a whit. It's an opportunity to share what we've learned, and plan how to protect each other and the public for the remainder of the pandemic and beyond.

๐Ÿ“– Read

via "Dark Reading: ".
13:49
๐Ÿ” How to set up passwordless SSH authentication for Ubuntu Server ๐Ÿ”

Learn how to enable passwordless SSH authentication on both Linux and macOS.

๐Ÿ“– Read

via "Security on TechRepublic".
?
14:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Doki Backdoor Infiltrates Docker Servers in the Cloud โŒ

The malware is a new payload that uses Dogecoin wallets for its C2, and spreads via the Ngrok botnet.

๐Ÿ“– Read

via "Threatpost".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Citizens Are Increasingly Worried About How Companies Use Their Data ๐Ÿ•ด

With data privacy important to almost every American, more than two-thirds of those surveyed say they don't trust companies to ethically sell their data.

๐Ÿ“– Read

via "Dark Reading: ".
14:47
๐Ÿ” FBI Warns of Hackers Exploiting Built-In Network Protocols ๐Ÿ”

The FBI warned organizations last week that attackers are increasingly using built-in network protocols to launch destructive distributed denial of service attacks.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Google Adds Security Updates to Chrome Autofill ๐Ÿ•ด

Chrome users can retrieve payment card numbers via biometric authentication and use a new "touch-to-fill: feature to log in to accounts.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด 5 Tips for Optimizing Your Company's Cyber-Crisis Preparedness ๐Ÿ•ด

Cyber-incident response often addresses short-term needs, but we need to broaden the view of crisis management to be more forward-thinking.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Poll: Endpoint Extravaganza ๐Ÿ•ด

What shape do you expect remote endpoints to be in when they start winging their way back to the office?

๐Ÿ“– Read

via "Dark Reading: ".
16:49
๐Ÿ” How to add fingerprint authentication to your Windows 10 computer ๐Ÿ”

You can easily add a fingerprint reader to your computer if one isn't already built in.

๐Ÿ“– Read

via "Security on TechRepublic".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Ill-Defined Career Paths Hamper Growth for IT Security Pros ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Zoom Flaw Could Have Allowed Hackers To Crack Meeting Passcodes โŒ

Zoom has fixed the issue, which stemmed from a lack of checks against incorrect passcode attempts.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Mimecast Buys MessageControl ๐Ÿ•ด

The email security provider brings into its fold social engineering and human identity capabilities.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Dark Web Travel Fraudsters Left Hurting From Lockdowns ๐Ÿ•ด

Shadow travel businesses that depend on loyalty program fraud have been impacted just like the legitimate travel orgs they prey on.

๐Ÿ“– Read

via "Dark Reading: ".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know ๐Ÿ•ด

Apple, Google, and Mozilla will shorten the life span for TLS certificates in a move poised to aid security but cause operational troubles.

๐Ÿ“– Read

via "Dark Reading: ".
31 July 2020
?
08:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Black Hat USA 2020 Preview: Election Security, COVID Disinformation and More โŒ

Threatpost editors break down the top themes, speakers and sessions to look out for this year at Black Hat 2020 - from election security to remote work and the pandemic.

๐Ÿ“– Read

via "Threatpost".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 'Hidden Property Abusing' Allows Attacks on Node.js Applications ๐Ÿ•ด

A team of researchers from Georgia Tech find a new attack technique that targets properties in Node.js and plan to publicly release a tool that has already identified 13 new vulnerabilities.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Twitter: Epic Account Hack Caused by Mobile Spearphishing โŒ

Hackers "mislead certain employees" to gain access to internal tools to take over high-profile accounts and push out a Bitcoin scam.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 3 Ways Social Distancing Can Strengthen your Network ๐Ÿ•ด

Security teams can learn a lot from the current pandemic to make modern hybrid business networks stronger and more resilient. Here's how.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-10731

A flaw was found in the nova_libvirt container provided by the Red Hat OpenStack Platform 16, where it does not have SELinux enabled. This flaw causes sVirt, an important isolation mechanism, to be disabled for all running virtual machines.

๐Ÿ“– Read

via "National Vulnerability Database".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Breach of high-profile Twitter accounts caused by phone spear phishing attack ๐Ÿ”

Twitter confirmed its employees were tricked into giving hackers their credentials, which gave them access to the accounts of Bill Gates, Jeff Bezos, Joe Biden, and others.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Anti-NATO Disinformation Campaign Leveraged CMS Compromises โŒ

Researchers uncovered a disinformation campaign aiming to discredit NATO via fake news content on compromised news websites.

๐Ÿ“– Read

via "Threatpost".
13:09
โŒ CWT Travel Agency Faces $4.5M Ransom in Cyberattack, Report โŒ

The corporate-travel leader has confirmed an attack that knocked systems offline.

๐Ÿ“– Read

via "Threatpost".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Twitter: Employees Compromised in Phone Spear-Phishing Attack ๐Ÿ•ด

The attack earlier this month started with a spear-phishing attack targeting Twitter employees, the company says in a new update.

๐Ÿ“– Read

via "Dark Reading: ".
13:49
๐Ÿ” Top 6 cybersecurity trends to watch for at Black Hat USA 2020 ๐Ÿ”

Experts weigh in to share their thoughts on the hottest topics to expect at this year's all-digital Black Hat conference.

๐Ÿ“– Read

via "Security on TechRepublic".
?
14:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” That job offer in your inbox might be part of a North Korean cyberattack ๐Ÿ”

Professionals in the aerospace and defense industries should watch out; a wave of fake job offers containing malicious documents have been spotted in the wild by McAfee researchers.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด New Initiative Links Cybersecurity Pros to Election Officials ๐Ÿ•ด

A University of Chicago Harris School of Public Policy initiative will build a database of cybersecurity volunteers.

๐Ÿ“– Read

via "Dark Reading: ".
15:47
๐Ÿ” Friday Five: 7/31 Edition ๐Ÿ”

The FBI warns of new DDoS attack vectors, iOS14 allows unexpected prying behavior on Instagram, and NCSC research reveals the cybersecurity sector needs improvement in inclusion - catch up on all the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
15:49
๐Ÿ” Security analysts: Industry has not solved the talent gap or provided clear career paths ๐Ÿ”

New survey finds that cybersecurity professionals want more training to keep up with the threat landscape and learn new software platforms.

๐Ÿ“– Read

via "Security on TechRepublic".
?
16:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Top 10 apps every iOS user should download ๐Ÿ”

Check out a developer's picks of 10 essential iOS apps, which focus on security, productivity, and more.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 9.01 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
18:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Authorities Arrest Alleged 17-Year-Old โ€˜Mastermindโ€™ Behind Twitter Hack โŒ

Three have been charged in alleged connection with the recent high-profile Twitter hack - including a 17-year-old teen from Florida who is the reported "mastermind" behind the attack.

๐Ÿ“– Read

via "Threatpost".
?
18:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand โš 

US travel company CWT has reportedly coughed up $4.5m to ransomware crooks who stole data and scrambled files.

๐Ÿ“– Read

via "Naked Security".
18:34
๐Ÿ•ด 3 Arrested for Massive Twitter Breach ๐Ÿ•ด

Three individuals aged 17, 19, and 22 have been charged for their alleged roles in the massive July 15 Twitter attack.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ 4 Unpatched Bugs Plague Grandstream ATAs for VoIP Users โŒ

The flaws have been confirmed by Grandstream, but no firmware update has yet been issued.

๐Ÿ“– Read

via "Threatpost".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-11286

VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
?
22:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Twitter hack โ€“ three suspects charged in the US โš 

Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over.

๐Ÿ“– Read

via "Naked Security".
2 August 2020
?
14:36
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โ€‹โ€‹========================

๐Ÿ‘€ Look look!

These channels ๐Ÿ“จ are amazing!

========================
3 August 2020
?
07:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Monday review โ€“ our recent stories revisited โš 

Get yourself up to date with everything we've written in the last seven days - it's weekly roundup time.

๐Ÿ“– Read

via "Naked Security".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How Should I Securely Destroy/Discard My Devices? ๐Ÿ•ด

While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.

๐Ÿ“– Read

via "Dark Reading: ".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Meetup Critical Flaws Allow โ€˜Groupโ€™ Takeover, Payment Theft โŒ

Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups."

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด A Patriotic Solution to the Cybersecurity Skills Shortage ๐Ÿ•ด

Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-4589

IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2019-4366

IBM Cognos Analytics 11.0 and 11.1 is susceptible to an information disclosure vulnerability where an attacker could gain access to cached browser data. IBM X-Force ID: 161748.

๐Ÿ“– Read

via "National Vulnerability Database".
?
12:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” BlackBerry launches free tool for reverse engineering to fight cybersecurity attacks ๐Ÿ”

One of the first announcements at BlackHat USA 2020 is an open-source tool to fight malware that BlackBerry first used internally and is now making available to everyone.

๐Ÿ“– Read

via "Security on TechRepublic".
12:49
๐Ÿ” How to better protect your organization against mobile threats ๐Ÿ”

The increased use of personal phones for work and the growth of mobile malware create a risk to organizations, says Gigamon.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes โŒ

With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.

๐Ÿ“– Read

via "Threatpost".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Travel Management Firm CWT Pays $4.5M to Ransomware Attackers ๐Ÿ•ด

Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.

๐Ÿ“– Read

via "Dark Reading: ".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-19455

Wowza Streaming Engine through 2019-11-28 has Insecure Permissions.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2019-19453

Wowza Streaming Engine through 2019-11-28 allows XSS (issue 1 of 2).

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ Garmin Pays Up to Evil Corp After Ransomware Attack โ€” Reports โŒ

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.

๐Ÿ“– Read

via "Threatpost".
?
14:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Survey: Barriers prevent data privacy initiatives ๐Ÿ”

Corporate culture, lack of privacy teams hurt privacy initiatives.

๐Ÿ“– Read

via "Security on TechRepublic".
14:53
๐Ÿ›  Samhain File Integrity Checker 4.4.2 ๐Ÿ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
14:53
๐Ÿ›  Sifter 9.1 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
15:21
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
?
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก 02.08.2020 14:36:22
โ€‹โ€‹========================

๐Ÿ‘€ Look look!

These channels ๐Ÿ“จ are amazing!

========================
?
15:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” The Linux Foundation announces collective to enhance open source software security ๐Ÿ”

The newly formed Open Source Security Foundation includes titans in technology such as Google, Intel, Microsoft, IBM, and more.

๐Ÿ“– Read

via "Security on TechRepublic".
15:55
ATENTIONโ€ผ New - CVE-2015-9549

A reflected Cross-site Scripting (XSS) vulnerability exists in OcPortal 9.0.20 via the OCF_EMOTICON_CELL.tpl FIELD_NAME field to data/emoticons.php.

๐Ÿ“– Read

via "National Vulnerability Database".
16:09
โŒ Netgear Wonโ€™t Patch 45 Router Models Vulnerable to Serious Flaw โŒ

Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.

๐Ÿ“– Read

via "Threatpost".
?
16:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” New Bill Would Bar IP Theft Offenders From US ๐Ÿ”

Yet another bill designed to crackdown on IP theft, the Stop Theft of Intellectual Property Act of 2020, was introduced in the Senate last week

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Google Updates Ad Policies to Counter Influence Campaigns, Extortion โŒ

Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020 ๐Ÿ•ด

Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.

๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด Why Data Ethics Is a Growing CISO Priority ๐Ÿ•ด

With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.

๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด New 'Nanodegree' Program Provides Hands-On Cybersecurity Training ๐Ÿ•ด

Emerging streamlined curriculum programs aim to help narrow the skills gap.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat ๐Ÿ•ด

"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด FBI Warns on New E-Commerce Fraud ๐Ÿ•ด

A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How to make your PC passwordless in the Windows 10 May 2020 Update ๐Ÿ”

You don't need an account password to sign into Windows 10 version 2004.

๐Ÿ“– Read

via "Security on TechRepublic".
19:55
ATENTIONโ€ผ New - CVE-2020-11584

A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-11583

A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

๐Ÿ“– Read

via "National Vulnerability Database".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 11 Hot Startups to Watch at Black Hat USA ๐Ÿ•ด

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

๐Ÿ“– Read

via "Dark Reading: ".
?
22:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 11 Hot Startups to Watch at Black Hat USA ๐Ÿ•ด

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

๐Ÿ“– Read

via "Dark Reading: ".
4 August 2020
?
06:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics ๐Ÿ”

Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.

๐Ÿ“– Read

via "Security on TechRepublic".
?
09:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  GandCrab ransomware hacker arrested in Belarus โš 

Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia.

๐Ÿ“– Read

via "Naked Security".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Podcast: Learning to โ€˜Speak the Languageโ€™ of OT Security Teams โŒ

Andrew Ginter,ย VP Industrial Securityย atย Waterfall Security Solutions, talks about the differing priorities between IT and OT security teams as industrial control systems become connected.

๐Ÿ“– Read

via "Threatpost".
10:09
โŒ Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks โŒ

COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks.

๐Ÿ“– Read

via "Threatpost".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” How poor security practices from remote employees are wasting the time of IT staff ๐Ÿ”

Along with the independence remote work affords employees comes the use of shadow IT and poor password practices, according to a new survey by 1Password.

๐Ÿ“– Read

via "Security on TechRepublic".
10:49
๐Ÿ” Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed ๐Ÿ”

An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Securing IoT as a Remote Workforce Strategy ๐Ÿ•ด

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-20001

An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
12:09
โŒ Twitter Could Face $250M FTC Fine Over Improper Data Use โŒ

The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising.

๐Ÿ“– Read

via "Threatpost".
?
12:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 9.2 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
12:53
๐Ÿ›  SQLMAP - Automatic SQL Injection Tool 1.4.8 ๐Ÿ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Google & Amazon Replace Apple as Phishers' Favorite Brands ๐Ÿ•ด

Google and Amazon were the most imitated brands in the second quarter, knocking out Apple.

๐Ÿ“– Read

via "Dark Reading: ".
13:34
๐Ÿ•ด FPGAs Do It Faster Than CPUs ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
13:34
๐Ÿ•ด The Top 25 Most Dangerous Software Errors ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
13:49
๐Ÿ” Google and Amazon most impersonated brands in phishing attacks ๐Ÿ”

WhatsApp, Facebook, and Microsoft rounded out the top five as the most spoofed brands last quarter, says Check Point Research.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Retooling the SOC for a Post-COVID World ๐Ÿ•ด

Residual work-from-home policies will require changes to security policies, procedures, and technologies.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Newsletter WordPress Plugin Opens Door to Site Takeover โŒ

An XSS bug and a PHP object-injection vulnerability are present in a plugin used by hundreds of thousands of websites.

๐Ÿ“– Read

via "Threatpost".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 6 Dangerous Defaults Attackers Love (and You Should Know) ๐Ÿ•ด

Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด New Spin on a Longtime DNS Intel Tool ๐Ÿ•ด

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

๐Ÿ“– Read

via "Dark Reading: ".
16:47
๐Ÿ” Trade Secret Theft Case Involving Pharma Giant Can Move Forward ๐Ÿ”

An ex-worker who allegedly stole hundreds of company files had previously attempted to dismiss the lawsuit.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด New Spin on a Longtime DNS Intel Tool ๐Ÿ•ด

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Why multi-factor authentication should be set up for all your services and devices ๐Ÿ”

More than ever, now is the time to make absolutely sure that your services and devices are using the best protection available to keep data secured and away from unauthorized hands.

๐Ÿ“– Read

via "Security on TechRepublic".
17:55
ATENTIONโ€ผ New - CVE-2020-13523

An exploitable information disclosure vulnerability exists in SoftPerfectรขโ‚ฌโ„ขs RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ NetWalker Ransomware Rakes in $29M Since March โŒ

The ransomware has surged since moving to a RaaS model.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How Ransomware Threats Are Evolving & How to Spot Them ๐Ÿ•ด

A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13522

An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
5 August 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2017-18112

Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.

๐Ÿ“– Read

via "National Vulnerability Database".
?
09:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Pen Testers Who Got Arrested Doing Their Jobs Tell All ๐Ÿ•ด

Coalfire's Gary De Mercurio and Justin Wynn share the details of their physical penetration-testing engagement gone wrong, as well as recommendations for protecting all red teamers.

๐Ÿ“– Read

via "Dark Reading: ".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ A Cyber โ€˜Vigilanteโ€™ is Sabotaging Emotetโ€™s Return โŒ

During Black Hat USA 2020, Threatpost talks to Sherrod DeGrippo, with Proofpoint, about Emotet's recent return -and how a cyber vigilante is attempting to thwart the malware's comeback.

๐Ÿ“– Read

via "Threatpost".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Less Than Half of Security Pros Can Identify Their Organization's Level of Risk ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
10:34
๐Ÿ•ด DDoS Attacks Doubled in Q2 Compared with Prior Quarter ๐Ÿ•ด

Most attacks were small, but the big ones got bigger than ever, Cloudflare says.

๐Ÿ“– Read

via "Dark Reading: ".
10:49
๐Ÿ” COVID-19 highlights need for business and security leaders to work together to prevent cyberattacks ๐Ÿ”

New Tenable study says 94% of organizations experienced a business-impacting cyberattack or compromise within the past 12 months; 46% weathered five or more attacks.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Why Confidential Computing Is a Game Changer ๐Ÿ•ด

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13151

Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.

๐Ÿ“– Read

via "National Vulnerability Database".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020 ๐Ÿ•ด

The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.

๐Ÿ“– Read

via "Dark Reading: ".
12:34
๐Ÿ•ด Cybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020 ๐Ÿ•ด

Budgets rise as IT complexity continued to challenge companies, with identity and access management technology an increasingly common focus.

๐Ÿ“– Read

via "Dark Reading: ".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ NSA Warns Smartphones Leak Location Data โŒ

The agency known for its own questionable surveillance activity advised how mobile users can limit othersโ€™ ability to track where they are.

๐Ÿ“– Read

via "Threatpost".
13:09
โŒ Microsoft Teams Patch Bypass Allows RCE โŒ

An attacker can hide amidst legitimate traffic in the application's update function.

๐Ÿ“– Read

via "Threatpost".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-14347

A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-14344

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13921

**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13819

Extreme EAC Appliance 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.

๐Ÿ“– Read

via "National Vulnerability Database".
14:09
โŒ High-Severity Android RCE Flaw Fixed in August Security Update โŒ

Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.

๐Ÿ“– Read

via "Threatpost".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Microsoft Teams Vulnerable to Patch Workaround, Researchers Report ๐Ÿ•ด

Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด CISA Offers Tool for Career Navigation ๐Ÿ•ด

The new Cyber Career Pathways Tool helps individuals understand the roles in cybersecurity and how to prepare for them.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด 3 Tips for Securing Open Source Software ๐Ÿ•ด

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Attack of the Clone: Next-Gen Social Engineering ๐Ÿ•ด

NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Building Cybersecurity Strategies in Sub-Saharan Africa ๐Ÿ•ด

Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations.

๐Ÿ“– Read

via "Dark Reading: ".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Russian Election Interference: What's Next? ๐Ÿ•ด

Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด Voatz Delivers Multi-Layered Security to Protect Electronic Voting ๐Ÿ•ด

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด A Paramedic's Guide to Cybersecurity: Video ๐Ÿ•ด

In this video segment, the Dark Reading News Desk speaks to several guests about healthcare cybersecurity. We begin with Rich Mogull, infosec pro and paramedic, for a discussion about what lessons cybersecurity can learn from emergency medical services and the parallels that already exist.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Black Hat 2020: Open-Source AI to Spur Wave of โ€˜Synthetic Mediaโ€™ Attacks โŒ

The explosion of open-source AI models are lowering the barrier of entry for bad actors to create fake video, audio and images - and Facebook, Twitter and other platforms aren't ready.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How An Electronic Medical Record System Flaw Exacerbated the Opioid Crisis ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด A Most Personal Threat: Implantable Medical Devices ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด HealthScare: Prioritizing Medical AppSec Research ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด Synopsys: Why Security-Minded Companies Are Transitioning to DevSecOps ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
17:47
๐Ÿ” Engineer Behind Google, Uber Trade Secret Theft Case Sentenced ๐Ÿ”

Anthony Levandowski, the former Google engineer, was sentenced this week, four months after he plead guilty to stealing Google's trade secrets.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
17:55
ATENTIONโ€ผ New - CVE-2020-15106

In etcd before versions 3.3.23 and 3.4.10, a large slice causes panic in decodeRecord method. The size of a record is stored in the length field of a WAL file and no additional validation is done on this data. Therefore, it is possible to forge an extremely large frame size that can unintentionally panic at the expense of any RAFT participant trying to decode the WAL.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges โŒ

Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Voatz Delivers Multilayered Security to Protect Electronic Voting ๐Ÿ•ด

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Pen Testers Share the Inside Story of Their Arrest and Exoneration ๐Ÿ•ด

Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red-team engagement in an Iowa courthouse -- and what it took to clear their names.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด SynerComm Reboots a Security Staple with 'Continuous' Pen Testing ๐Ÿ•ด

SPONSORED CONTENT: Penetration testing has evolved well beyond a couple guys you hire to try and break into your network, according to SynerComm's Brian Judd. In addition to a service that offers round-the-clock pen testing, SynerComm also provides purple team testing, effectively splitting the difference with red- and blue-team exercises.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด What to Tell Young People of Color About InfoSec Careers ๐Ÿ•ด

CEO and founder of Revolution Cyber Juliet Okafor and Baker Hughes Director of Global OT Security Programs Paul Brager talk about the unique lessons and hard truths they provide when mentoring young black cybersecurity professionals.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Twitter Fixes High-Severity Flaw Affecting Android Users โŒ

A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Developing Community for Woman Infosec Pros in India ๐Ÿ•ด

Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Supporting Women in InfoSec ๐Ÿ•ด

Maxine Holt, research director from Omdia, explains why the time is right for women to step into more cybersecurity jobs now.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13404

The ATOS/Sips (aka Atos-Magento) community module 3.0.0 to 3.0.5 for Magento allows command injection.

๐Ÿ“– Read

via "National Vulnerability Database".
20:09
โŒ Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers โŒ

Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.

๐Ÿ“– Read

via "Threatpost".
20:09
โŒ Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs โŒ

The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.

๐Ÿ“– Read

via "Threatpost".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Tales from the Trenches Show Security Issues Endemic to Healthcare ๐Ÿ•ด

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.

๐Ÿ“– Read

via "Dark Reading: ".
?
23:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด What A Security Engineer & Software Engineer Learned By Swapping Roles ๐Ÿ•ด

A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.

๐Ÿ“– Read

via "Dark Reading: ".
6 August 2020
?
08:19
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ต UK retail giant Monsoon has critical vulnerability giving unauthorized access to internal company servers ๐Ÿ•ต


๐Ÿ“– Read

via "VPNpro".
?
09:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ U.S. Offers Reward of $10M for Info Leading to Discovery of Election Meddling โŒ

Government hopes to avoid interference in the upcoming November presidential vote with a hefty reward.

๐Ÿ“– Read

via "Threatpost".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Black Hat 2020: Using Botnets to Manipulate Energy Markets for Big Profits โŒ

Black Hat 2020 session discusses how high-wattage connected devices like dishwashers and heating systems can be recruited into botnets and used to manipulate energy markets.

๐Ÿ“– Read

via "Threatpost".
10:09
โŒ Black Hat 2020: โ€˜Zero-Clickโ€™ MacOS Exploit Chain Uses Microsoft Office Macros โŒ

At Black Hat 2020, Patrick Wardle disclosed an exploit chain that bypasses Microsoft's malicious macros protections to infect MacOS users.

๐Ÿ“– Read

via "Threatpost".
?
10:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Porn blast disrupts bail hearing of alleged Twitter hacker โš 

An alleged hacker's bail hearing held online via Zoom with screen sharing enabled... what could possibly go wrong?

๐Ÿ“– Read

via "Naked Security".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” FBI announcement on Windows 7 end of life prompts worry from security experts ๐Ÿ”

Despite the FBI announcement, hospitals, schools, and government offices across the world still use Windows 7.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 3 Tips For Better Security Across the Software Supply Chain ๐Ÿ•ด

It may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a head start on improving security posture of the software supply chain.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” COVID-19-related scams cost Americans more than $98 million since the start of 2020 ๐Ÿ”

Online shopping is the most prevalent type of scam with people losing nearly $14 million to date, according to FTC data.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” Security analysts want more help from developers to improve DevSecOps ๐Ÿ”

More training on security tools and better performance metrics can accomplish this, according to a new survey.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ High-Severity Cisco DoS Flaw Plagues Small-Business Switches โŒ

Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches.

๐Ÿ“– Read

via "Threatpost".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Ripple20: More Vulnerable Devices Identified ๐Ÿ•ด

Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.

๐Ÿ“– Read

via "Dark Reading: ".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Energy Market Manipulation with High-Wattage IoT Botnets ๐Ÿ•ด

Attackers that can compromise enough products such as smart ACs and heaters can tweak power demand in subtle ways for financial gain or to hurt market players, researchers at Black Hat say.

๐Ÿ“– Read

via "Dark Reading: ".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Four Rules and Three Tools to Protect Against Fake SaaS Apps ๐Ÿ•ด

Here's how to blunt the twinned forces of shadow IT and counterfeit apps and keep your data safe.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด A Real-World Tool for Organizing, Integrating Your Other Tools ๐Ÿ•ด

Omdia Cybersecurity Accelerator analyst Eric Parizo describes the value overwhelmed security managers may find in a SPIF.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด 2019 Breach Leads to $80 Million Fine for Capital One ๐Ÿ•ด

The fine is part of a series of steps required by the Office of the Comptroller of the Currency.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Counting for Good: Hardware Counters Un-mask Malware ๐Ÿ•ด

Nick Gregory, research scientist at Capsule8, talks about his session with Capsule8 data scientist Harini Kannan, "Uncommon Sense: Detecting Exploits With Novel Hardware Performance Counters and Machine Learning Magic."

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13365

Certain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-13364

A backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.

๐Ÿ“– Read

via "National Vulnerability Database".
?
16:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Platform Security: Intel Pushes to Reduce Supply Chain Attacks ๐Ÿ•ด

SPONSORED CONTENT: Attacks on supply chains involve lots of players and companies, not to mention an exponential amount of data for the stealing, notes Intel's Tom Garrison. Notoriously difficult to detect and mitigate, Garrison discusses new approaches to securing an individual company's computing platforms, including Compute Lifecycle Assurance.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด New Windows Print Spooler Zero-Day Flaws Harken Back to Stuxnet ๐Ÿ•ด

Researchers find new flaws in the ubiquitous decades-old printer software in Windows, including one that bypasses a recent Microsoft patch.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด Remotely Hacking Operations Technology Systems ๐Ÿ•ด

Marco Balduzzi senior research scientist with Trend Micro, tells us how the often-overlooked ICS protocol gateways contain serious vulnerabilities that allow attackers to hack OT systems remotely.

๐Ÿ“– Read

via "Dark Reading: ".
16:34
๐Ÿ•ด The Long Shadow of Stuxnet: New Microsoft Print Spooler Vulns Revealed ๐Ÿ•ด

Researchers Peleg Hader and Tomer Bar of SafeBreach share details of the three vulnerabilities they found in Windows Print Spooler that could allow an attacker to sneak into the network through an old printer service mechanism.

๐Ÿ“– Read

via "Dark Reading: ".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack โŒ

Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl ๐Ÿ•ด

SPONSORED CONTENT: Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for maximum payoff, says Jon DiMaggio with Broadcom's Symantec division. He explains how Windows servers are at a different risk level than their open-source counterparts, and how WastedLocker identifies "valuable" targets.

๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด Using IoT Botnets to Manipulate the Energy Market ๐Ÿ•ด

Tohid Shekari, phD candidate at Georgia Tech, talks about the session that he and Georgia Tech professor Raheem Beyah gave about a stealthy and adaptable way to use IoT botnets for financial gain or market downfall.

๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด Why Satellite Communication Eavesdropping Will Remain A Problem ๐Ÿ•ด

Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that slow make it unlikely to improve anytime soon.

๐Ÿ“– Read

via "Dark Reading: ".
17:49
๐Ÿ” Android phones could spy on users via flaws in Qualcomm chip ๐Ÿ”

Vulnerabilities were found in a Qualcomm Snapdragon chip that could let attackers obtain photos, videos, call recordings, and other data on Android phones, says Check Point Research.

๐Ÿ“– Read

via "Security on TechRepublic".
17:55
ATENTIONโ€ผ New - CVE-2020-13793

Unsafe storage of AD credentials in Ivanti DSM netinst 5.1 due to a static, hard-coded encryption key.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-12441

Denial-of-Service (DoS) in Ivanti Service Manager HEAT Remote Control 7.4 due to a buffer overflow in the protocol parser of the รขโ‚ฌ&tilde;HEATRemoteServiceรขโ‚ฌโ„ข agent. The DoS can be triggered by sending a specially crafted network packet.

๐Ÿ“– Read

via "National Vulnerability Database".
18:09
โŒ Canon Admits Ransomware Attack in Employee Note, Report โŒ

The consumer-electronics giant has suffered partial outages across its U.S. website and internal systems, reportedly thanks to the Maze gang.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด OpenText Blends Security, Data Protection for Greater Cyber Resilience ๐Ÿ•ด

SPONSORED CONTENT: Infosec professionals are taking advantage of technology hybrids to keep users, data, and their networks more safe, according to Hal Lonas of OpenText's Webroot division. And they're also finding new ways to use artificial intelligence and machine learning to improve security management and reduce risk.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Office 365's Vast Attack Surface & All the Ways You Don't Know You're Being Exploited Through It ๐Ÿ•ด

Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks they've detected, and suggest mitigations as businesses rely more heavily on the cloud.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Information Operations Spotlighted at Black Hat as Election Worries Rise ๐Ÿ•ด

From Russia's "best-in-class" efforts at widening social divides in Western democracies to China's blunt attacks on dissidents, information operations are becoming a greater threat, says a Stanford researcher.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Exploiting Google Cloud Platform With Ease ๐Ÿ•ด

Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด On 'Invisible Salamanders' and Insecure Messages ๐Ÿ•ด

Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.

๐Ÿ“– Read

via "Dark Reading: ".
18:47
๐Ÿ” What Does a Data Breach Cost in 2020? ๐Ÿ”

Ponemon Institute's annual Cost of a Data Breach report tracks how industry data breach costs have changed over time.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Black Hat 2020: Mercedes-Benz E-Series Rife with 19 Bugs โŒ

Researchers went into detail about the discovery and disclosure of 19 security flaws they found in Mercedes-Benz vehicles, which have all been fixed.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Where Dark Reading Goes Next ๐Ÿ•ด

Dark Reading Editor-in-Chief gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and how we plan to cover it.

๐Ÿ“– Read

via "Dark Reading: ".
?
21:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด A Mix of Optimism and Pessimism for Security of the 2020 Election ๐Ÿ•ด

DHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand and what still needs to happen to protect the integrity of November's election.

๐Ÿ“– Read

via "Dark Reading: ".
21:34
๐Ÿ•ด Researchers Create New Framework to Evaluate User Security Awareness ๐Ÿ•ด

Approaches based on questionnaires and self-evaluation are not always a good indicator of how well a user can mitigate social engineering threats.

๐Ÿ“– Read

via "Dark Reading: ".
?
21:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-15114

In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway.

๐Ÿ“– Read

via "National Vulnerability Database".
21:55
ATENTIONโ€ผ New - CVE-2020-11937

In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.

๐Ÿ“– Read

via "National Vulnerability Database".
22:09
โŒ Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem โŒ

An inside look at how nation-states use social media to influence, confuse and divide -- and why cybersecurity researchers should be involved.

๐Ÿ“– Read

via "Threatpost".
?
22:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Getting to the Root: How Researchers Identify Zero-Days in the Wild ๐Ÿ•ด

Google Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.

๐Ÿ“– Read

via "Dark Reading: ".
7 August 2020
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Augmenting AWS Security Controls โŒ

Appropriate use of native security controls in AWS and other CSPs is fundamental to managing cloud risk and avoiding costly breaches.

๐Ÿ“– Read

via "Threatpost".
?
10:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Business Email Compromise โ€“ fighting back with machine learning โš 

Machine learning models are immune to blandishments, threats, flattery and so - so why not set them against social engineers?

๐Ÿ“– Read

via "Naked Security".
?
11:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Hackers Dump 20GB of Intelโ€™s Confidential Data Online โŒ

Chipmaker investigates a leak of intellectual property from its partner and customer resource center.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด IoT Security During COVID-19: What We've Learned & Where We're Going ๐Ÿ•ด

Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” Report: Two new encryption standards will soon sweep away security controls ๐Ÿ”

Security professionals must act before TLS 1.3 and DNS-over-HTTPS (DoH) are implemented or they won't be able to analyze network traffic and detect cyberthreats, warns Forrester Research.

๐Ÿ“– Read

via "Security on TechRepublic".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด BEC Campaigns Target Financial Execs via Office 365 ๐Ÿ•ด

A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.

๐Ÿ“– Read

via "Dark Reading: ".
14:34
๐Ÿ•ด Researcher Finds New Office Macro Attacks for MacOS ๐Ÿ•ด

Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.

๐Ÿ“– Read

via "Dark Reading: ".
14:49
๐Ÿ” How to limit file upload size on NGINX to mitigate DoS attack ๐Ÿ”

If you have an NGINX site that must allow users to upload files, try this configuration to help prevent possible Denial-of-Service attacks.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:47
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Friday Five: 8/7 Edition ๐Ÿ”

Telstra suffers a DoS attack, the hackers behind last month's Twitter breach are arrested, and an NSA advisory warns mobile users about the dangers of location data - catch up on the week's news with the Friday Five.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
15:55
ATENTIONโ€ผ New - CVE-2020-11993

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-11985

IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-11984

Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-11852

DKIM key management page vulnerability on Micro Focus Secure Messaging Gateway (SMG). Affecting all SMG Appliance running releases prior to July 2020. The vulnerability could allow a logged in user with rights to generate DKIM key information to inject system commands into the call to the DKIM system command.

๐Ÿ“– Read

via "National Vulnerability Database".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Have I Been Pwned Set to Go Open-Source โŒ

Fully opening the door to allow people to contribute to โ€“ and notably, tinker with โ€“ the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones ๐Ÿ•ด

Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Attackers Horn in on MFA Bypass Options for Account Takeovers โŒ

Legacy applications don't support modern authentication -- and cybercriminals know this.

๐Ÿ“– Read

via "Threatpost".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Hacking the PLC via Its Engineering Software ๐Ÿ•ด

Researcher will demonstrate at DEF CON an emerging threat to industrial control networks.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Reddit Attack Defaces Dozens of Channels ๐Ÿ•ด

The attack has defaced the channels with images and content supporting Donald Trump.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13376

SecurEnvoy SecurMail 9.3.503 allows attackers to upload executable files and achieve OS command execution via a crafted SecurEnvoyReply cookie.

๐Ÿ“– Read

via "National Vulnerability Database".
20:09
โŒ Qualcomm Bugs Open 40 Percent of Android Handsets to Attack โŒ

Researchers identified serious flaws in Qualcommโ€™s Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets.

๐Ÿ“– Read

via "Threatpost".
?
21:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-7005

A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2.

๐Ÿ“– Read

via "National Vulnerability Database".
8 August 2020
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Digital Clones Could Cause Problems for Identity Systems ๐Ÿ•ด

Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating the systems.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-19704

In JetBrains Upsource before 2020.1, information disclosure is possible because of an incorrect user matching algorithm.

๐Ÿ“– Read

via "National Vulnerability Database".
10 August 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-12781

Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-12780

A security misconfiguration exists in Combodo iTop, which can expose sensitive information.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-12779

Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-12778

Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-12777

A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.

๐Ÿ“– Read

via "National Vulnerability Database".
?
06:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Monday review โ€“ catch up with the latest articles โš 

The latest articles and the latest Naked Security Live video - all in one place. Enjoy.

๐Ÿ“– Read

via "Naked Security".
?
10:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด COVID-19: Latest Security News & Commentary ๐Ÿ•ด

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

๐Ÿ“– Read

via "Dark Reading: ".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Vulnerability Prioritization: Are You Getting It Right? ๐Ÿ•ด



๐Ÿ“– Read

via "Dark Reading: ".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ TeamViewer Flaw in Windows App Allows Password-Cracking โŒ

Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.

๐Ÿ“– Read

via "Threatpost".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13295

For GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13294

In GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13293

In GitLab before 13.0.12, 13.1.6 and 13.2.3 using a branch with a hexadecimal name could override an existing hash.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-13292

In GitLab before 13.0.12, 13.1.6 and 13.2.3, it is possible to bypass E-mail verification which is required for OAuth Flow.

๐Ÿ“– Read

via "National Vulnerability Database".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ DDoS Attacks Cresting Amid Pandemic โŒ

Attacks were way up year-over-year in the second quarter as people continue to work from home.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Q2 DDoS Attacks Triple Year Over Year: Report ๐Ÿ•ด

Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.

๐Ÿ“– Read

via "Dark Reading: ".
15:47
๐Ÿ” Researcher Pleads Guilty to Scientific Trade Secret Theft ๐Ÿ”

The researcher worked for the hospital for 10 years but acknowledged last month that and her husband stole its data and used it to launch two companies, one in China, one in the US.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
15:49
๐Ÿ” How phishing attacks have exploited the US Small Business Administration ๐Ÿ”

Such attacks have tried to capitalize on the loans provided by the SBA in the wake of the coronavirus pandemic.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Google Chrome Browser Bug Exposes Billions of Users to Data Theft โŒ

The vulnerability allows attackers to bypass Content Security Policy (CSP) protections and steal data from website visitors.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Lock-Pickers Face an Uncertain Future Online ๐Ÿ•ด

Teaching the hardware hacker the skill of picking locks is evolving because of the pandemic's lockdown.

๐Ÿ“– Read

via "Dark Reading: ".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Can I Use the Same Security Tools on My IT and OT? ๐Ÿ•ด

You can quit worrying about IT tools in the OT environment.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Google Fixes Mysterious Audio Recording Blip in Smart Speakers โŒ

Google Home devices reportedly recorded noises even without the "Hey Google" prompt due to the inadvertent rollout of a home security system feature.

๐Ÿ“– Read

via "Threatpost".
?
19:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Better Business Bureau Warns of New Visa Scam ๐Ÿ•ด

Visa limitations due to the novel coronavirus have given rise to a wave of scams aimed at visa-seekers.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Hacking It as a CISO: Advice for Security Leadership ๐Ÿ•ด

A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.

๐Ÿ“– Read

via "Dark Reading: ".
19:34
๐Ÿ•ด Gamifying Password Training Shows Security Benefits ๐Ÿ•ด

When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:53
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ›  Sifter 9.3 ๐Ÿ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
19:53
๐Ÿ›  Zeek 3.2.0 ๐Ÿ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

๐Ÿ“– Go!

via "Security Tool Files โ‰ˆ Packet Storm".
11 August 2020
?
08:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด 17 Essential Stats About the State of Consumer Privacy ๐Ÿ•ด

These illuminating numbers offer a glimpse into current consumer attitudes and enterprise readiness for protecting their customers' personal data.

๐Ÿ“– Read

via "Dark Reading: ".
08:49
๐Ÿ” Linux users are finally getting this popular password manager ๐Ÿ”

After ten years of asking and the longest forum post in the company's history, 1Password is heading to Linux.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Researcher Publishes Bypass for Patch for vBulletin 0-Day Flaw โŒ

Three separate proof-of-concepts on Bash, Python and Ruby posted to outsmart fix issued last year to remedy pre-auth RCE bug.

๐Ÿ“– Read

via "Threatpost".
?
10:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Phishing emails tempting people with fake coronavirus vaccines ๐Ÿ”

As researchers race to develop a COVID-19 vaccine, phishing campaigns have landed on a topic ripe for exploitation, says Check Point Research.

๐Ÿ“– Read

via "Security on TechRepublic".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด How to Help Spoil the Cybercrime Economy ๐Ÿ•ด

Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.

๐Ÿ“– Read

via "Dark Reading: ".
11:49
๐Ÿ” How cybersecurity has changed since the coronavirus outbreak began, and what it means for businesses ๐Ÿ”

Moving employees to a work-from-home model means your security infrastructure has to change quickly. Some recent breaches highlight the importance of cybersecurity.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” How cybersecurity has changed since the coronavirus outbreak began, and what it means for businesses ๐Ÿ”

Moving employees to a work-from-home model means your security infrastructure has to change quickly. Some recent breaches highlight the importance of cybersecurity.

๐Ÿ“– Read

via "Security on TechRepublic".
11:49
๐Ÿ” How to patch CentOS against BootHole ๐Ÿ”

If you have CentOS servers in your data center, you'll want to make sure to patch them against BootHole. Jack Wallen shows you how.

๐Ÿ“– Read

via "Security on TechRepublic".
11:55
ATENTIONโ€ผ New - CVE-2020-14325

Red Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2020-10783

Red Hat CloudForms 4.7 and 5 is affected by a role-based privilege escalation flaw. An attacker with EVM-Operator group can perform actions restricted only to EVM-Super-administrator group, leads to, exporting or importing administrator files.

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2020-10779

Red Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check. Therefore, if an attacker knows the right criteria, it is possible to access some sensitive data within the CloudForms.

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2020-10778

In Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute from the fields since there is no server-side validation. This business logic flaw violate the expected behavior.

๐Ÿ“– Read

via "National Vulnerability Database".
11:55
ATENTIONโ€ผ New - CVE-2020-10777

A cross-site scripting flaw was found in Report Menu feature of Red Hat CloudForms 4.7 and 5. An attacker could use this flaw to execute a stored XSS attack on an application administrator using CloudForms.

๐Ÿ“– Read

via "National Vulnerability Database".
12:09
โŒ Samsung Quietly Fixed Critical Galaxy Flaws Allowing Spying, Data Wiping โŒ

Four critical-severity flaws were recently disclosed in the Find My Mobile feature of Samsung Galaxy smartphones, which if exploited could allow attackers to force a factory reset on the phones or spy on users.

๐Ÿ“– Read

via "Threatpost".
?
12:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Zero-Trust Security 101 ๐Ÿ•ด

What are the fundamental spirit and tenets of zero-trust architecture, boiled down, without the marketing speak?

๐Ÿ“– Read

via "Dark Reading: ".
12:49
๐Ÿ” Cybersecurity and remote support are top goals for CIOs in 2020 ๐Ÿ”

Most IT leaders say their priorities have shifted since the coronavirus pandemic surfaced around the start of the year, says Hitachi ID.

๐Ÿ“– Read

via "Security on TechRepublic".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development โŒ

The fundamental causes for the skill gap are myriad, starting with a lack of training and career-development opportunities.

๐Ÿ“– Read

via "Threatpost".
?
13:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-14324

A high severity vulnerability was found in all active versions of Red Hat CloudForms before 5.11.7.0. The out of band OS command injection vulnerability can be exploited by authenticated attacker while setuping conversion host through Infrastructure Migration Solution. This flaw allows attacker to execute arbitrary commands on CloudForms server.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-14313

An information disclosure vulnerability was found in Red Hat Quay in versions before 3.3.1. This flaw allows an attacker who can create a build trigger in a repository, to disclose the names of robot accounts and the existence of private repositories within any namespace.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-14296

Red Hat CloudForms 4.7 and 5 was vulnerable to Server-Side Request Forgery (SSRF) flaw. With the access to add Ansible Tower provider, an attacker could scan and attack systems from the internal network which are not normally accessible.

๐Ÿ“– Read

via "National Vulnerability Database".
13:55
ATENTIONโ€ผ New - CVE-2020-10780

Red Hat CloudForms 4.7 and 5 is affected by CSV Injection flaw, a crafted payload stays dormant till a victim export as CSV and opens the file with Excel. Once the victim opens the file, the formula executes, triggering any number of possible events. While this is strictly not an flaw that affects the application directly, attackers could use the loosely validated parameters to trigger several attack possibilities.

๐Ÿ“– Read

via "National Vulnerability Database".
?
14:33
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โš  Facial recognition โ€“ another setback for law enforcement โš 

"Something needs to be done," said the court. Where do you stand? For or against, have your say in our comments.

๐Ÿ“– Read

via "Naked Security".
?
15:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical Adobe Acrobat and Reader Bugs Allow RCE โŒ

Adobe patched critical and important-severity flaws tied to 26 CVEs in Acrobat and Reader.

๐Ÿ“– Read

via "Threatpost".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด EU-US Privacy Shield Dissolution: What Happens Next? ๐Ÿ•ด

In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.

๐Ÿ“– Read

via "Dark Reading: ".
15:34
๐Ÿ•ด Is Edtech the Greatest APT? ๐Ÿ•ด

Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?

๐Ÿ“– Read

via "Dark Reading: ".
?
15:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-13124

SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system.

๐Ÿ“– Read

via "National Vulnerability Database".
15:55
ATENTIONโ€ผ New - CVE-2020-11552

An elevation of privilege vulnerability exists in ManageEngine ADSelfService Plus before build 6003 because it does not properly enforce user privileges associated with a Certificate dialog. This vulnerability could allow an unauthenticated attacker to escalate privileges on a Windows host. An attacker does not require any privilege on the target system in order to exploit this vulnerability. One option is the self-service option on the Windows login screen. Upon selecting this option, the thick-client software is launched, which connects to a remote ADSelfService Plus server to facilitate self-service operations. An unauthenticated attacker having physical access to the host could trigger a security alert by supplying a self-signed SSL certificate to the client. The View Certificate option from the security alert allows an attacker to export a displayed certificate to a file. This can further cascade to a dialog that can open Explorer as SYSTEM. By navigating from Explorer to \windows\system32, cmd.exe can be launched as a SYSTEM.

๐Ÿ“– Read

via "National Vulnerability Database".
?
17:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Critical Intel Flaw Afflicts Several Motherboards, Server Systems, Compute Modules โŒ

A critical privilege-escalation flaw affects several popular Intel motherboards, server systems and compute modules.

๐Ÿ“– Read

via "Threatpost".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Zoom Vulnerabilities Demonstrated in DEF CON Talk ๐Ÿ•ด

A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.

๐Ÿ“– Read

via "Dark Reading: ".
17:34
๐Ÿ•ด Symmetry Systems Emerges from Stealth ๐Ÿ•ด

Company behind Data Store and Object Security (DSOS) becomes public knowledge following a $3 million seed round of funding.

๐Ÿ“– Read

via "Dark Reading: ".
17:47
๐Ÿ” Iranian Hackers Targeting Networking Devices ๐Ÿ”

The FBI warned organizations last week that an Iranian hacking group has been targeting vulnerable networking devices for a month.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
17:55
ATENTIONโ€ผ New - CVE-2020-13179

Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-13178

A function in the Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to version 20.04.1 does not properly validate the signature of an external binary, which could allow an attacker to gain elevated privileges via execution in the context of the PCoIP Agent process.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-13177

The support bundler in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows versions prior to 20.04.1 and 20.07.0 does not use hard coded paths for certain Windows binaries, which allows an attacker to gain elevated privileges via execution of a malicious binary placed in the system path.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-13176

The Management Interface of the Teradici Cloud Access Connector and Cloud Access Connector Legacy for releases prior to April 24, 2020 (v16 and earlier for the Cloud Access Connector) contains a stored cross-site scripting (XSS) vulnerability which allows a remote unauthenticated attacker to poison log files with malicious JavaScript via the login page which is executed when an administrator views the logs within the application.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-13175

The Management Interface of the Teradici Cloud Access Connector and Cloud Access Connector Legacy for releases prior to April 20, 2020 (v15 and earlier for Cloud Access Connector) contains a local file inclusion vulnerability which allows an unauthenticated remote attacker to leak LDAP credentials via a specially crafted HTTP request.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-13174

The web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking.

๐Ÿ“– Read

via "National Vulnerability Database".
17:55
ATENTIONโ€ผ New - CVE-2020-11976

By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5

๐Ÿ“– Read

via "National Vulnerability Database".
?
18:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Developers Need More Usable Static Code Scanners to Head Off Security Bugs ๐Ÿ•ด

As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.

๐Ÿ“– Read

via "Dark Reading: ".
18:34
๐Ÿ•ด Microsoft Patches 120 Vulnerabilities, Two Zero-Days ๐Ÿ•ด

The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.

๐Ÿ“– Read

via "Dark Reading: ".
?
19:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Two 0-Days Under Active Attack, Among 120 Bugs Patched by Microsoft โŒ

One of the two zero-day bugs is rated โ€˜criticalโ€™ and is classified as a remote code-execution bug impacting Microsoftโ€™s Internet Explorer.

๐Ÿ“– Read

via "Threatpost".
?
19:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-0260

There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0259

In android_verity_ctr of dm-android-verity.c, there is a possible way to modify a dm-verity protected filesystem due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157941353References: N/A

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0258

In stopZygoteLocked of AppZygote.java, there is an insufficient cleanup. This could lead to local information disclosure in the application that is started next with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-157598956

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0257

In SpecializeCommon of com_android_internal_os_Zygote.cpp, there is a permissions bypass due to an incomplete cleanup. This could lead to local escalation of privilege in isolated processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-156741968

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0256

In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0254

There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152647751

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0253

There is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-152647365

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0252

There is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-152236803

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0251

There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152647626

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0250

In requestCellInfoUpdateInternal of PhoneInterfaceManager.java, there is a missing permission check. This could lead to local information disclosure of location data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154934934

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0249

In postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-154719656

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0248

In postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154627439

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0247

In Threshold::getHistogram of ImageProcessHelper.java, there is a possible crash loop due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1Android ID: A-156087409

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0243

In clearPropValue of MediaAnalyticsItem.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-151644303

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0242

In reset of NuPlayerDriver.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151643722

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0241

In NuPlayerStreamListener of NuPlayerStreamListener.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151456667

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0240

In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0239

In getDocumentMetadata of DocumentsContract.java, there is a possible disclosure of location metadata from a file due to a permissions bypass. This could lead to local information disclosure from a file (eg. a photo) containing location metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-151095863

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0238

In updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150946634

๐Ÿ“– Read

via "National Vulnerability Database".
19:55
ATENTIONโ€ผ New - CVE-2020-0108

In postNotification of ServiceRecord.java, there is a possible bypass of foreground process restrictions due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-140108616

๐Ÿ“– Read

via "National Vulnerability Database".
?
20:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Researchers Trick Facial-Recognition Systems ๐Ÿ•ด

Goal was to see if computer-generated images that look like one person would get classified as another person.

๐Ÿ“– Read

via "Dark Reading: ".
?
20:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2019-17339

The VirtualRouter component of TIBCO Software Inc.'s TIBCO Silver Fabric contains a vulnerability that theoretically allows an attacker to inject scripts via URLs. The attacker could theoretically social engineer an authenticated user into submitting the URL, thus executing the script on the affected system with the privileges of the user. Affected releases are TIBCO Software Inc.'s TIBCO Silver Fabric: versions 6.0.0 and below.

๐Ÿ“– Read

via "National Vulnerability Database".
21:09
โŒ Agent Tesla Spyware Adds Fresh Tricks to Its Arsenal โŒ

The RAT is surging in 2020, becoming more prevalent than even the infamous TrickBot or Emotet malware.

๐Ÿ“– Read

via "Threatpost".
12 August 2020
?
08:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Security in the 'new normal': Passwordless is the way forward ๐Ÿ”

Moving on from passwords to strong authentication and adaptive access policies is key to improving security without hurting productivity, especially given the increase in remote working.

๐Ÿ“– Read

via "Security on TechRepublic".
?
09:49
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ” Microsoft fixes Windows and Internet Explorer zero-day flaws in latest Patch Tuesday ๐Ÿ”

The latest series of Patch Tuesday security updates for Windows 10 includes patches for 17 bugs marked 'Critical' and 97 listed as 'Important'.

๐Ÿ“– Read

via "Security on TechRepublic".
?
10:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic โŒ

App concealed the practice of gathering device unique identifiers using an added layer of encryption.

๐Ÿ“– Read

via "Threatpost".
?
11:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption ๐Ÿ•ด

Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.

๐Ÿ“– Read

via "Dark Reading: ".
11:34
๐Ÿ•ด Threats vs. Thrift: Running Effective AppSec During a Global Crisis ๐Ÿ•ด

By looking at security testing capacity, staff expertise, and risks throughout the software supply chain, application security teams can improve their overall effectiveness.

๐Ÿ“– Read

via "Dark Reading: ".
?
13:09
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
โŒ Citrix Warns of Critical Flaws in XenMobile Server โŒ

Citrix said that it anticipates malicious actors "will move quickly to exploit" two critical flaws in its mobile device management software.

๐Ÿ“– Read

via "Threatpost".
?
13:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Name That Toon: 'Rise' and Shine ๐Ÿ•ด

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

๐Ÿ“– Read

via "Dark Reading: ".
?
14:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด SANS Security Training Firm Hit with Data Breach ๐Ÿ•ด

A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.

๐Ÿ“– Read

via "Dark Reading: ".
14:49
๐Ÿ” SANS cybersecurity training firm suffers data breach due to phishing attack ๐Ÿ”

The breach compromised 28,000 records, exposing such data as names, phone numbers, physical addresses, and email addresses.

๐Ÿ“– Read

via "Security on TechRepublic".
?
15:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด Using 'Data for Good' to Control the Pandemic ๐Ÿ•ด

The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.

๐Ÿ“– Read

via "Dark Reading: ".
15:47
๐Ÿ” Zoom Hit With Lawsuit Over Encryption Claims ๐Ÿ”

A consumer advocacy group filed a lawsuit against the web conferencing software company alleging it misrepresented the level of security it uses to protect communications.

๐Ÿ“– Read

via "Subscriber Blog RSS Feed ".
15:49
๐Ÿ” Cybersecurity and remote support are top goals for CIOs in 2020 ๐Ÿ”

Most IT leaders say their priorities have shifted since the coronavirus pandemic surfaced around the start of the year, says Hitachi ID.

๐Ÿ“– Read

via "Security on TechRepublic".
?
17:34
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
๐Ÿ•ด FireEye Announces New Bug-Bounty Program ๐Ÿ•ด

The program, administered by Bugcrowd, will pay bounties of up to $2,500 per vulnerability.

๐Ÿ“– Read

via "Dark Reading: ".
17:49
๐Ÿ” Abandoned apps like TikTok pose a security risk in a BYOD world ๐Ÿ”

Social media apps put corporate networks at risk and provide raw material for deep fakes.

๐Ÿ“– Read

via "Security on TechRepublic".
13 August 2020
?
02:55
๐Ÿ›ก Cybersecurity & Privacy news ๐Ÿ›ก
ATENTIONโ€ผ New - CVE-2020-0555

Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-0554

Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.

๐Ÿ“– Read

via "National Vulnerability Database".
02:55
ATENTIONโ€ผ New - CVE-2020-0553

Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.

๐Ÿ“– Read

via "National Vulnerability Database".