13 August 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0513

Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2020-0512

Uncaught exception in the system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2020-0510

Out of bounds read in some Intel(R) Graphics Drivers before versions 15.45.31.5127 and 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-14630

Reliance on untrusted inputs in a security decision in some Intel(R) Thunderbolt(TM) controllers may allow unauthenticated user to potentially enable information disclosure via physical access.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-14620

Insufficient control flow management for some Intel(R) Wireless Bluetooth(R) products may allow an unprivileged user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
?
07:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Amazon Alexa β€˜One-Click’ Attack Can Divulge Personal Data ❌

Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices.

πŸ“– Read

via "Threatpost".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity TinyMCE Cross-Site Scripting Flaw Fixed ❌

The cross-site scripting flaw could enable arbitrary code execution, information disclosure - and even account takeover.

πŸ“– Read

via "Threatpost".
10:09
❌ ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls ❌

Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls.

πŸ“– Read

via "Threatpost".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Emotet Return Brings New Tactics & Evasion Techniques πŸ•΄

Security researchers tracking Emotet report its reemergence brings new tricks, including new evasion techniques to bypass security tools.

πŸ“– Read

via "Dark Reading: ".
10:34
πŸ•΄ Adaptive Shield Emerges From Stealth πŸ•΄

Israeli startup joins growing number of vendors offering platform for detecting and mitigating common configuration errors in cloud environments.

πŸ“– Read

via "Dark Reading: ".
10:49
πŸ” Amazon Alexa flaws could have revealed home address and other personal data πŸ”

The flaws could also have helped attackers obtain usernames, phone numbers, voice history, and installed skills, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ With iOS's Privacy Nutrition Label, Apple Upstages Regulators πŸ•΄

New iOS privacy features require developers to disclose what data they're collecting, how they're using it, and with whom they share it.

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ Security Jobs With a Future -- And Ones on the Way Out πŸ•΄

Some titles are hot, while others are not, amid rapidly shifting business priorities.

πŸ“– Read

via "Dark Reading: ".
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-4582

IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 167288.

πŸ“– Read

via "National Vulnerability Database".
11:55
ATENTIONβ€Ό New - CVE-2019-16374

Pega Platform 8.2.1 allows LDAP injection because a username can contain a * character and can be of unlimited length. An attacker can specify four characters of a username, followed by the * character, to bypass access control.

πŸ“– Read

via "National Vulnerability Database".
12:09
❌ New Global Threat Landscape Report Reveals β€˜Unprecedented’ Cyberattacks ❌

Fortinet's recently released Global Threat Landscape Report shows how the perimeter is extending to the home in the first half of 2020 - and what that means for cybercrime.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity πŸ•΄

Infosec practitioners face a variety of mental struggles in areas such as awareness training, problem solving, or general mental health. Several sessions at Black Hat USA 2020 highlighted these challenges and how to overcome them.

πŸ“– Read

via "Dark Reading: ".
13:49
πŸ” How hospitals can better protect themselves against data breaches πŸ”

Healthcare data breaches have fallen this year but could surge over the next few months as hospital records remain a top target, says CI Security.

πŸ“– Read

via "Security on TechRepublic".
13:49
πŸ” How to hide files from any file manager on the Linux desktop πŸ”

Want to hide files and folders from your Linux desktop file manager? Jack Wallen shows you one handy method.

πŸ“– Read

via "Security on TechRepublic".
13:49
πŸ” Report: Unskilled hackers can breach about 3 out of 4 companies πŸ”

Positive Technologies found in a recent study that criminals with few skills can hack a company in less than 30 minutes.

πŸ“– Read

via "Security on TechRepublic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Faces More Legal Challenges Over End-to-End Encryption ❌

The video-conferencing specialist has yet to roll out full encryption, but it says it's working on it.

πŸ“– Read

via "Threatpost".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Tor and anonymous browsing – just how safe is it? ⚠

How to stay safe when you're using Tor, even if the network is littered with rogues.

πŸ“– Read

via "Naked Security".
14:34
πŸ•΄ NSA & FBI Disclose New Russian Cyberespionage Malware πŸ•΄

APT 28, aka Fancy Bear, is deploying the Drovorub malware designed for Linux systems as part of cyber-espionage operations.

πŸ“– Read

via "Dark Reading: ".
14:49
πŸ” Weak and infrequent cyber-crisis training is leaving companies vulnerable, new research says πŸ”

Companies are too reliant on dated software, the most essential-to-crises staff aren't required attendance at cybersecurity training, and the pandemic exacerbated problems, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
14:49
πŸ” US and UK workers still logging 2 extra hours every day, according to VPN data πŸ”

People in Europe and Canada have gone back to the hours they were working before the coronavirus shutdown.

πŸ“– Read

via "Security on TechRepublic".
14:53
πŸ›  Wireshark Analyzer 3.2.6 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Secure Development Takes a (Remote) Village πŸ•΄

The shift to work from home isn't just about giving your Dev team the physical tools they need.

πŸ“– Read

via "Dark Reading: ".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0261

In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-146059841

πŸ“– Read

via "National Vulnerability Database".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Boeing's DEF CON Debut a Sign of the Times πŸ•΄

In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to "embrace" the hacker community.

πŸ“– Read

via "Dark Reading: ".
16:34
πŸ•΄ The Race to Hack a Satellite at DEF CON πŸ•΄

Eight teams competed to win cash, bragging rights, and the chance to control a satellite in space.

πŸ“– Read

via "Dark Reading: ".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Zero trust is critical, but very underused πŸ”

Organizations must quickly adopt the zero trust mindset of "never trust, always verify" to mitigate the spread of breaches, limit access, and prevent lateral movement, according to an Illumio report.

πŸ“– Read

via "Security on TechRepublic".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ RedCurl APT Group Hacks Global Companies for Corporate Espionage πŸ•΄

Researchers analyze a presumably Russian-speaking APT group that has been stealing corporate data since 2018.

πŸ“– Read

via "Dark Reading: ".
17:47
πŸ” New Phishing Campaign Targets SBA COVID-19 Loan Relief Accounts πŸ”

Scams targeting small businesses are unfortunately commonplace these days. The latest attempts to phish business owners' SBA loan relief logins.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets ❌

The APT is becoming more sophisticated over time.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Business Email Compromise Attacks Involving MFA Bypass Increase πŸ•΄

Adversaries are using legacy email clients to access and take over accounts protected with strong authentication, Abnormal Security says.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ NSA, FBI Warn of Linux Malware Used in Espionage Attacks ❌

A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Healthcare Industry Sees Respite From Attacks in First Half of 2020 πŸ•΄

Breach disclosures are down, and reported ransomware attacks have also plummeted. Good news -- or a calm before the storm?

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ CISA Warns of Phishing Campaign with Loan-Relief Lure πŸ•΄

Phishing emails and fake website promise help with the Small Business Administration's program that aids those affected by COVID-19.

πŸ“– Read

via "Dark Reading: ".
?
20:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
?
πŸ›‘ Cybersecurity & Privacy news πŸ›‘ 02.08.2020 14:36:22
​​========================

πŸ‘€ Look look!

These channels πŸ“¨ are amazing!

========================
?
21:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-20383

ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.

πŸ“– Read

via "National Vulnerability Database".
14 August 2020
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Instagram Retained Deleted User Data Despite GDPR Rules ❌

The photo-sharing app retained people’s photos and private direct messages on its servers even after users removed them.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WFH Summer 2020 Caption Contest Winners πŸ•΄

Clever wordplay on sandcastles, sandboxes, zero trust. and granular controls. And the winners are ...

πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Ways to Keep Your Remote Workforce Safe πŸ•΄

These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.

πŸ“– Read

via "Dark Reading: ".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How cybercriminals are exploiting US unemployment benefits to make money πŸ”

Scammers use Social Security numbers and other data to create synthetic IDs to collect unemployment benefits, says IntSights.

πŸ“– Read

via "Security on TechRepublic".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five: 8/14 Edition πŸ”

Ransomware group launches a new data leak site, 1 Billion Android phones possibly at risk of data theft, and England is testing a new coronavirus contact-tracing app - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
13:55
ATENTIONβ€Ό New - CVE-2019-7410

There is stored cross site scripting (XSS) in Galileo CMS v0.042. Remote authenticated users could inject arbitrary web script or HTML via $page_title in /lib/Galileo/files/templates/page/show.html.ep (aka the PAGE TITLE Field).

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2019-6112

A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2019-19643

ise smart connect KNX Vaillant 1.2.839 contain a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Forcepoint Hopes for Breakout Moment by Hopping on the ZTA Bandwagon πŸ•΄

The debut of Forcepoint's two-pronged zero trust access (ZTA) solution delivers much-needed competitive momentum, but it must do more to stand out against a growing field of ZTA competitors.

πŸ“– Read

via "Dark Reading: ".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-5591

A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.

πŸ“– Read

via "National Vulnerability Database".
16:09
❌ Critical Flaws in WordPress Quiz Plugin Allow Site Takeover ❌

The recently patched flaws could be abused by an unauthenticated, remote attackers to take over vulnerable websites.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DHS CISA Warns of Phishing Emails Rigged with KONNI Malware πŸ•΄

Konni is a remote administration tool cyberattackers use to steal files, capture keystrokes, take screenshots, and execute malicious code.

πŸ“– Read

via "Dark Reading: ".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-8033

In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2015-8032

In Textpattern 4.5.7, an unprivileged author can change an article's markup setting.

πŸ“– Read

via "National Vulnerability Database".
18:09
❌ Mac Users Targeted by Spyware Spreading via Xcode Projects ❌

The XCSSET suite of malware also hijacks browsers, has a ransomware module and more -- and uses a pair of zero-day exploits.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ IcedID Shows Obfuscation Sophistication in New Campaign πŸ•΄

The malware's developers have turned to dynamic link libraries (DLLs) to hide their work.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Research Casts Doubt on Value of Threat Intel Feeds πŸ•΄

Two commercial threat intelligence services and four open source feeds rarely provide the same information, raising questions about how security teams should gauge their utility.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ PoC Exploit Targeting Apache Struts Surfaces on GitHub ❌

Researchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2.

πŸ“– Read

via "Threatpost".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0255

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
16 August 2020
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-11085

php/qmn_options_questions_tab.php in the quiz-master-next plugin before 4.7.9 for WordPress allows CSRF, with resultant stored XSS, via the question_name parameter because js/admin_question.js mishandles parsing inside of a SCRIPT element.

πŸ“– Read

via "National Vulnerability Database".
17 August 2020
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – catch up on our latest articles and videos ⚠

Our recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The IT Backbone of Cybercrime πŸ•΄

Like their counterparts who run legitimate businesses, cybercriminals need hosting and cybersecurity protection, too.

πŸ“– Read

via "Dark Reading: ".
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is Azure Security? πŸ”

Azure Security refers to security tools and capabilities available on Microsoft’s Azure cloud platform. In this article, we’ll discuss Azure Security and the Azure Security Center.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-7085

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2018-7062

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2018-7061

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9018

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9017

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9016

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9015

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9014

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9013

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9012

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9011

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9010

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9009

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9008

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9007

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9006

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9005

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-9004

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-8999

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2017-8998

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:09
❌ Cyberattacks Hit Thousands of Canadian Tax, Benefit Accounts ❌

The Canada Revenue Agency (CRA) suspended online services after accounts were hit in a third wave of credential stuffing attacks this weekend - giving bad actors access to various government services.

πŸ“– Read

via "Threatpost".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” AI-enabled future crimes ranked: Deepfakes, spearphishing, and more πŸ”

A study explores the possible range and risk of attacks from military robots and autonomous attack drones to AI-assisted stalking. Here are the top 5.

πŸ“– Read

via "Security on TechRepublic".
14:49
πŸ” How one attack campaign steals and sells RDP credentials πŸ”

A hacker known as TrueFighter has been actively selling compromised Remote Desktop Protocol accounts on the Dark Web, says Nuspire.

πŸ“– Read

via "Security on TechRepublic".
14:55
ATENTIONβ€Ό New - CVE-2017-8997

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:55
ATENTIONβ€Ό New - CVE-2017-8996

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:55
ATENTIONβ€Ό New - CVE-2017-8995

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:55
ATENTIONβ€Ό New - CVE-2017-8986

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:55
ATENTIONβ€Ό New - CVE-2016-6502

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:55
ATENTIONβ€Ό New - CVE-2016-6499

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:55
ATENTIONβ€Ό New - CVE-2016-6498

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:09
❌ Jack Daniels, Ritz London Face Cyberattacks ❌

The REvil ransomware and savvy phone scammers have exposed sensitive information.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Should I Segment my IoT Devices Onto Their Own Networks? πŸ•΄

Understanding the criticality and importance of the device determines the level of segmentation.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ REvil Ransomware Hits Jack Daniel's Manufacturer πŸ•΄

Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.

πŸ“– Read

via "Dark Reading: ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜EmoCrash’ Exploit Stoppered Emotet For 6 Months ❌

A researcher developed a killswitch exploiting a buffer overflow in Emotet - preventing the malware from infecting systems for six months.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing πŸ•΄

Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.

πŸ“– Read

via "Dark Reading: ".
18:49
πŸ” Top 5 decentralized platforms πŸ”

Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.

πŸ“– Read

via "Security on TechRepublic".
18:49
πŸ” Top 5 decentralized platforms πŸ”

Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Reported Breach Count for H1 2020 Lowest in Five Years πŸ•΄

While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Advent Completes Forescout Purchase πŸ•΄

The purchase by a private equity fund was announced in February and completed today.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Firms Still Struggle to Prioritize Security Vulnerabilities πŸ•΄

Security debt continues to pile up, with 42% of organizations attributing remediation backlogs to a breach, a new study shows.

πŸ“– Read

via "Dark Reading: ".
19:49
πŸ” Top 5 password hygiene security protocols companies should follow πŸ”

Proper password methodologies can be a challenge to master. Learn some tips from industry experts on how to streamline the process and safeguard your organization.

πŸ“– Read

via "Security on TechRepublic".
18 August 2020
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ IcedID Trojan Rebooted with New Evasive Tactics ❌

Juniper identifies phishing campaign targeting business customers with malware using password protection, among other techniques, to avoid detection.

πŸ“– Read

via "Threatpost".
?
10:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Carnival Cruises hit with a costly ransomware attack πŸ”

The company says in SEC filing it is preparing for potential claims from guests, employees, and shareholders based on the data accessed.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Quality & Security Both Matter in Software πŸ•΄

It's time to position quality and security as equals under the metric of software integrity.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ AWS Cryptojacking Worm Spreads Through the Cloud ❌

The malware harvests AWS credentials and installs Monero cryptominers.

πŸ“– Read

via "Threatpost".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Stay Secure on GitHub πŸ•΄

GitHub, used badly, can be a source of more vulnerabilities than successful collaborations. Here are ways to keep your development team from getting burned on GitHub.

πŸ“– Read

via "Dark Reading: ".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is CISM? πŸ”

CISM (Certified Information Security Manager) is an advanced certification designed for IT professionals who focus on information security management. In this post, we’ll discuss what CISM is, the CISM certification process, and the benefits of being CISM-certified.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
13:49
πŸ” How to customize PowerShell settings using profiles πŸ”

Learn to create profiles within PowerShell to customize your settings based on your working environment for optimal performance and efficiency.

πŸ“– Read

via "Security on TechRepublic".
13:53
πŸ›  UFONet 1.6 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
13:53
πŸ›  Encrypted Linux x86-64 Loadable Kernel Modules (ELKM) πŸ› 

In this paper, the author presents ELKM, a Linux tool that provides a mechanism to securely transport and load encrypted Loadable Kernel Modules (LKM). The aim is to protect kernel-based rootkits and implants against observation by Endpoint Detection and Response (EDR) software and to neutralize the effects of recovery by disk forensics tooling. The tool as well as the whitepaper is provided in this archive.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
13:53
πŸ›  ClamOne 0.102.4-1 πŸ› 

ClamOne is an open source Linux front-end to the ClamAV Antivirus Engine. A basic graphical user interface, designed for a Desktop environment, to provide instant feedback when threats are detected on the local system. Features include configuring the clamd daemon directly from the GUI, indication of threats via visual cues as well as notifications, monitoring and updating the virus definitions, monitoring various clam-related event logs and messages, quarantining of detected threats, and visual graphing of antivirus activity.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US liquor giant hit by ransomware – what the rest of us can do to help ⚠

If blackmailers dump data stolen from a company that refused to pay - don't even peek at the data, Reward the refusal...

πŸ“– Read

via "Naked Security".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Credential stuffing attacks can be stopped, says Auth0 πŸ”

Stolen credentials are a thorn in any internet-facing organization's side. Auth0 claims it can reduce the effectiveness of attacks using them by 85% with its new bot detection tool.

πŸ“– Read

via "Security on TechRepublic".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Large Orgs Plagued with Bugs, Face Giant Patch Backlogs ❌

Vulnerability management continues to challenge businesses, as they face tens of thousands of bugs with every scan.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New 'Duri' Campaign Uses HTML Smuggling to Deliver Malware πŸ•΄

Researchers who detected the attack explain what businesses should know about the HTML smuggling technique.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Four Ways to Mitigate Supply Chain Security Risks From Ripple20 πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Researchers Warn of Active Malware Campaign Using HTML Smuggling ❌

A recently uncovered, active campaign called "Duri" makes use of HTML smuggling to deliver malware.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Campaign Combines Extortion, DDoS πŸ•΄

Latest attacks bank on the reputation of two prominent APT groups to increase the threat credibility.

πŸ“– Read

via "Dark Reading: ".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Canadian Government Issues Statement on Credential-Stuffing Attacks πŸ•΄

The government is responding to threats targeting the GCKey service and CRA accounts, which are used to access federal services.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Ransomware Attack on Carnival May Have Been Its Second Compromise This Year πŸ•΄

Security vendor Prevailion says it observed signs of malicious activity on the cruise operator's network between at least February and June.

πŸ“– Read

via "Dark Reading: ".
19 August 2020
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Sounds a Key Make Can Produce 3D-Printed Replica ❌

Researchers reveal technology called SpiKey that can β€˜listen’ to the clicks a key makes in a lock and create a duplicate from the sounds.

πŸ“– Read

via "Threatpost".
10:09
❌ Airline DMARC Policies Lag, Opening Flyers to Email Fraud ❌

Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Stolen Data: The Gift That Keeps on Giving πŸ•΄

Users regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” Industrial control system cybersecurity vulnerabilities are rising in 2020 πŸ”

365 ICS vulnerabilities were disclosed in the first half of the year, 75% of them are high or critical on the CVSS scale, and nearly three-quarters can be exploited remotely, according to a report.

πŸ“– Read

via "Security on TechRepublic".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” NordVPN: How to protect your organization from DDoS attacks πŸ”

Without early threat detection, you may not know your website has been hit by a DDoS attack until it slows down or stops, says NordVPN.

πŸ“– Read

via "Security on TechRepublic".
14:49
πŸ” IBM finds vulnerability in IoT chips present in billions of devices πŸ”

Manufactured by Thales, the EHS8 module family has security flaws that could allow attackers to take total control over internet-connected industrial machines.

πŸ“– Read

via "Security on TechRepublic".
14:49
πŸ” How to restrict Nextcloud login to IP addresses πŸ”

Looking to lock down your Nextcloud instance so only certain computers can login? Jack Wallen shows you how to do just this.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Control Security Costs During a Down Economy πŸ•΄

Three key areas security professionals should watch when managing their budgets.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” Ransomware Crew Ravages Liquor, Wine Company πŸ”

The parent company of some of the biggest names in liquor, including Jack Daniel's, was hit by ransomware, allowing attackers to steal 1 TB of data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ICS Vulnerability Reports Rapidly Rise πŸ•΄

More scrutiny of products for industrial control systems is expected to expose even more weaknesses in devices that run critical infrastructure.

πŸ“– Read

via "Dark Reading: ".
16:34
πŸ•΄ Newly Patched Alexa Flaws a Red Flag for Home Workers πŸ•΄

Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.

πŸ“– Read

via "Dark Reading: ".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA Warns of New RAT Aimed at US Defense Contractors πŸ•΄

Hidden Cobra, an APT group associated with the government of North Korea, is thought to be behind the campaign.

πŸ“– Read

via "Dark Reading: ".
17:34
πŸ•΄ Sophisticated P2P Botnet Targeting SSH Servers πŸ•΄

'FritzFrog' is fileless, uses its own proprietary P2P implementation, and has breached at least 500 servers so far, Guardicore says.

πŸ“– Read

via "Dark Reading: ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FritzFrog Botnet Attacks Millions of SSH Servers ❌

The unique, advanced worming P2P botnet drops backdoors and cryptominers, and is spreading globally.

πŸ“– Read

via "Threatpost".
18:09
❌ Researchers Warn of Flaw Affecting Millions of IoT Devices ❌

A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manufacturers to update their devices ASAP.

πŸ“– Read

via "Threatpost".
?
18:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to keep your company secure while employees work from home πŸ”

There are new issues organizations should consider as work from home continues with no end in sight. One expert offers ideas to secure your widening perimeter.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fuzzing Services Help Push Technology into DevOps Pipeline πŸ•΄

As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.

πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 10 Resume and Interview Tips from Security Pros πŸ•΄

Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.

πŸ“– Read

via "Dark Reading: ".
20 August 2020
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ IBM AI-Powered Data Management Software Subject to Simple Exploit ❌

A low-privileged process on a vulnerable machine could allow data harvesting and DoS.

πŸ“– Read

via "Threatpost".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Critical Flaw Patched in WAN Software Solution ❌

Cisco has issued a fix for a critical flaw in its Virtual Wide Area Application Services (vWAAS), software for optimizing WAN on virtual private cloud infrastructure.

πŸ“– Read

via "Threatpost".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Senate Bill Would Expand Facial-Recognition Restrictions Nationwide ❌

The proposed law comes as police departments around the country for their use of facial recognition to identify allegedly violent Black Lives Matter protesters.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Banks and the New Abnormal πŸ•΄

Banks have hesitated to adopt many strong security practices, and for understandable reasons. But now is the time to be bold.

πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA 2020 Recap: Experts Discuss Election Security Questions, but Offer Few Answers πŸ•΄

The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address.

πŸ“– Read

via "Dark Reading: ".
12:49
πŸ” Bank of America, Daimler, and Apple partnering with IBM for confidential computing services πŸ”

A push to provide public cloud services with production-ready confidential computing capabilities able to protect data, applications, and processes.

πŸ“– Read

via "Security on TechRepublic".
12:49
πŸ” How coronavirus-related telework is changing the enterprise, and how to respond πŸ”

Security vendor Fortinet found several important similarities between how enterprises responded, and how they plan to adapt, to a future of remote work.

πŸ“– Read

via "Security on TechRepublic".
12:49
πŸ” How the shift to remote working has impacted cybersecurity πŸ”

Cybercriminals have adapted by exploiting improperly secured VPNs, cloud-based services, and business email, says Malwarebytes.

πŸ“– Read

via "Security on TechRepublic".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Out-of-Band Security Update Fixes Windows Remote Access Flaws ❌

The unscheduled security update addresses two "important"-severity flaws in Windows 8.1 and Windows Server 2012.

πŸ“– Read

via "Threatpost".
13:09
❌ Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government ❌

The group has added a management console and a USB worming function to its main malware, Crimson RAT.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat USA 2020 Musings: Weird and Wonderful Virtual Events are Here to Stay πŸ•΄

Black Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives.

πŸ“– Read

via "Dark Reading: ".
13:34
πŸ•΄ MFA Mistakes: 6 Ways to Screw Up Multifactor Authentication πŸ•΄

Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.

πŸ“– Read

via "Dark Reading: ".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ IBM Db2 Flaw Gives Attackers Read/Write Access to Shared Memory πŸ•΄

Researchers discover a lack of explicit memory protections around the shared memory used by the Db2 trace facility.

πŸ“– Read

via "Dark Reading: ".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Twitter Hack: The Spotlight that Insider Threats Need πŸ•΄

The high profile attack should spur serious board-level conversations around the importance of insider threat prevention.

πŸ“– Read

via "Dark Reading: ".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” University CISOs say zero trust is the best defense against the existential threat of phishing πŸ”

Stanford has replaced logins and passwords with a digital key to improve endpoint security.

πŸ“– Read

via "Security on TechRepublic".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ IBM Settles Lawsuit Over Weather Channel App Data Privacy ❌

The lawsuit alleged that the IBM-owned Weather Channel mobile app did not let users know it was selling their geolocation data.

πŸ“– Read

via "Threatpost".
?
17:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Electric Vehicle Manufacturers Spar Over Trade Secret Case πŸ”

Two of the country’s biggest electric vehicle manufacturers continue to dispute the particulars of a lawsuit involving poaching talent and stealing trade secrets.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:49
πŸ” CISOs should put ad fraud security on their radars πŸ”

Digital advertising has vulnerabilities, and this type of cybercrime will cost businesses $100 million a day by 2023, but goes almost completely unnoticed, according to adtech company TrafficGuard.

πŸ“– Read

via "Security on TechRepublic".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Former Uber CSO Charged in Hack Cover-up πŸ•΄

The charges stem from a 2016 attack in which 57 million records were breached.

πŸ“– Read

via "Dark Reading: ".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Smart-Lock Hacks Point to Larger IoT Problems πŸ•΄

Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.

πŸ“– Read

via "Dark Reading: ".
21 August 2020
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Former Uber CSO Charged With Paying β€˜Hush Money’ in 2016 Breach Cover-Up ❌

Joseph Sullivan allegedly paid off $100K to the hackers responsible for a 2016 data breach, which exposed PII of 57 million passengers and drivers.

πŸ“– Read

via "Threatpost".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Smart-Lock Hacks Point to Larger IoT Problems πŸ•΄

Two recent reports on smart-locks vulnerabilities show that IoT vendors have a bigger job to do in ensuring their products are safely deployed and configured.

πŸ“– Read

via "Dark Reading: ".
10:34
πŸ•΄ Cryptominer Found Embedded in AWS Community AMI πŸ•΄

Researchers advise Amazon Web Services users running Community Amazon Machine Images to verify them for potentially malicious code.

πŸ“– Read

via "Dark Reading: ".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Using AI to fight hand-crafted Business Email Compromise ⚠

Using natural language models to identify Business Email Compromise (BEC)

πŸ“– Read

via "Naked Security".
11:34
πŸ•΄ Post-Pandemic Digitalization: Building a Human-Centric Cybersecurity Strategy πŸ•΄

COVID-19 won't be the last major disruption of its kind. Instead, it is a glimpse into what may be to come as digitalization continues to affect all aspects of our lives.

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ 'Next-Gen' Supply Chain Attacks Surge 430% πŸ•΄

Attackers are increasingly seeding open source projects with compromised components.

πŸ“– Read

via "Dark Reading: ".
11:47
πŸ” Friday Five: 8/21 Edition πŸ”

Saudi Arabia using stolen twitter data to target critics, a significant increase in vishing, and the Secret Service buying location data to bypass warrants- catch up on this week’s news with the Friday Five. - catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ News Wrap: AWS Cryptojacking Worm, IBM Privacy Lawsuit and More ❌

Threatpost editors discuss a cryptomining malware targeting AWS systems, a recent development in a lawsuit against the IBM-owned Weather Channel app, and more.

πŸ“– Read

via "Threatpost".
12:09
❌ Researchers Sound Alarm Over Malicious AWS Community AMIs ❌

Malicious Community Amazon Machine Images are a ripe target for hackers, say researchers.

πŸ“– Read

via "Threatpost".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” IoT safety: Logging devices on trucks are not always secure πŸ”

Devices attached to trucks are for safety, quality control, and efficiency. But many are being left open to hackers.

πŸ“– Read

via "Security on TechRepublic".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ University of Utah Pays $457K After Ransomware Attack ❌

The university said that it paid $457,000 to retrieve a decryption key after a ransomware attack encrypted student and faculty data on its servers.

πŸ“– Read

via "Threatpost".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Outlook β€œmail issues” phishing – don’t fall for this scam! ⚠

We deconstruct an email phishing scam in detail so you don't have to!

πŸ“– Read

via "Naked Security".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 74 Days From the Presidential Election, Security Worries Mount πŸ•΄

With pandemic measures continuing and political divisions deepening, security experts express concern about the security and integrity of the November election.

πŸ“– Read

via "Dark Reading: ".
?
18:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to install Infection Monkey for breach and attack simulations on your network πŸ”

Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.

πŸ“– Read

via "Security on TechRepublic".
22 August 2020
?
01:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ University of Utah Pays in Cyber-Extortion Scheme πŸ•΄

Though a ransomware attempt was thwarted, the university paid to prevent the release of student PII.

πŸ“– Read

via "Dark Reading: ".
24 August 2020
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – catch up on our latest articles and videos ⚠

Our recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft says the pandemic has changed the future of cybersecurity in these five ways πŸ”

A new report from Microsoft suggests that cloud-based technologies and Zero Trust architecture will become mainstays of businesses' cybersecurity investments going forward.

πŸ“– Read

via "Security on TechRepublic".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Security threats have already moved on from COVID-19-themed attacks, report finds πŸ”

The pandemic is old news for cybercriminals who are still targeting remote workers, but are doing so with botnets and familiar exploits.

πŸ“– Read

via "Security on TechRepublic".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dark Reading Launches New Section on Physical Security πŸ•΄

Partnership with IFSEC enables Dark Reading to cover new areas of security and expand its audience.

πŸ“– Read

via "Dark Reading: ".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ APIs Are the Next Frontier in Cybercrime ❌

APIs make your systems easier to run -- and make it easier for hackers, too.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Average Cost of a Data Breach in 2020: $3.86M πŸ•΄

When companies defend themselves against cyberattacks, time is money.

πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Huawei Role in UK 5G Network Set to Be Removed πŸ•΄

The Digital Secretary for the UK, Oliver Dowden, has told the House of Commons that Huawei is set to be stripped of its role in the county's 5G network due to security concerns.

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ Why Should Physical Security Professionals Learn Cybersecurity Skills? πŸ•΄

In the first of a series of columns set to be hosted exclusively on IFSEC Global, Sarb Sembhi, CISM, CTO & CISO, Virtually Informed outlines why physical security professionals should be investing in their cyber security skillset.

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ New Cybersecurity Code of Practice for Installers Unveiled by BSIA πŸ•΄

The British Security Industry Association's (BSIA) cybersecurity group has released a new code of practice for installers responsible for safety and security systems.

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ Large Ad Network Collects Private Activity Data, Reroutes Clicks πŸ•΄

A Chinese mobile advertising firm has modified code in the software development kit included in more than 1,200 apps, maliciously collecting user activity and performing ad fraud, says Snyk, a software security firm.

πŸ“– Read

via "Dark Reading: ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iran-Linked β€˜Newbie’ Hackers Spread Dharma Ransomware Via RDP Ports ❌

The recent Dharma campaign by Iran-linked script kiddies shows that the ransomwareΒ is being spread not just by sophisticated, state-sponsored actors anymore.

πŸ“– Read

via "Threatpost".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 programming languages for security admins to learn πŸ”

SecAdmins working to protect infrastructure, whether in a defensively or offensively, may find these programming languages helpful in safeguarding apps, systems, and hardware from threats.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DeathStalker APT Targets SMBs with Cyber Espionage πŸ•΄

The hacker-for-hire group, operating since at least 2012, primarily targets financial firms.

πŸ“– Read

via "Dark Reading: ".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-1985

IBM Trusteer Rapport/Apex 3.6.1908.22 contains an unused legacy driver which could allow a user with administrator privileges to cause a buffer overflow that would result in a kernel panic. IBM X-Force ID: 154207.

πŸ“– Read

via "National Vulnerability Database".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FBI, CISA Warn About Vishing Campaign Targeting Teleworkers πŸ”

In the wake of news that attackers have been carrying out a successful voice phishing campaign against companies for a month, government orgs offered tips on how employees working from home can mitigate future attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Extra security or extra risk? Pros and cons of password managers πŸ”

Tech consultants and journalists have their own conflicting opinions about the best way to manage access in a world full of security risks.

πŸ“– Read

via "Security on TechRepublic".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Use Unicode & HTML to Bypass Email Security Tools πŸ•΄

Researchers spot cybercriminals using new techniques to help malicious phishing emails slip past detection tools.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ CISA Releases 5G Security Guidelines πŸ•΄

The new document defines lines of effort for developing security for the growing 5G network.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Fixes High-Severity Chrome Browser Code Execution Bug ❌

The high-severity flaw, which was patched in the latest version of Google's Chrome browser, could allow code execution.

πŸ“– Read

via "Threatpost".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ MITRE Releases 'Shield' Active Defense Framework πŸ•΄

Free knowledge base offers techniques and tactics for engaging with and better defending against network intruders.

πŸ“– Read

via "Dark Reading: ".
25 August 2020
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem ❌

With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem areas.

πŸ“– Read

via "Threatpost".
?
10:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” IoT botnets: Smart homes ripe for a new type of cyberattack πŸ”

The burgeoning smart home device market has given rise to digital intrusion and potential energy market manipulation on a massive scale.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Fatal Flaw in Data Security πŸ•΄

Simply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages ❌

The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals.

πŸ“– Read

via "Threatpost".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Safari Bug Revealed After Apple Takes Nearly a Year to Patch ❌

Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files.

πŸ“– Read

via "Threatpost".
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 9.5 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
14:53
πŸ›  Falco 0.25.0 πŸ› 

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Palo Alto Networks to Acquire The Crypsis Group for $265M πŸ•΄

This is the latest in a series of acquisitions that Palo Alto has made since 2018.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Three Easy Ways to Avoid Meow-like Database Attacks πŸ•΄

The largest problem facing database security today is the disconnect between security teams and DBAs beginning from the moment of configuration and continuing throughout the database lifecycle.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” DOJ Discusses China's Efforts to Steal US IP πŸ”

John Demers, the Justice Department's top national security official, said that 80% of state-connected espionage cases relate to China.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Online Business Fraud Down, Consumer Fraud Up πŸ•΄

Criminals are changing tactics to match changing business conditions in the coronavirus pandemic, according to a new report.

πŸ“– Read

via "Dark Reading: ".
17:49
πŸ” How phishing attacks have exploited Amazon Web Services accounts πŸ”

Phishing campaigns could compromise business data and use Amazon's cloud platform to launch further attacks, says KnowBe4.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Phishing Attack Used Box to Land in Victim Inboxes πŸ•΄

A phishing attack targeting government and security organizations used a legitimate Box page with Microsoft 365 branding to trick victims.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Election Security's Sticky Problem: Attackers Who Don't Attack Votes πŸ•΄

If election defenders are protecting votes, and adversaries are attacking something else entirely, both sides might claim success, "Operation BlackOut" simulation shows.

πŸ“– Read

via "Dark Reading: ".
?
21:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Four More Bugs Patched in Microsoft’s Azure Sphere IoT Platform ❌

Researchers have unearthed more vulnerabilities in Microsoft’s IoT security solution.

πŸ“– Read

via "Threatpost".
26 August 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-14904

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

πŸ“– Read

via "National Vulnerability Database".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ How to Write a Cybersecurity Playbook During a Pandemic ❌

IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.

πŸ“– Read

via "Threatpost".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Medical Data Leaked on GitHub Due to Developer Errors ❌

Up to 200,000 patient records from Office 365 and Google G Suite exposed by hardcoded credentials and other improper access controls.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Deep Fake: Setting the Stage for Next-Gen Social Engineering πŸ•΄

Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” What a year of penetration testing data can reveal about the state of cybersecurity πŸ”

From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.

πŸ“– Read

via "Security on TechRepublic".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Disinformation Spurs a Thriving Industry as U.S. Election Looms ❌

Threat actors are becoming increasingly sophisticated in launching disinformation campaigns - and staying under the radar to avoid detection from Facebook, Twitter and other platforms.

πŸ“– Read

via "Threatpost".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ With More Use of Cloud, Passwords Become Even Weaker Link πŸ•΄

Slow patching provides vulnerabilities to exploit. A lack of network segmentation allows unrestricted lateral movement. Yet a report surveying a year of penetration tests finds that passwords still top the list of what attackers use to compromise systems.

πŸ“– Read

via "Dark Reading: ".
12:49
πŸ” Want to create loyal customers? Get on the bleeding edge of data security πŸ”

The public is increasingly wary of the privacy of their data. Companies reliant on it should take this as a sign of the future of customer loyalty, says data privacy firm Privitar.

πŸ“– Read

via "Security on TechRepublic".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybersecurity at a crossroads: Moving toward trust in our technologies πŸ”

Cloud computing changed the technology landscape forever. Here's hoping that trust will be the next frontier of computing.

πŸ“– Read

via "Security on TechRepublic".
13:55
ATENTIONβ€Ό New - CVE-2019-18847

Enterprise Access Client Auto-Updater allows for Remote Code Execution prior to version 2.0.1.

πŸ“– Read

via "National Vulnerability Database".
14:09
❌ Hackers Exploit Autodesk Flaw in Recent Cyberespionage Attack ❌

The popular Autodesk software was exploited in a recent cyberespionage campaign against an international architectural company.

πŸ“– Read

via "Threatpost".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€œChrome considered harmful” – the Law of Unintended Consequences ⚠

A well-written article on the APNIC blog has provoked a thoughtful response from the Chromium coders - and we can all learn from it!

πŸ“– Read

via "Naked Security".
14:34
πŸ•΄ Russian National Arrested for Conspiracy to Hack Nevada Company πŸ•΄

The defendant allegedly planned to pay an employee $1 million to infect the company network with malware.

πŸ“– Read

via "Dark Reading: ".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The 'Shared Responsibility' Misnomer: Why the Cloud Continues to Confound πŸ•΄

Under the "shared responsibility model," the security management of cloud offerings is split equally between the vendor and the customer. Easy enough, right?

πŸ“– Read

via "Dark Reading: ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Signs Your Supply Chain Risk Just Shot Up πŸ•΄

Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.

πŸ“– Read

via "Dark Reading: ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Patches β€˜High-Severity’ Bugs Impacting Switches, Fibre Storage ❌

Nine bugs were patched, eight of which are rated β€˜high’ severity.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Signs Your Supply Chain Risk Just Shot Up πŸ•΄

Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.

πŸ“– Read

via "Dark Reading: ".
17:47
πŸ” Office 365 Can Now Open Attachments in a Sandbox πŸ”

Microsoft has released a new feature update - Application Guard - that opens suspicious looking attachments in a sandbox to prevent malicious activity.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:55
ATENTIONβ€Ό New - CVE-2019-4692

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 171829.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2019-4691

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 171828.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2019-4689

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 171826.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2019-4688

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 171825.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2019-4686

IBM Security Guardium Data Encryption (GDE) 3.0.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 171822.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-1501

IBM Security Guardium 10.5, 10.6, and 11.0 could allow an unauthorized user to obtain sensitive information due to missing security controls. IBM X-Force ID: 141226.

πŸ“– Read

via "National Vulnerability Database".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Warns of Ongoing BeagleBoyz Bank-Theft Operations πŸ•΄

The North Korean operatives have attempted to steal more than $2 billion since 2015 in a series of ongoing campaigns.

πŸ“– Read

via "Dark Reading: ".
18:49
πŸ” How to install Malware Information Sharing Platform on Ubuntu Server 18.04 πŸ”

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Higher Education CISOs Share COVID-19 Response Stories πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage πŸ•΄

The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.

πŸ“– Read

via "Dark Reading: ".
27 August 2020
?
05:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Local governments continue to be the biggest target for ransomware attacks πŸ”

Small municipalities suffer the majority of ransomware, but they aren't the only ones suffering as ransoms rise and payouts become more common.

πŸ“– Read

via "Security on TechRepublic".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Revamped Qbot Trojan Packs New Punch: Hijacks Email Threads ❌

New version of trojan is spreading fast and already has claimed 100,000 victims globally, Check Point has discovered.

πŸ“– Read

via "Threatpost".
09:09
❌ Malicious Attachments Remain a Cybercriminal Threat Vector Favorite ❌

Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.

πŸ“– Read

via "Threatpost".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What a year of penetration testing data can reveal about the state of cybersecurity πŸ”

From web app flaws to a lack of 2FA, Rapid7 found lots of common soft targets in the networks it breached on behalf of clients.

πŸ“– Read

via "Security on TechRepublic".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Russian cybercrime suspect arrested in $1m ransomware conspiracy ⚠

When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in?

πŸ“– Read

via "Naked Security".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart’s Success Paves Way For Cybercriminal Credit Card β€˜Sniffer’ Market ❌

Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How CISOs Can Play a New Role in Defining the Future of Work πŸ•΄

Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.

πŸ“– Read

via "Dark Reading: ".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Qbot trojan hijacking email threads to carry out phishing campaigns πŸ”

The latest variant of this trojan extracts email threads from Outlook, which it uses for phishing attacks, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
12:53
πŸ›  I2P 0.9.47 πŸ› 

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
12:53
πŸ›  GNU Privacy Guard 2.2.22 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Hits Back At Apple’s iOS 14 Privacy Update ❌

While privacy experts praised Apple’s upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half.

πŸ“– Read

via "Threatpost".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Inside Threat from Psychological Manipulators πŸ•΄

How internal manipulators can actually degrade your organization's cyber defense, and how to defend against them.

πŸ“– Read

via "Dark Reading: ".
14:47
πŸ” Digital Guardian Named A Top Player in the Most Recent Data Loss Prevention Market Quadrant πŸ”

Digital Guardian has been named a β€œTop Player” in The Radicati Group’s Data Loss Prevention Market Quadrant, which the most up to date market quadrant for enterprise DLP in the industry.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
14:49
πŸ” How state and local governments can better combat cyberattacks πŸ”

Government agencies can suffer from differences in funding, a lack of standard policies, and other issues that affect security, says BlueVoyant.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fastly to Acquire Signal Sciences for $775M πŸ•΄

Signal Sciences' technology will be used to build a new web application and API security tool called Secure@Edge.

πŸ“– Read

via "Dark Reading: ".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How the pandemic and remote work initiatives forced organizations to change IT priorities πŸ”

Global tech professionals reveal recruiting projects fueled by budgets prioritizing staff education, according to a recent IT trends report from Netwrix.

πŸ“– Read

via "Security on TechRepublic".
15:49
πŸ” Why Vivaldi outshines all other browsers' history management πŸ”

If you're serious about managing your browser's history, Vivaldi makes this task incredibly easy. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
15:49
πŸ” North Korean hackers are actively robbing banks around the world, US government warns πŸ”

The BeagleBoyz have made off with nearly $2 billion since 2015, and they're back to attacking financial institutions after a short lull in activity.

πŸ“– Read

via "Security on TechRepublic".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to enable guest accounts from the lock screen in Android πŸ”

If you frequently hand your phone over to others, Guest Mode is a feature you should be using on Android. Jack Wallen shows you how to access the feature from your lock screen.

πŸ“– Read

via "Security on TechRepublic".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Old Malware Tool Acquires New Tricks πŸ•΄

Latest version of Qbot has acquired a new feature for collecting email threads from Outlook clients.

πŸ“– Read

via "Dark Reading: ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts ❌

Former Cisco employee Sudhish Kasaba Ramesh admitted to accessing Cisco’s cloud infrastructure and deleting 16,000 Webex Teams employee accounts.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vulnerability Volume Poised to Overwhelm Infosec Teams πŸ•΄

The collision of Microsoft and Oracle patches on the same day has contributed to risk and stress for organizations.

πŸ“– Read

via "Dark Reading: ".
18:49
πŸ” A quick and easy way to lock down SSH πŸ”

Anxious to get your Linux server SSH access locked down? Jack Wallen shows you one more step you can take--one that will only take seconds.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attacks Halt NZ Exchange Trading for Third Day πŸ•΄

New Zealand Exchange officials say the motive for the attacks is unclear.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Is China the World's Greatest Cyber Power? πŸ•΄

While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China's aggressive approach to cyber operations has made it "perhaps the world's greatest cyber power."

πŸ“– Read

via "Dark Reading: ".
?
21:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-10518

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in 2.21.6, 2.20.15, and 2.19.21. The underlying issues contributing to this vulnerability were identified both internally and through the GitHub Security Bug Bounty program.

πŸ“– Read

via "National Vulnerability Database".
21:55
ATENTIONβ€Ό New - CVE-2020-10517

An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to determine the names of unauthorized private repositories given their numerical IDs. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in versions 2.21.6, 2.20.15, and 2.19.21. This vulnerability was reported via the GitHub Bug Bounty program.

πŸ“– Read

via "National Vulnerability Database".
28 August 2020
?
08:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft just made securing Windows 10 PCs a whole lot easier for IT admins πŸ”

New security capabilities designed for SMEs allow IT admins to apply baseline security settings across an organization.

πŸ“– Read

via "Security on TechRepublic".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DoJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers ❌

Complaint details collaboration with China to funnel $250m in stolen funds as part of state-sponsored attacks.

πŸ“– Read

via "Threatpost".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Fake Android notifications – first Google, then Microsoft affected ⚠

Were you woken up by a bogus Android notification from Google or Microsoft this week?

πŸ“– Read

via "Naked Security".
11:34
πŸ•΄ Redefining What CISO Success Looks Like πŸ•΄

Key to this new definition is the principle that security programs are designed to minimize business risk, not to achieve 100% no-risk.

πŸ“– Read

via "Dark Reading: ".
11:47
πŸ” Friday Five 8/28 πŸ”

Ransomware going corporate, Cyber Command changing to a more proactive approach, and cybersecurityΒ professionals weighing in on election security -Β catch up on all the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Red Flags: 7 Signs You're About to Get Hit πŸ•΄

Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.

πŸ“– Read

via "Dark Reading: ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack ❌

A Tesla employee was reportedly approached by a Russian national and asked to install malware on the company's systems.

πŸ“– Read

via "Threatpost".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-4579

IBM Resilient SOAR 38 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 167236.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2019-4533

IBM Resilient SOAR V38.0 users may experience a denial of service of the SOAR Platform due to a insufficient input validation. IBM X-Force ID: 165589.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2019-19499

Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2019-18392

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ TA542 Returns With Emotet: What's Different Now πŸ•΄

Researchers report the TA542 threat group has made code changes to its malware and started targeting new locations with Emotet.

πŸ“– Read

via "Dark Reading: ".
14:34
πŸ•΄ Aruba Enhances Its Edge Services Platform πŸ•΄

Enhancements unify IoT, IT, and OT networks so customers to help customers adapt to changing environments and user requirements.

πŸ“– Read

via "Dark Reading: ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DNC Warns Campaign Staffers of Dating App Dangers πŸ•΄

The Democratic National Committee advises against sharing too much work and personal information on popular dating apps.

πŸ“– Read

via "Dark Reading: ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Instagram β€˜Help Center’ Phishing Scam Pilfers Credentials ❌

Researchers warn that a phishing scam is targeting Instagram users via direct messages on the app.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Data Privacy Concerns, Lack of Trust Foil Automated Contact Tracing πŸ•΄

Efforts to create a technology framework for alerting people to whether they have been exposed to an infectious disease have been hindered by a number of key issues.

πŸ“– Read

via "Dark Reading: ".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
?
πŸ›‘ Cybersecurity & Privacy news πŸ›‘ 02.08.2020 14:36:22
​​========================

πŸ‘€ Look look!

These channels πŸ“¨ are amazing!

========================
31 August 2020
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – catch up on our latest articles and videos ⚠

Our recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ From Defense to Offense: Giving CISOs Their Due πŸ•΄

In today's unparalleled era of disruption, forward-thinking CISOs can become key to company transformation -- but this means resetting relationships with the board and C-suite.

πŸ“– Read

via "Dark Reading: ".
?
11:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 9.8 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Slack Bug Allows Access to Private Channels, Conversations ❌

The RCE bug affects versions below 4.4 of the Slack desktop app.

πŸ“– Read

via "Threatpost".
13:09
❌ Stolen Fortnite Accounts Earn Hackers Millions Per Year ❌

More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ UVA Researcher Charged with Computer Intrusion & Trade Secret Theft πŸ•΄

Chinese national Haizhou Hu was researching bio-mimics and fluid dynamics at the University of Virginia.

πŸ“– Read

via "Dark Reading: ".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-12644

OX App Suite 7.10.3 and earlier allows SSRF, related to the mail account API and the /folder/list API.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2020-12643

OX App Suite 7.10.3 and earlier has Incorrect Access Control via an /api/subscriptions request for a snippet containing an email address.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2020-11618

THOMSON THT741FTA 2.2.1 and Philips DTR3502BFTA DVB-T2 2.2.1 set-top boxes have their TELNET service hardcoded to start on boot, which allows an attacker on the local network to achieve root access via the TELNET protocol.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2020-11617

The RSS application on THOMSON THT741FTA 2.2.1 and Philips DTR3502BFTA DVB-T2 2.2.1 set-top boxes doesn't validate the SSL certificates of RSS servers, which allows a man-in-the-middle attacker to modify the data delivered to the client.

πŸ“– Read

via "National Vulnerability Database".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft, Oracle, and Google top list of companies with most vulnerabilities disclosed in Q2 πŸ”

Two days accounted for 818 vulnerabilities, or 7.3% of the entire midyear's disclosures so far, according to a new report.

πŸ“– Read

via "Security on TechRepublic".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Charming Kitten Returns with WhatsApp, LinkedIn Effort ❌

The Iran-linked APT is targeting Israeli scholars and U.S. government employees in a credential-stealing effort.

πŸ“– Read

via "Threatpost".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Six Tips to Keep Families Safe Online πŸ”

With kids returning to school - many of them remotely - the Federal Trade Commission offered tips for parents to better secure their families online.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Accidentally Notarizes Shlayer Malware Used in Adware Campaign ❌

The notarized malware payloads were discovered in a recent MacOS adware campaign, disguised as Adobe Flash Player updates.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Malicious Android Apps Slip Through Google Play Protection πŸ•΄

Multiple Android apps were found spying on users and recruiting victims' devices into ad-fraud botnets.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Slack Patches Critical Desktop Vulnerability πŸ•΄

The remote code execution flaw could allow a successful attacker to fully control the Slack desktop app on a target machine.

πŸ“– Read

via "Dark Reading: ".
19:49
πŸ” The best developer-centric security products πŸ”

Commentary: For organizations struggling to secure their IT, a host of new, developer-focused products are hitting the market. Check out this guide of the best developer-centric security products.

πŸ“– Read

via "Security on TechRepublic".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Testing & Automation Pay Off for NSA's DevSecOps Project πŸ•΄

Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

πŸ“– Read

via "Dark Reading: ".
1 September 2020
?
07:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ AI on the Email Offense πŸ•΄

Mass domain purchasing enables email attackers to slip by traditional defenses. Here's how artificial intelligence can stop them.

πŸ“– Read

via "Dark Reading: ".
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-14178

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate project keys via an Information Disclosure vulnerability in the /browse.PROJECTKEY endpoint. The affected versions are before version 7.13.7, from version 8.0.0 before 8.5.8, and from version 8.6.0 before 8.12.0.

πŸ“– Read

via "National Vulnerability Database".
07:55
ATENTIONβ€Ό New - CVE-2020-12776

Openfind Mail2000 contains Broken Access Control vulnerability, which can be used to execute unauthorized commands after attackers obtain the administrator access token or cookie.

πŸ“– Read

via "National Vulnerability Database".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Pioneer Kitten APT Sells Corporate Network Access ❌

The Iran-based APT has infiltrated multiple VPNs using open-source tools and known exploits.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Poll: Help Wanted πŸ•΄

Is your security team hiring?

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ Why Are There Still So Many Windows 7 Devices? πŸ•΄

As the FBI warns, devices become more vulnerable to exploitation as time passes, due to a lack of security updates and new, emerging vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
?
11:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-12475

A Externally Controlled Reference to a Resource in Another Sphere vulnerability in obs-service-download_files of openSUSE Open Build Service allows authenticated users to generate HTTP request against internal networks and potentially downloading data that is exposed there. This issue affects: openSUSE Open Build Service .

πŸ“– Read

via "National Vulnerability Database".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FBI: Ring Smart Doorbells Could Sabotage Cops ❌

While privacy advocates have warned against Ring's partnerships with police, newly unearthed documents reveal FBI concerns about 'new challenges' smart doorbell footage could create for cops.

πŸ“– Read

via "Threatpost".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-5645

By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.

πŸ“– Read

via "National Vulnerability Database".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart Credit-Card Skimmer Adds Telegram as C2 Channel ❌

In a rare move, the encrypted messaging service is being used to send stolen payment-card data from websites back to cybercriminals.

πŸ“– Read

via "Threatpost".
14:11
❌ U.S. Voter Databases Offered for Free on Dark Web, Report ❌

Some underground forum users said they're monetizing the information through the State Department's anti-influence-campaign effort.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ISO 27701 Paves the Way for a Strategic Approach to Privacy πŸ•΄

As the first certifiable international privacy management standard, ISO 27701 is a welcome addition to the existing set of common security frameworks.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” Phishing, BEC Scams Netting $80,000 On Average in 2020 πŸ”

A recap of recent phishing activity trends found a decrease in detected phishing sites but a big increase in Business Email Compromise attack losses, around $80 million per attack.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:49
πŸ” Ransomware attacks continue to dominate the threat landscape πŸ”

Cybercriminals are increasingly exploiting the Cobalt Strike testing toolkit to carry out ransomware campaigns, says Cisco Talos Incident Response.

πŸ“– Read

via "Security on TechRepublic".
15:53
πŸ›  Sifter 10 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
15:53
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.9 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
15:55
ATENTIONβ€Ό New - CVE-2012-3341

IBM InfoSphere Guardium 7.0, 8.0, 8.01, and 8.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 78294.

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2012-3340

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to XML external entity injection, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 78291.

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2012-3338

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to bypass security restrictions, caused by improper restrictions on the create new user account functionality. An attacker could exploit this vulnerability to create unprivileged user accounts. IBM X-Force ID: 78286.

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2012-3337

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing &quot;dot dot&quot; sequences (/../) to download arbitrary files on the system. IBM X-Force ID: 78284.

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2012-3336

IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to multiple scripts, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 78282.

πŸ“– Read

via "National Vulnerability Database".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New APT Pioneer Kitten Linked to Iranian Government πŸ•΄

The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.

πŸ“– Read

via "Dark Reading: ".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Signs Shlayer, Legitimizes Malware πŸ•΄

Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.

πŸ“– Read

via "Dark Reading: ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws ❌

Two flaws - one of them yet to be fixed - are afflicting a third-party plugin used by Magento e-commerce websites.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Anti-Phishing Startup Pixm Aims to Hook Browser-Based Threats πŸ•΄

Pixm visually analyzes phishing websites from a human perspective to detect malicious pages people might otherwise miss.

πŸ“– Read

via "Dark Reading: ".
?
21:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Threat Activity by Lazarus Group Spells Trouble For Orgs πŸ•΄

The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.

πŸ“– Read

via "Dark Reading: ".
2 September 2020
?
07:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks ❌

The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents.

πŸ“– Read

via "Threatpost".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers ❌

Multiple flaws in system software that causes errors in packet handling could allow an attacker to consume memory and crash devices.

πŸ“– Read

via "Threatpost".
10:09
❌ Live Webinar: XDR and Beyond ❌

Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies

πŸ“– Read

via "Threatpost".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phishing scam uses Sharepoint and One Note to go after passwords ⚠

Not all phishing links appear right in the email itself...

πŸ“– Read

via "Naked Security".
11:34
πŸ•΄ Hypothesis: Cyber Attackers Are After Your Scientific Research πŸ•΄

From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them) πŸ•΄

By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” 33% of companies expose unsafe network services to the internet πŸ”

The findings of a new report validate the correlation between poor network hygiene and the prevalence of wider security issues in the digital supply chain.

πŸ“– Read

via "Security on TechRepublic".
11:49
πŸ” How insider threats pose risks and challenges to any organization πŸ”

Insider threats can be difficult to combat and manage due to budgetary limits, lack of staff, and insufficient tools, says Bitglass.

πŸ“– Read

via "Security on TechRepublic".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DHS Partners with Industry to Offer State, Local Gov'ts Cybersecurity Aid πŸ•΄

The US Department of Homeland Security teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ 5 Tips for Triaging Risk from Exposed Credentials πŸ•΄

Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.

πŸ“– Read

via "Dark Reading: ".
12:49
πŸ” How to enable end-to-end encryption for the Nextcloud app πŸ”

Learn how you can enable the new Nextcloud end-to-end encryption.

πŸ“– Read

via "Security on TechRepublic".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Replace your passwords with passphrases: Here's how to use them to remain secure πŸ”

Instead of trying to remember a long and complex password, try switching to passphrases. Learn why they're important and how they work.

πŸ“– Read

via "Security on TechRepublic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Joker Spyware Plagues More Google Play Apps ❌

The six malicious apps have been removed from Google Play, but could still threaten 200,000 installs.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'KryptoCibule' Uses Several Tricks to Maximize Cryptocurrency Theft πŸ•΄

The malware family uses multiple tactics to steal as much cryptocurrency as possible while flying under the radar.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Don't Forget Cybersecurity on Your Back-to-School List πŸ•΄

School systems don't seem like attractive targets, but they house lots of sensitive data, such as contact information, grades, health records, and more.

πŸ“– Read

via "Dark Reading: ".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Organizations facing nearly 1,200 phishing attacks each month πŸ”

A new study found that email phishing attacks have become more successful during the COVID-19 pandemic.

πŸ“– Read

via "Security on TechRepublic".
15:55
ATENTIONβ€Ό New - CVE-2020-12621

The Teamwire application 5.3.0 for Android allows physically proximate attackers to exploit a flaw related to the pass-code component.

πŸ“– Read

via "National Vulnerability Database".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Hidden Costs of Losing Security Talent πŸ•΄

One person's exit can set off a chain of costly events.

πŸ“– Read

via "Dark Reading: ".
16:47
πŸ” Data Privacy Legislation in California Keeps Moving Forward πŸ”

Bills that would regulate the sharing of genetic data and carve out coverage in the CCPA of some HIPAA data are close to being laws in California.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Triple-Threat Cryptocurrency RAT Mines, Steals and Harvests ❌

KryptoCibule spreads via pirated software and game torrents.

πŸ“– Read

via "Threatpost".
18:09
❌ BEC Wire Transfers Average $80K Per Attack ❌

That number represents a big uptick over Q1.

πŸ“– Read

via "Threatpost".
18:09
❌ U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021 ❌

U.S. agencies must implement vulnerability-disclosure policies by March 2021, according to a new CISA mandate.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Jersey Man Sentenced to 7+ Years for Cyber Breaking & Entering πŸ•΄

The man installed keyloggers, stealing credentials and information on emerging technology development.

πŸ“– Read

via "Dark Reading: ".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Facebook & Twitter Remove Russian Accounts Spreading Disinformation πŸ•΄

The Russia-backed Internet Research Agency has returned with new strategies to sway voters ahead of the 2020 presidential election.

πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 55% of Cybersquatted Domains Are Malicious or Potentially Fraudulent πŸ•΄

The largest online companies, such as Apple and PayPal, and banks are being targeted by cybersquatters, who are also taking advantage of the pandemic, a study finds.

πŸ“– Read

via "Dark Reading: ".
20:34
πŸ•΄ Most IoT Hardware Dangerously Easy to Crack πŸ•΄

Manufacturers need to invest more effort into protecting root-level access to connected devices, security researcher says.

πŸ“– Read

via "Dark Reading: ".
3 September 2020
?
08:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” MIT scientists unveil cybersecurity aggregation platform to gauge effective measures πŸ”

The platform allows researchers to analyze cyberattacks without sensitive information being released.

πŸ“– Read

via "Security on TechRepublic".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ NSA Mass Surveillance Program Illegal, U.S. Court Rules ❌

The NSA argued its mass surveillance program stopped terrorist attacks - but a new U.S. court ruling found that this is not, and may have even been unconstitutional.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Ways for Cybersecurity Teams to Work Smarter, Not Harder πŸ•΄

Burnout is real and pervasive, but some common sense tools and techniques can help mitigate all that.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” Verizon announces 5G network security advances and deploys Quantum Key Distribution network πŸ”

The carrier conducted trials ahead of 5G launches and says it is one of the first to pilot QKD in the US.

πŸ“– Read

via "Security on TechRepublic".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Python-based Spy RAT Emerges to Target FinTech ❌

The Evilnum APT has added the RAT to its arsenal as part of a big change-up in its TTPs.

πŸ“– Read

via "Threatpost".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-12058

Several XSS vulnerabilities in osCommerce CE Phoenix before 1.0.6.0 allow an attacker to inject and execute arbitrary JavaScript code. The malicious code can be injected as follows: the page parameter to catalog/admin/order_status.php, catalog/admin/tax_rates.php, catalog/admin/languages.php, catalog/admin/countries.php, catalog/admin/tax_classes.php, catalog/admin/reviews.php, or catalog/admin/zones.php; or the zpage or spage parameter to catalog/admin/geo_zones.php.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2019-10679

Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.

πŸ“– Read

via "National Vulnerability Database".
?
14:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Vishing scams use Amazon and Prime as lures – don’t get caught! ⚠

How do you deal with scam calls on a phone number you keep for emergencies?

πŸ“– Read

via "Naked Security".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How IoT sensors and analytics can make inside air safer for schools and offices πŸ”

Advanced building controls can help keep air clean to reduce the risk of the spreading coronavirus indoors while sensors can send an alert if a room goes over capacity.

πŸ“– Read

via "Security on TechRepublic".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Ups Product-Abuse Bug Bounties ❌

The top award for flaws that allow cybercriminals to abuse legitimate services has increased by 166 percent.

πŸ“– Read

via "Threatpost".
15:09
❌ Attackers Can Exploit Critical Cisco Jabber Flaw With One Message ❌

An attacker can execute remote code with no user interaction, thanks to CVE-2020-3495.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fake Data and Fake Information: A Treasure Trove for Defenders πŸ•΄

Cybersecurity professionals are using false data to deceive cybercriminals, enabling them to protect networks in new and innovative ways.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ New Email-Based Malware Campaigns Target Businesses πŸ•΄

Researchers who found "Salfram" say its campaigns use the same crypter to distribute payloads, including ZLoader, SmokeLoader, and AveMaria.

πŸ“– Read

via "Dark Reading: ".
15:49
πŸ” Dell's security chief leads a converged SOC with IT, OT, and product experts in one room πŸ”

Gartner says more companies should put all risk managers, IT, and OT security experts on one team to to create one view of the threat landscape.

πŸ“– Read

via "Security on TechRepublic".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Typosquatting Intensifies Ahead of US Election πŸ•΄

Mistyped URLs can mean more than inconvenience when a candidate's name is involved.

πŸ“– Read

via "Dark Reading: ".
17:47
πŸ” The Top Tips for IP Protection for Manufacturing Firms πŸ”

With industrial espionage on the rise, we asked 24 manufacturing experts the best ways to protect intellectual property at manufacturing firms.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:55
ATENTIONβ€Ό New - CVE-2020-11579

An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2020-10720

A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.

πŸ“– Read

via "National Vulnerability Database".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Evilnum APT Group Employs New Python RAT πŸ•΄

The PyVil remote access Trojan enables attackers to exfiltrate data, perform keylogging, take screenshots, and deploy tools for credential theft.

πŸ“– Read

via "Dark Reading: ".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Facebook Announces Formal Vulnerability Disclosure Policy for Third-Party Bugs πŸ•΄

The social media giant has also launched a new website for sharing information on WhatsApp security.

πŸ“– Read

via "Dark Reading: ".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How project managers can help companies better navigate security risks from COVID-19 πŸ”

Social distancing and remote working during COVID-19 have increased cybersecurity risks for companies worldwide, increasing the need for project managers to work on more security-related efforts.

πŸ“– Read

via "Security on TechRepublic".
19:55
ATENTIONβ€Ό New - CVE-2019-11928

An input validation issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed cross-site scripting upon clicking on a link from a specially crafted live location message.

πŸ“– Read

via "National Vulnerability Database".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Hidden Costs of Losing Security Talent πŸ•΄

One person's exit can set off a chain of costly events.

πŸ“– Read

via "Dark Reading: ".
4 September 2020
?
01:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ India Blocks High-Profile Chinese Apps on Political, Privacy Concerns ❌

Technology minister bans, Baidu, WeChat Work, AliPay and 115 others for capturing using data and transmitting it to servers outside of the country without authorization.

πŸ“– Read

via "Threatpost".
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-12248

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2020-12247

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information from an out-of-bounds read because a text-string index continues to be used after splitting a string into two parts. A crash may also occur.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2020-11493

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.

πŸ“– Read

via "National Vulnerability Database".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WhatsApp Discloses 6 Bugs via Dedicated Security Site ❌

The company also committed to more transparency about app flaws, with an advisory page aimed at keeping the community better informed of security vulnerabilities.

πŸ“– Read

via "Threatpost".
?
10:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 9/4 πŸ”

Owning an "OG" email account, lessons from the Garmin ransomware attack, and Emotet's new 'Red Dawn' attachment - catch up on the week’s news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phishing tricks – the Top Ten Treacheries of 2020 ⚠

Here's the Top Ten - or perhaps we mean The Worst Ten. How many would you fall for?

πŸ“– Read

via "Naked Security".
11:34
πŸ•΄ The Hidden Security Risks of Business Applications πŸ•΄

Today's enterprises depend on mission-critical applications to keep them productive, help better serve customers, and keep up with demand. It's important that they also know the risks.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” Phishing attack baits victims by promising access to quarantined emails πŸ”

This campaign tries to steal account credentials by convincing users that their email service has quarantined three messages, says Cofense.

πŸ“– Read

via "Security on TechRepublic".
11:55
ATENTIONβ€Ό New - CVE-2019-3881

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

πŸ“– Read

via "National Vulnerability Database".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Attackers Steal Outlook Credentials Via Overlay Screens on Legitimate Sites ❌

A phishing campaign uses overlay screens and email 'quarantine' policies to steal targets' Microsoft Outlook credentials.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Strategic Cyber Warfare Heats Up πŸ•΄

It's "anything goes," according to renowned hacker the Grugq, who drew a bright line between cyberwar and cyber warfare at this week's virtual Disclosure Conference.

πŸ“– Read

via "Dark Reading: ".
13:49
πŸ” New Python-based trojan targets financial tech firms to steal sensitive data πŸ”

Dubbed PyVil, the new remote access trojan goes after passwords, documents, browser cookies, and email credentials, says Cybereason.

πŸ“– Read

via "Security on TechRepublic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Debuts Third-Party Vulnerability Disclosure Policy ❌

If the social-media behemoth finds a bug in another platform's code, the project has 90 days to remediate before Facebook goes public.

πŸ“– Read

via "Threatpost".
14:09
❌ Vulnerability Disclosure: Ethical Hackers Seek Best Practices ❌

Cybersecurity researchers Brian Gorenc and Dustin Childs talk about the biggest vulnerability disclosure challenges in IoT and the industrial vertical.

πŸ“– Read

via "Threatpost".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ad Fraud: The Multi-Billion Dollar Cybercrime CISOs Might Overlook πŸ•΄

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

πŸ“– Read

via "Dark Reading: ".
14:34
πŸ•΄ Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests πŸ•΄

A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.

πŸ“– Read

via "Dark Reading: ".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Social Media: Thwarting The Phishing-Data Goldmine ❌

Cybercriminals can use social media in many ways in order to trick employees.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Warner Music Group Admits Breach πŸ•΄

The months-long breach hit financial details for customers.

πŸ“– Read

via "Dark Reading: ".
15:49
πŸ” Qualcomm unveils new Snapdragon processor to power 5G computers πŸ”

The Snapdragon 8cx Gen 2 5G chip is designed to bring 5G to commercial and consumer Always On, Always Connected PCs. The processor supports Wi-Fi 6 and offers productivity and security benefits.

πŸ“– Read

via "Security on TechRepublic".
15:49
πŸ” What SMBs and startups can learn from securing a presidential campaign πŸ”

Mayor Pete Buttigieg's former CISO and Splunk security advisor Mick Baccio explains the cybersecurity best practices he learned from protecting a presidential candidate's campaign.

πŸ“– Read

via "Security on TechRepublic".
15:49
πŸ” What SMBs and startups can learn from securing a presidential campaign πŸ”

Mayor Pete Buttigieg's former CISO and Splunk security advisor Mick Baccio explains the cybersecurity best practices he learned from protecting a presidential candidate's campaign.

πŸ“– Read

via "Security on TechRepublic".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook πŸ•΄

Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.

πŸ“– Read

via "Dark Reading: ".
16:49
πŸ” How to move Google Authenticator from one iPhone or Android device to another πŸ”

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

πŸ“– Read

via "Security on TechRepublic".
16:53
πŸ›  Faraday 3.12 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16:53
πŸ›  GNU Privacy Guard 2.2.23 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16:53
πŸ›  Scapy Packet Manipulation Tool 2.4.4 πŸ› 

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attacks on Education Escalate in 2020 πŸ•΄

The number of DDoS attacks affecting educational resources was far higher between February and June 2020 compared with 2019.

πŸ“– Read

via "Dark Reading: ".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Cybercriminals Take the Fun Out of Gaming πŸ•΄

It's all fun and games until someone loses their V-Bucks, right? Here's how cyberattackers are cheating the gaming biz -- and winning big.

πŸ“– Read

via "Dark Reading: ".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-20916

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

πŸ“– Read

via "National Vulnerability Database".
?
20:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Apple will release iOS 14 without this privacy feature: What iPhone users and developers need to know πŸ”

The iOS 14, iPadOS 14, and tvOS 14 anti-tracking feature is on hold until early 2021 to give developers time to make the necessary changes, according to Apple.

πŸ“– Read

via "Security on TechRepublic".
5 September 2020
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Toon: Mask Out πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading: ".
7 September 2020
?
06:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Monday review – catch up on our latest articles and videos ⚠

Our recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Botnets: A cheat sheet for business users and security admins πŸ”

Almost anything with an internet connection can be hijacked and used in a malicious botnet attack--IoT devices are especially popular targets. Learn how to spot and prevent this malware threat.

πŸ“– Read

via "Security on TechRepublic".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Farewell Flash Player: Microsoft tells businesses to get ready for the end of support πŸ”

From January 2021, Flash will be disabled by default in IE 11 and Microsoft Edge browser.

πŸ“– Read

via "Security on TechRepublic".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ CEOs Could Be Held Personally Liable for Cyberattacks that Kill ❌

As IT systems, IoT and operational technology converge, attacks on cyber-physical systems in industrial, healthcare and other scenarios will come with dire consequences, Gartner predicts.

πŸ“– Read

via "Threatpost".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces ❌

The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional β€œperimeter” no longer exists.

πŸ“– Read

via "Threatpost".
?
18:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to enable Canonical Livepatch from the command line πŸ”

If you have Ubuntu Servers in your data center, you should consider adding Canonical Livepatch to keep them up to date with kernel security patches.

πŸ“– Read

via "Security on TechRepublic".
8 September 2020
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Your work laptop may not be as secure as it should be πŸ”

Nearly a quarter of work computers provided by employers lack any additional security software, research from Kaspersky reveals.

πŸ“– Read

via "Security on TechRepublic".
09:55
ATENTIONβ€Ό New - CVE-2020-11118

u'Information exposure issues while processing IE header due to improper check of beacon IE frame' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCM2150, QCN7605, QCS405, QCS605, QCS610, QM215, Rennell, Saipan, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2020-11117

u'In the lbd service, an external user can issue a specially crafted debug command to overwrite arbitrary files with arbitrary content resulting in remote code execution.' in Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, QCA4531, QCA9531, QCA9980

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2020-11116

u'Possible out of bound write while processing association response received from host due to lack of check of IE length' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCM2150, QCN7605, QCS405, QCS605, QCS610, QM215, SA6155P, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2020-11115

u'Buffer over read occurs while processing information element from beacon due to lack of check of data received from beacon' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Bitra, Kamorta, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCM2150, QCN7605, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM660, SDM845, SDX20, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14119

u'While processing SMCInvoke asynchronous message header, message count is modified leading to a TOCTOU race condition and lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MDM9205, MDM9607, Nicobar, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDM670, SDM710, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14117

u'Whenever the page list is updated via privileged user, the previous list elements are freed but are not deleted from the list which results in a use after free causing an unhandled page fault exception in rmnet driver' in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in Bitra, MDM9607, QCS405, Saipan, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14115

u'Information disclosure issue occurs as in current logic as secure touch is released without clearing the display session which can result in user reading the secure input while touch is in non-secure domain as secure display is active' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14089

u'Keymaster attestation key and device IDs provisioning which is a one time process is incorrectly allowed to be re-provisioned after a user data erase or a factory reset' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Kamorta, Nicobar, QCS404, QCS610, Rennell, SA515M, SA6155P, SC7180, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14074

u'Heap overflow in diag command handler due to lack of check of packet length received from user' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8076, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14065

u'Pointer double free in HavenSvc due to not setting the pointer to NULL after freeing it' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8998, Nicobar, QCS404, QCS405, QCS605, QCS610, Rennell, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14056

u'Possible integer overflow in API due to lack of check on large oid range count in cert extension field' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Kamorta, MDM9150, MDM9205, MDM9607, MDM9650, Nicobar, QCS404, QCS405, QCS605, QCS610, Rennell, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14052

u'Accessing an uninitialized data structure could result in partially copying of contents and thus incorrect processing' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QCS610, QM215, SA415M, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-14025

u'When a new session is created, Object is returned that contains TZ addresses and it get passed to HLOS as an handle to refer to a particular session and can cause TZ to jump to a invalid address' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, QCS610, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-13999

u'Lack of check for integer overflow for round up and addition operations result into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-13998

u'Lack of check that the TX FIFO write and read indices that are read from shared RAM are less than the FIFO size results into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-13995

u'Lack of integer overflow check for addition of fragment size and remaining size that are read from shared memory can lead to memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-13994

u'Lack of check that the current received data fragment size of a particular packet that are read from shared memory are less than the actual packet size can lead to memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-13992

u'Out of bound memory access if stack push and pop operation are performed without doing a bound check on stack top' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Bitra, IPQ6018, IPQ8074, MDM9205, Nicobar, QCA8081, QCN7605, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-10629

u'User Process can potentially corrupt kernel virtual page by passing a crafted page in API' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Bitra, IPQ6018, IPQ8074, MDM9205, Nicobar, QCA8081, QCN7605, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
09:55
ATENTIONβ€Ό New - CVE-2019-10628

u'Memory can be potentially corrupted if random index is allowed to manipulate TLB entries in Kernel from user library' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8098, Bitra, MDM9205, MDM9650, MSM8998, Nicobar, QCA6390, QCN7605, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
?
10:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-10615

u'Possibility of integer overflow in keymaster 4 while allocating memory due to multiplication of large numcerts value and size of keymaster bob which can lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
10:55
ATENTIONβ€Ό New - CVE-2019-10596

u'Improper access control can lead signed process to guess pid of other processes and access their address space' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Bitra, Nicobar, QCS605, QCS610, Rennell, SA6155P, Saipan, SC7180, SC8180X, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
10:55
ATENTIONβ€Ό New - CVE-2019-10562

u'Improper authentication and signature verification of debug polices in secure boot loader will allow unverified debug policies to be loaded into secure memory and leads to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MSM8998, Nicobar, QCS404, QCS605, QCS610, Rennell, SA415M, SA6155P, SC7180, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
10:55
ATENTIONβ€Ό New - CVE-2019-10527

u'SMEM partition can be manipulated in case of any compromise on HLOS, thus resulting in access to memory outside of SMEM address range which could lead to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA4531, QCA6574AU, QCA8081, QCM2150, QCN7605, QCN7606, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
10:55
ATENTIONβ€Ό New - CVE-2018-13903

u'Error in UE due to race condition in EPCO handling' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, MDM9205, MDM9206, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, SDM450, SM8150

πŸ“– Read

via "National Vulnerability Database".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Frequently Asked Questions on Organizations' Data Protection Programs πŸ•΄

Adherence to data protection regulations requires a multidisciplinary approach that has the commitment of all employees. Expect to be asked questions like these.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bug in Google Maps Opened Door to Cross-Site Scripting Attacks ❌

A researcher discovered a cross-site scripting flaw in Google Map's export function, which earned him $10,000 in bug bounty rewards.

πŸ“– Read

via "Threatpost".
12:09
❌ Cryptobugs Found in Numerous Google Play Store Apps ❌

A new dynamic tool developed by Columbia University researchers flagged cryptography mistakes made in more than 300 popular Android apps.

πŸ“– Read

via "Threatpost".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Post-COVID-19 Cybersecurity Spending Update πŸ•΄

Security spending growth will slow in 2020, but purse strings are looser than for other areas of IT.

πŸ“– Read

via "Dark Reading: ".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How SMBs are overcoming key challenges in cybersecurity πŸ”

Small and midsized businesses cited budget constraints as their biggest security obstacle, according to Untangle.

πŸ“– Read

via "Security on TechRepublic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Adobe Flaws Allow Attackers to Run JavaScript in Browsers ❌

Five critical cross-site scripting flaws were fixed by Adobe in Experience Manager as part of its regularly scheduled patches.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ VPNs: The Cyber Elephant in the Room πŸ•΄

While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Google Cloud Expands Confidential Computing Lineup πŸ•΄

Google plans to build out its Confidential Computing portfolio with the launch of Confidential GKE Nodes for Kubernetes workloads.

πŸ“– Read

via "Dark Reading: ".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WordPress Plug-in Has Critical Zero-Day πŸ•΄

The vulnerability in WordPress File Manager could allow a malicious actor to take over the victim's website.

πŸ“– Read

via "Dark Reading: ".
16:47
πŸ” Following Data Theft, NJ Hacker Sentenced πŸ”

The hacker admitted last year that he broke into two companies – one his former employer – and stole more than 15,000 files.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Intel Active Management Technology Flaw Allows Privilege Escalation ❌

The critical Intel vulnerability could allow unauthenticated attackers gain escalated privileges on Intel vPro corporate systems.

πŸ“– Read

via "Threatpost".
18:09
❌ Microsoft’s Patch Tuesday Packed with Critical RCE Bugs ❌

The most concerning of the disclosed bugs would allow an attacker to take over Microsoft Exchange just by sending an email.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Fixes 129 Vulnerabilities for September's Patch Tuesday πŸ•΄

This month's Patch Tuesday brought fixes for 23 critical vulnerabilities, including a notable flaw in Microsoft Exchange.

πŸ“– Read

via "Dark Reading: ".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Next-Gen Firewalls 101: Not Just a Buzzword πŸ•΄

In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.

πŸ“– Read

via "Dark Reading: ".
9 September 2020
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-11124

u'Possible use-after-free while accessing diag client map table since list can be reallocated due to exceeding max client limit.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9607, Nicobar, QCS404, QCS405, QCS610, Rennell, SA6155P, SA8155P, Saipan, SC8180X, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spyware Labeled β€˜TikTok Pro’ Exploits Fears of US Ban ❌

Malware can take over common device functions as well as creates a phishing page to steal Facebook credentials.

πŸ“– Read

via "Threatpost".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Fake web alerts – how to spot and stop them ⚠

How do you spot and deal with fake system alerts on both computers and mobile devices?

πŸ“– Read

via "Naked Security".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers πŸ•΄

In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.

πŸ“– Read

via "Dark Reading: ".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft issues 129 security fixes as part of Patch Tuesday September πŸ”

This month's patch Tuesday includes patches for 15 Microsoft products, including 23 critical CVEs.

πŸ“– Read

via "Security on TechRepublic".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Severe Industrial Bugs Allow Takeover of Critical Systems ❌

Researchers warn of critical vulnerabilities in a third-party industrial component used by top ICS vendors like Rockwell Automation and Siemens.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Multiparty Encryption Allows Companies to Solve Security-Data Conundrum πŸ•΄

An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.

πŸ“– Read

via "Dark Reading: ".
13:34
πŸ•΄ Gone in a Flash πŸ•΄

Behold, the pitfalls of portable hardware.

πŸ“– Read

via "Dark Reading: ".
13:49
πŸ” Android 11 security features and improvements you need to know πŸ”

Android 11 is finally released, and there are security and privacy fixes and features you should know about Google's mobile operating system. Jack Wallen provides the details.

πŸ“– Read

via "Security on TechRepublic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TeamTNT Gains Full Remote Takeover of Cloud Instances ❌

Using a legitimate tool called Weave Scope, the cybercrime group is establishing fileless backdoors on targeted Docker and Kubernetes clusters.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Cybersecurity Priorities for Government Agencies & Political Campaigns πŸ•΄

As election season ramps up, organizations engaged in the process must strengthen security to prevent chaos and disorder from carrying the day. Here's how.

πŸ“– Read

via "Dark Reading: ".
15:49
πŸ” First day of school shut down by ransomware attack in Connecticut πŸ”

Hartford Mayor Luke Bronin said the attackers did not make a specific ransom demand after shutting down systems for 40 schools.

πŸ“– Read

via "Security on TechRepublic".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Secureworks to Buy Delve Laboratories for Vulnerability Management πŸ•΄

Delve's automated vulnerability platform provides insight on high-risk vulnerabilities across an organization's network, endpoints, and cloud.

πŸ“– Read

via "Dark Reading: ".
16:47
πŸ” Brazil's Data Protection Law, LGPD, Is Imminent πŸ”

In an abrupt reverse course, Brazil's data protection law won't be bumped to 2021 by COVID-19; instead it will go into effect over the next few days.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:49
πŸ” Backing up data is more important as people work from home during COVID-19 πŸ”

TechRepublic writer Erik Eckel gives tips on how to make sure your data is safe if you're working from home.

πŸ“– Read

via "Security on TechRepublic".
16:49
πŸ” Backing up data is more important as people work from home during COVID-19 πŸ”

TechRepublic writer Erik Eckel gives tips on how to make sure your data is safe if you're working from home.

πŸ“– Read

via "Security on TechRepublic".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Our Diversity Program Isn't Working. What Are We Doing Wrong? πŸ•΄

Assuming that you're truly stuck, here are some things to consider.

πŸ“– Read

via "Dark Reading: ".
17:34
πŸ•΄ Why We Need to Pay Attention to Attacks on the Smart-Built Environment πŸ•΄

Are attacks on IoT physical security devices real or just theoretical? Why professionals need to be aware of the real-life examples in an effort to guard against future attacks on their own businesses.

πŸ“– Read

via "Dark Reading: ".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-17774

Ingenico Telium 2 POS terminals have an insecure NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17773

Ingenico Telium 2 POS terminals have a buffer overflow via SOCKET_TASK in the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17772

Ingenico Telium 2 POS terminals allow arbitrary code execution via the TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17771

Ingenico Telium 2 POS terminals have hardcoded FTP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17770

Ingenico Telium 2 POS terminals have a buffer overflow via the RemotePutFile command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17769

Ingenico Telium 2 POS terminals have a buffer overflow via the 0x26 command of the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17768

Ingenico Telium 2 POS terminals have an insecure TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17767

Ingenico Telium 2 POS terminals have hardcoded PPP credentials. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17766

Ingenico Telium 2 POS Telium2 OS allow bypass of file-reading restrictions via the NTPT3 protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2018-17765

Ingenico Telium 2 POS terminals have undeclared TRACE protocol commands. This is fixed in Telium 2 SDK v9.32.03 patch N.

πŸ“– Read

via "National Vulnerability Database".
18:09
❌ Google Squashes Critical Android Media Framework Bug ❌

The September Android security bulletin addressed critical- and high-severity flaws tied to 53 CVEs overall.

πŸ“– Read

via "Threatpost".
18:09
❌ Zeppelin Ransomware Returns with New Trojan on Board ❌

The malware has popped up in a targeted campaign and a new infection routine.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Inova Suffers Third-Party Data Breach πŸ•΄

The breach occurred as part of a ransomware attack against service provider Blackbaud.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Chart: Does Lack of Diversity Impact the Skills Shortage? πŸ•΄

Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Meet the Middlemen Who Connect Cybercriminals With Victims πŸ•΄

An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Legality of Security Research to be Decided in US Supreme Court Case πŸ•΄

A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Attacks Disrupt School Reopenings πŸ•΄

A flurry of recent attacks is complicating attempts to deliver classes online at some schools in different parts of the country.

πŸ“– Read

via "Dark Reading: ".
10 September 2020
?
07:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ CDRThief Malware Targets VoIP Gear in Carrier Networks ❌

The Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud.

πŸ“– Read

via "Threatpost".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Linux servers and workstations are hackers' next target, security researchers warn πŸ”

Sophisticated hackers and crooks are developing more tools to target Linux-based systems used by government and big business.

πŸ“– Read

via "Security on TechRepublic".
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Product Overview: Cynet Takes Cyber Threat Protection Automation to the Next Level with Incident Engine ❌

The Cynet 360 platform is built on three pillars; Extended Detection and Response (XDR), Response Automation, and Managed Detection and Response (MDR).

πŸ“– Read

via "Threatpost".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles ❌

New opt-in COVID-19 Exposure Notifications Express systems baked into Apple’s iOS and available on Android need privacy guardrails, say privacy advocates.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ripple20 Malware Highlights Industrial Security Challenges πŸ•΄

Poor security practices allowed software vulnerabilities to propagate throughout industrial and IoT products for more than 20 years.

πŸ“– Read

via "Dark Reading: ".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware And Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans ❌

Cyberattacks have caused several school systems to delay students' first day back - and experts warn that new COVID-related delays could be the new "snow days."

πŸ“– Read

via "Threatpost".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Zeek 3.2.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks ❌

The "BLURtooth" flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0.

πŸ“– Read

via "Threatpost".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How ransomware attacks are growing in severity πŸ”

Demands are sharply higher, and the complexity and costs of addressing an attack are increasing, according to cyber insurance provider Coalition.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Managed IT Providers: The Cyber-Threat Actors' Gateway to SMBs πŸ•΄

Criminals have made MSPs a big target of their attacks. That should concern small and midsize businesses a great deal.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Think You're Spending Enough on Security? πŸ•΄

While the amount will vary from organization to organization, here are four ways for everyone to evaluate whether they're allocating the right amount of money and resources.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” How to Mitigate a DDoS Attack πŸ”

Following a rash of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks worldwide, countries are offering guidance.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:55
ATENTIONβ€Ό New - CVE-2018-17145

Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.

πŸ“– Read

via "National Vulnerability Database".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zoom Brings Two-Factor Authentication to All Users πŸ•΄

This marks the latest step Zoom has taken to improve user security as more employees work from home.

πŸ“– Read

via "Dark Reading: ".
17:49
πŸ” How to manage app permissions in Android 11 πŸ”

With your Android device upgraded to version 11, you'll want to get control of app permissions. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Razer Gaming Fans Caught Up in Data Leak ❌

A cloud misconfiguration at the gaming-gear merchant potentially exposed 100,000 customers to phishing and fraud.

πŸ“– Read

via "Threatpost".
18:09
❌ Microsoft Warns of Cyberattacks on Trump, Biden Election Campaigns ❌

Just months before the U.S. presidential election, hackers from Russia, China and Iran are ramping up phishing and malware attacks against campaign staffers.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ThreatConnect Buys Nehemiah Security πŸ•΄

Threat intelligence firm adds Nehemiah's Risk Quantifier to its platform.

πŸ“– Read

via "Dark Reading: ".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Lessons IT Security Can Learn From DevOps πŸ•΄

DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Two Years on from GDPR: Has It Driven Growth in Cybersecurity Insurance? πŸ•΄

Whilst GDPR has put the spotlight on data privacy and cyber issues, there are other more prominent trends that are driving a greater take-up of cyber insurance, says Ben Maidment, Class Underwriter - Cyber, Physical & Technology at Brit Insurance.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ US Sanctions Russian Attackers for 2020 Election Interference πŸ•΄

The move comes as Microsoft publishes research on attack groups and activity attempting to target the Biden and Trump campaigns.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Cyber-Risks Explode With Move to Telehealth Services πŸ•΄

The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest.

πŸ“– Read

via "Dark Reading: ".
11 September 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-1420

On desktop, Ubuntu UI Toolkit's StateSaver would serialise data on tmp/ files which an attacker could use to expose potentially sensitive data. StateSaver would also open files without the O_EXCL flag. An attacker could exploit this to launch a symlink attack, though this is partially mitigated by symlink and hardlink restrictions in Ubuntu. Fixed in 1.1.1188+14.10.20140813.4-0ubuntu1.

πŸ“– Read

via "National Vulnerability Database".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fraud Prevention During the Pandemic πŸ•΄

When the economy is disrupted, fraud goes up, so let's not ignore the lessons we can learn from previous downturns.

πŸ“– Read

via "Dark Reading: ".
?
12:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 9/11 πŸ”

Initial access brokers, scam domain names, and Brazil's new data protection law - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security: Hacking Windows passwords via your wallpaper ⚠

Themes and wallpapers - how dangerous can they really be?

πŸ“– Read

via "Naked Security".
13:34
πŸ•΄ Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time πŸ•΄

New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in.

πŸ“– Read

via "Dark Reading: ".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-19948

The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this cross-site request forgery (CSRF) vulnerability could allow attackers to force NAS users to execute unintentional actions through a web application. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2018-19947

The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this information exposure vulnerability could disclose sensitive information. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2018-19946

The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this improper certificate validation vulnerability could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.

πŸ“– Read

via "National Vulnerability Database".
14:09
❌ WordPress Plugin Flaw Allows Attackers to Forge Emails ❌

The high-severity flaw in the Email Subscribers & Newsletters plugin by Icegram affects more than 100,000 WordPress websites.

πŸ“– Read

via "Threatpost".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Microsoft detects wave of cyberattacks two months before US presidential election πŸ”

Hacker groups are ramping up activity as the US heads into the peak of election season. The latest attacks at times bear hallmarks similar to those seen in 2016.

πŸ“– Read

via "Security on TechRepublic".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to limit file upload size on NGINX to mitigate DoS attacks πŸ”

If you have an NGINX site that must allow users to upload files, try this configuration to help prevent possible Denial-of-Service attacks.

πŸ“– Read

via "Security on TechRepublic".
15:49
πŸ” How to patch CentOS against BootHole πŸ”

If you have CentOS servers in your data center, you'll want to make sure to patch them against BootHole. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
15:49
πŸ” How to hide files from any file manager on the Linux desktop πŸ”

Want to hide files and folders from your Linux desktop file manager? Jack Wallen shows you one handy method.

πŸ“– Read

via "Security on TechRepublic".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 22 cybersecurity courses for aspiring and in-demand IT security pros πŸ”

If you want to land a high-paying cybersecurity job or ace an IT security certification exam, check out these online training courses, which cover GDPR, business continuity, ethical hacking, and more.

πŸ“– Read

via "Security on TechRepublic".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ It’s No β€˜Giggle’: Managing Expectations for Vulnerability Disclosure ❌

Vulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Hits US District Court in Louisiana πŸ•΄

The ransomware attack has exposed internal documents from the court and knocked its website offline.

πŸ“– Read

via "Dark Reading: ".
17:34
πŸ•΄ APT Groups Set Sights on Linux Targets: Inside the Trend πŸ•΄

Researchers see more advanced attack groups creating tools and platforms to target Linux-based devices.

πŸ“– Read

via "Dark Reading: ".
17:34
πŸ•΄ 3 Secure Moments: A Tranquil Trio of Security Haiku πŸ•΄

Placid poems to quiet the infosec pro's harried mind. (Or placid, by infosec standards.)

πŸ“– Read

via "Dark Reading: ".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2014-10401

An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2013-7491

An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2013-7490

An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.

πŸ“– Read

via "National Vulnerability Database".
18:09
❌ Office 365 Phishing Attack Leverages Real-Time Active Directory Validation ❌

Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.

πŸ“– Read

via "Threatpost".
18:09
❌ APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins ❌

The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.

πŸ“– Read

via "Threatpost".
14 September 2020
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – β€œShould you worry about your wallpaper?” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ More Printers Could Mean Security Problems for Home-Bound Workers πŸ•΄

Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ Open Source Security's Top Threat and What To Do About It πŸ•΄

With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” How to restrict Nextcloud logins to IP addresses πŸ”

If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.

πŸ“– Read

via "Security on TechRepublic".
11:49
πŸ” How to install Infection Monkey for breach and attack simulations on your network πŸ”

Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.

πŸ“– Read

via "Security on TechRepublic".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Clam AntiVirus Toolkit 0.103.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart Attack Impacts More Than 10K Online Shoppers ❌

Close to 2,000 e-commerce sites were infected over the weekend with a payment-card skimmer, maybe the result of a zero-day exploit.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Virginia's Largest School System Hit With Ransomware πŸ•΄

Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.

πŸ“– Read

via "Dark Reading: ".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-20432

D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.

πŸ“– Read

via "National Vulnerability Database".
14:09
❌ TikTok Fixes Flaws That Opened Android App to Compromise ❌

The flaws are disclosed as Oracle reportedly partners with TikTok as concerns in the U.S. over spying continue.

πŸ“– Read

via "Threatpost".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-0233

An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2019-0230

Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cloud Leak Exposes 320M Dating-Site Records ❌

A misconfigured, Mailfire-owned Elasticsearch server impacted 70 dating and e-commerce sites, exposing PII and details such as romantic preferences.

πŸ“– Read

via "Threatpost".
?
17:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CISA Breaks Down Recent Chinese Nation State Cyber Activity πŸ”

A new advisory from CISA outlines recent tactics, techniques, and procedures (TTPs) used by Chinese nation state hackers to target US agencies; it also includes ATT&CK Framework TTPs.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
17:55
ATENTIONβ€Ό New - CVE-2019-14756

An issue was discovered in KaiOS 1.0, 2.5, and 2.5.12.5. The pre-installed Email application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a specially crafted email to the victim that will inject HTML into the email application's UI as soon as the email is opened. At a bare minimum, this allows an attacker to take control over the Email application's UI (e.g., display a malicious prompt to the user asking them to re-enter their email credentials) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Through an Economics Lens: A Guide for CISOs πŸ•΄

An expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ E-Commerce Sites Hit With New Attack on Magento πŸ•΄

The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Feds Warn Nation-State Hackers are Actively Exploiting Unpatched Microsoft Exchange, F5, VPN Bugs ❌

Monday's CISA advisory is a staunch reminder for federal government and private sector entities to apply patches for flaws in F5 BIG-IP devices, Citrix VPNs, Pulse Secure VPNs and Microsoft Exchange servers.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Large Cloud Providers Much Less Likely Than Enterprises to Get Breached πŸ•΄

Pen-test results also show a majority of organizations have few protections against attackers already on the network.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Researchers, Companies Slam Mobile Voting Firm Voatz for 'Bad Faith' Attacks πŸ•΄

In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices.

πŸ“– Read

via "Dark Reading: ".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-14761

An issue was discovered in KaiOS 2.5. The pre-installed Note application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Note application. At a bare minimum, this allows an attacker to take control over the Note application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2019-14760

An issue was discovered in KaiOS 2.5. The pre-installed Recorder application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Recorder application. At a bare minimum, this allows an attacker to take control over the Recorder application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2019-14759

An issue was discovered in KaiOS 1.0, 2.5, and 2.5.1. The pre-installed Radio application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Radio application. At a bare minimum, this allows an attacker to take control over the Radio application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2019-14758

An issue was discovered in KaiOS 2.5 and 2.5.1. The pre-installed File Manager application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a file via email to the victim that will inject HTML into the File Manager application (assuming the victim chooses to download the email attachment). At a bare minimum, this allows an attacker to take control over the File Manager application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2019-14757

An issue was discovered in KaiOS 2.5 and 2.5.1. The pre-installed Contacts application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a vCard file to the victim that will inject HTML into the Contacts application (assuming the victim chooses to import the file). At a bare minimum, this allows an attacker to take control over the Contacts application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.

πŸ“– Read

via "National Vulnerability Database".
15 September 2020
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MFA Bypass Bugs Opened Microsoft 365 to Attack ❌

Vulnerabilities β€˜that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.

πŸ“– Read

via "Threatpost".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Real-World Tool for Organizing, Integrating Your Other Tools πŸ•΄



πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ Simplify Your Privacy Approach to Overcome CCPA Challenges πŸ•΄

By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” Ransomware attacks continue to dominate the threat landscape πŸ”

Cybercriminals are increasingly exploiting the Cobalt Strike testing toolkit to carry out ransomware campaigns, says Cisco Talos Incident Response.

πŸ“– Read

via "Security on TechRepublic".
11:49
πŸ” How to protect your organization from DDoS attacks πŸ”

Without early threat detection, you may not know your website has been hit by a DDoS attack until it slows down or stops, says NordVPN Teams.

πŸ“– Read

via "Security on TechRepublic".
11:49
πŸ” CISOs are struggling to prepare for security compliance audits πŸ”

CISOs are turning to automation to address concerns about doing more with less, preparing for audits remotely, and speeding evidence collection, according to a newly released study.

πŸ“– Read

via "Security on TechRepublic".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Windows Exploit Released For Microsoft β€˜Zerologon’ Flaw ❌

Security researchers and U.S. government authorities alike are urging admins to address Microsoft's critical privilege escalation flaw.

πŸ“– Read

via "Threatpost".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top 5 things to know about zero trust ops πŸ”

Checking users, applications, and devices on your network are just a few ways to keep your company safe from cyberattacks. Tom Merritt lists five things to know about zero trust ops.

πŸ“– Read

via "Security on TechRepublic".
13:49
πŸ” Top 5 things to know about zero trust ops πŸ”

Checking users, applications, and devices on your network are just a few ways to keep your company safe from cyberattacks. Tom Merritt lists five things to know about zero trust ops.

πŸ“– Read

via "Security on TechRepublic".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Research Finds Nearly 800,000 Access Keys Exposed Online πŸ•΄

The keys were primarily for access to databases and cloud services.

πŸ“– Read

via "Dark Reading: ".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to run a phishing attack simulation with GoPhish πŸ”

Jack Wallen shows you how to run a phishing simulation on your employees to test their understanding of how this type of attack works.

πŸ“– Read

via "Security on TechRepublic".
14:52
πŸ” Top 10 antivirus software options for security-conscious users πŸ”

The world is too dangerous to use the internet unprotected. Save your computers, tablets, and phones from being attacked with these options.

πŸ“– Read

via "Security on TechRepublic".
14:52
πŸ” Cyberattacks against schools are on the rise πŸ”

With the back-to-school season, schools and academic organizations are seeing an increase in cyberattacks, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
14:55
πŸ›  TOR Virtual Network Tunneling Tool 0.4.4.5 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Encrypted Traffic Inference: An Alternative to Enterprise Network Traffic Decryption πŸ•΄

Finding threats in encrypted inbound network traffic is complex and expensive for enterprises, but a fascinating new approach could eliminate the need for decryption.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Taking Security With You in the WFH Era: What to Do Next πŸ•΄

As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ CISA Issues Alert for Microsoft Netlogon Vulnerability πŸ•΄

CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472.

πŸ“– Read

via "Dark Reading: ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ IBM Spectrum Protect Plus Security Open to RCE ❌

Two bugs (CVE-2020-4703 and CVE-2020-4711) in IBM's Spectrum Protect Plus data-storage protection solution could enable remote code execution.

πŸ“– Read

via "Threatpost".
17:09
❌ QR Codes Serve Up a Menu of Security Concerns ❌

QR code usage is soaring in the pandemic -- but malicious versions aren't something that most people think about.

πŸ“– Read

via "Threatpost".
?
17:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Exploit Code for Patched Windows Zerologon Vulnerability Released πŸ”

Details on Friday came out around a severe privilege escalation vulnerability Microsoft patched last month in Netlogon. Now exploit code for the vulnerability, Zerologon, is making the rounds online.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Security Lessons Humans Can Learn From Their Dogs πŸ•΄

Without the right reinforcements, you'll be barking at the moon.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Data Breaches Exposes Vets, COVID-19 Patients ❌

Social engineering and employee mistakes lead to breach Veteran's Administration and the National Health Service.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ More Cyberattacks in the First Half of 2020 Than in All of 2019 πŸ•΄

The pandemic-related shift to remote work and the growing availability of ransomware-as-a-service were two major drivers, CrowdStrike says.

πŸ“– Read

via "Dark Reading: ".
19:34
πŸ•΄ Rethinking Resilience: Tips for Your Disaster Recovery Plan πŸ•΄

As more organizations face disruptions, a defined approach to recovery is imperative so they can successfully recover, experts say.

πŸ“– Read

via "Dark Reading: ".
?
21:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Real-World Tool for Organizing, Integrating Third-Party Tools πŸ•΄

Omdia Cybersecurity Accelerator analyst Eric Parizo describes how a security product integration framework (SPIF) can unify best-of-breed architectures.

πŸ“– Read

via "Dark Reading: ".
21:34
πŸ•΄ Thermal vision solutions πŸ•΄



πŸ“– Read

via "Dark Reading: ".
16 September 2020
?
10:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bluetooth Spoofing Bug Affects Billions of IoT Devices ❌

The 'BLESA' flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said.

πŸ“– Read

via "Threatpost".
10:09
❌ Report Looks at COVID-19’s Massive Impact on Cybersecurity ❌

Cynet's report shares several interesting data points and findings, such as the cyberattack volume change observed in various industry sectors, the increased use of spearphishing as an initial attack vector, and the approaches being used to distribute malware in spearphishing attacks.

πŸ“– Read

via "Threatpost".
?
11:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Expanding threat landscape is biggest concern, cybersecurity analysts tell Gartner πŸ”

Since the COVID-19 pandemic began, IT teams have been trying to keep up with the ever-evolving array of cyberthreats.

πŸ“– Read

via "Security on TechRepublic".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Bounces Back, but Talent Still Absent πŸ•΄

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ Meet the Computer Scientist Who Helped Push for Paper Ballots πŸ•΄

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.

πŸ“– Read

via "Dark Reading: ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DoJ Indicts Two Hackers for Defacing Websites with Pro-Iran Messages ❌

The two hackers allegedly hacked more than 50 websites hosted in the U.S. and vandalized them with pro-Iran messages.

πŸ“– Read

via "Threatpost".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA Joins MITRE to Issue Vulnerability Identifiers πŸ•΄

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
14:49
πŸ” My stolen credit card details were used 4,500 miles away. I tried to find out how it happened πŸ”

When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.

πŸ“– Read

via "Security on TechRepublic".
14:49
πŸ” How did my credit card details get stolen and used half the world away? πŸ”

Cybersecurity reporter Danny Palmer tells Karen Roby what he discovered when he tried to find out how someone in South America attempted to use his bank details.

πŸ“– Read

via "Security on TechRepublic".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DDoS Attacks Skyrocket as Pandemic Bites ❌

More people being online during lockdowns and work-from-home shifts has proven to be lucrative for DDoS-ers.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 8 Reasons Perimeter Security Alone Won't Protect Your Crown Jewels πŸ•΄

Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:55
ATENTIONβ€Ό New - CVE-2014-10402

An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.

πŸ“– Read

via "National Vulnerability Database".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Charges Five Members of China-Linked APT41 for Global Attacks πŸ•΄

The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports.

πŸ“– Read

via "Dark Reading: ".
16:47
πŸ” How to Comply with Accountability in Data Protection πŸ”

A new framework published by the UK Information Commissioner's Office can help organizations comply with the GDPR's accountability requirements.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Hackers Continue Cyberattacks Against Vatican, Catholic Orgs ❌

The China-linked threat group RedDeltaΒ has continued to launch cyberattacks against Catholic institutions since May 2020 until as recently as last week.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Most Organizations Plan to Make COVID-19 Changes Permanent πŸ•΄

After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency.

πŸ“– Read

via "Dark Reading: ".
17:34
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, say researchers. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".
17:49
πŸ” How to protect your organization against brute-force attacks πŸ”

Cybersecurity is critical. With the shift toward remote work, brute-force attacks are increasingly targeting accounts that use Microsoft's Remote Desktop Protocol, says NordVPN Teams.

πŸ“– Read

via "Security on TechRepublic".
17:53
πŸ›  nfstream 6.1.1 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attacks Rose 151% in First Half of 2020 πŸ•΄

Attacks grew in number, size, and sophistication as the coronavirus pandemic took hold.

πŸ“– Read

via "Dark Reading: ".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Likely Links Emerge Between Lazarus Group and Russian-Speaking Cybercriminals πŸ•΄

Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers.

πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What's on Your Enterprise Network? You Might be Surprised πŸ•΄

The strangest connected devices are showing up, and the threats they pose to security should not be overlooked.

πŸ“– Read

via "Dark Reading: ".
17 September 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-12787

Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.

πŸ“– Read

via "National Vulnerability Database".
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Zerologon – hacking Windows servers with a bunch of zeros ⚠

Cryptography is hard. And cryptographic blunders can be hard to spot. This one was there for years...

πŸ“– Read

via "Naked Security".
?
09:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".
?
11:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How ransomware operators are joining forces to carry out attacks πŸ”

Attackers buy stolen data from other criminals, while the Maze group publishes data captured by other gangs, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
11:53
πŸ›  nfstream 6.1.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ California Elementary Kids Kicked Off Online Learning by Ransomware ❌

The attack on the Newhall District in Valencia is part of a wave of ransomware attacks on the education sector, which shows no sign of dissipating.

πŸ“– Read

via "Threatpost".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How IT Security Organizations are Attacking the Cybersecurity Problem πŸ•΄

The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.

πŸ“– Read

via "Dark Reading: ".
12:34
πŸ•΄ Struggling to Secure Remote IT? 3 Lessons from the Office πŸ•΄

The great remote work experiment has exacerbated existing challenges and exposed new gaps, but there are things to be learned from office challenges.

πŸ“– Read

via "Dark Reading: ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ APT41 Operatives Indicted as Sophisticated Hacking Activity Continues ❌

Five alleged members of the China-linked advanced threat group and two associates have been indicted by a Federal grand jury, on dozens of charges.

πŸ“– Read

via "Threatpost".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Play Bans Stalkerware and β€˜Misrepresentation’ ❌

The official app store is taking on spy- and surveillance-ware, along with apps that could be used to mount political-influence campaigns.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Black Hat Europe πŸ•΄

Virtual Event

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Time for CEOs to Stop Enabling China's Blatant IP Theft πŸ•΄

Protecting intellectual property in the name of US economic and national security should be part of every company's fiduciary duty.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” DOJ Charges Two Iranians in Cyber Intrusion Campaign πŸ”

For years, the hackers infiltrated systems and targeted intellectual property and national security data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CISOs top traits revealed in report: Improvement needed πŸ”

A new Gartner report found only 12% of chief information security officers (CISOs) met the criteria for being considered highly effective.

πŸ“– Read

via "Security on TechRepublic".
16:55
ATENTIONβ€Ό New - CVE-2020-0392

In getLayerDebugInfo of SurfaceFlinger.cpp, there is a possible code execution due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-150226608

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0391

In applyPolicy of PackageManagerService.java, there is possible arbitrary command execution as System due to an unenforced protected-broadcast. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-158570769

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0390

In the app zygote SE Policy, there is a possible permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-157598026

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0389

In createSaveNotification of RecordingService.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-156959408

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0388

In createEmergencyLocationUserNotification of GnssVisibilityControl.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-156123285

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0386

In onCreate of RequestPermissionActivity.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege allowing an attacker to set Bluetooth discoverability with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155650356

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0385

In Parse_insh of eas_mdls.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote information disclosure in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-150160041

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0384

In Parse_art of eas_mdls.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote information disclosure in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150159906

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0383

In Parse_ins of eas_mdls.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure in the media extractor process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150160279

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0382

In RunInternal of dumpstate.cpp, there is a possible user consent bypass due to an uncaught exception. This could lead to local information disclosure of bug report data with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-152944488

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0381

In Parse_wave of eas_mdls.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure in a highly constrained process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150159669

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0380

In allocExcessBits of bitalloc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146398979

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0379

In the Bluetooth service, there is a possible spoofing attack due to a logic error. This could lead to remote information disclosure of sensitive information with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-150156492

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0342

There is a possible out of bounds write due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-160812576

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0278

There is a possible out of bounds write due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-160812574

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0245

In DecodeFrameCombinedMode of combined_decode.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152496149

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0229

There is a possible out of bounds write due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-156333725

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0123

There is a possible out of bounds write due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-149871374

πŸ“– Read

via "National Vulnerability Database".
16:55
ATENTIONβ€Ό New - CVE-2020-0074

In verifyIntentFiltersIfNeeded of PackageManagerService.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-146204120

πŸ“– Read

via "National Vulnerability Database".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Sumo Logic IPO Prices Higher Than Expected πŸ•΄

Co-founder and CTO Christian Beedgen explains what this means for the future of the cloud-based data analytics company.

πŸ“– Read

via "Dark Reading: ".
17:34
πŸ•΄ Ransomware Gone Awry Has Fatal Consequences πŸ•΄

An attack that knocked hospital systems offline ends in death for patient who had to be sent to another facility.

πŸ“– Read

via "Dark Reading: ".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0387

In manifest files of the SmartSpace package, there is a possible tapjacking vector due to a missing permission check. This could lead to local escalation of privilege and account hijacking with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-156046804

πŸ“– Read

via "National Vulnerability Database".
17:55
ATENTIONβ€Ό New - CVE-2019-20919

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

πŸ“– Read

via "National Vulnerability Database".
18:09
❌ Apple Bug Allows Code Execution on iPhone, iPad, iPod ❌

Release of iOS 14 and iPadOS 14 brings fixes 11 bugs, some rated high-severity.

πŸ“– Read

via "Threatpost".
18:09
❌ Mozi Botnet Accounts for Majority of IoT Traffic ❌

Mozi’s spike comes amid a huge increase in overall IoT botnet activity.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Iranian Hackers Indicted for Stealing Aerospace & Satellite Tracking Data πŸ•΄

Also, the US Treasury sanctioned Iranian attack group APT39 following a years-long malware campaign.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Indictments Unlikely to Deter China's APT41 Activity πŸ•΄

So far, at least, the threat group has not let public scrutiny slow it down, security researchers say.

πŸ“– Read

via "Dark Reading: ".
?
19:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0289

In PackageManager, there is a missing permission check. This could lead to local information disclosure across users with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153996872

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0288

In PackageManager, there is a missing permission check. This could lead to local information disclosure across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153995991

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0287

In libmkvextractor, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-141860394

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0279

In the AAC parser, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-131430997

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0277

In NetworkPolicyManagerService, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing a malicious app to modify the device's data plan with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148627993

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0275

In MediaProvider, there is a possible way to access ContentResolver and MediaStore entries the app shouldn't have access to due to a permissions bypass. This could lead to local escalation of privilege, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150507736

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0274

In the OMX parser, there is a possible information disclosure due to a returned raw pointer. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-120781925

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0270

In tremolo, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-145790628

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0267

In WindowManager, there is a possible launch of an unexpected app due to a confused deputy. This could lead to local escalation of privilege due to launching a malicious app instead of the one the user intended, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139128211

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0266

In factory reset protection, there is a possible FRP bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-111086459

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0264

In libstagefright, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-116718596

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0130

In screencap, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege in a system process with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-123230379

πŸ“– Read

via "National Vulnerability Database".
19:55
ATENTIONβ€Ό New - CVE-2020-0125

In mediadrm, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137282168

πŸ“– Read

via "National Vulnerability Database".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Don't Fall for It! Defending Against Deepfakes πŸ•΄

Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.

πŸ“– Read

via "Dark Reading: ".
18 September 2020
?
10:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 9/18 πŸ”

Campaign app bugs, VA data breaches, and IoT legislation - catch on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mitigating Cyber-Risk While We're (Still) Working from Home πŸ•΄

One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ Deepfake Detection Poses Problematic Technology Race πŸ•΄

Experts hold out little hope for a robust technical solution in the long term.

πŸ“– Read

via "Dark Reading: ".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ A real-life Maze ransomware attack – β€œIf at first you don’t succeed…” ⚠

The crooks wanted $15,000,000. They didn't get it. Huzzah!

πŸ“– Read

via "Naked Security".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0262

In WiFi tethering, there is a possible attacker controlled intent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156353008

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2020-0089

In the audio server, there is a missing permission check. This could lead to local escalation of privilege regarding audio settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137015603

πŸ“– Read

via "National Vulnerability Database".
14:09
❌ Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach ❌

Maze continues to adopt tactics from rival cybercrime gangs.

πŸ“– Read

via "Threatpost".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” TikTok and WeChat to be banned from US app stores starting Sunday πŸ”

Users in the US would be unable to download the two Chinese-owned apps from local app stores, according to the Department of Commerce.

πŸ“– Read

via "Security on TechRepublic".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Security Takeaways from the Great Work-from-Home Experiment ❌

As the pandemic drags on and remote workforces stay remote, zero-trust and other lessons learned should come to the fore.

πŸ“– Read

via "Threatpost".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2020-0272

In libhwbinder, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-130166487

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2020-0271

In the Settings app, there is an insecure default value. This could lead to local escalation of privilege and tapjacking with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144507081

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2020-0269

In Android Auto Settings, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-151645626

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2020-0268

In NFC, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148294643

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2020-0265

In Telephony, there are possible leaks of sensitive data due to missing permission checks. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150155839

πŸ“– Read

via "National Vulnerability Database".
15:55
ATENTIONβ€Ό New - CVE-2020-0263

In the Accessibility service, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154913130

πŸ“– Read

via "National Vulnerability Database".
16:09
❌ SecOps Teams Wrestle with Manual Processes, HR Gaps ❌

Enterprise security teams are "drowning in alerts."

πŸ“– Read

via "Threatpost".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to encrypt files on your Linux servers with gocryptfs πŸ”

Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.

πŸ“– Read

via "Security on TechRepublic".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Video surveillance & analytics πŸ•΄



πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ The smart home revolution πŸ•΄



πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Deadly Ransomware Story Continues to Unfold πŸ•΄

A ransomware attack with fatal consequences is attracting notice and comment from around the world.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ A Hacker's Playlist πŸ•΄

Nine security researchers share their favorite songs and genres.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Stubborn WooCommerce Plugin Bugs Get Third Patch ❌

Users of the Discount Rules for WooCommerce WordPress plugin are urged to apply a third and (hopefully) final patch.

πŸ“– Read

via "Threatpost".
19:09
❌ The TikTok Ban: Security Experts Weigh in on the App’s Risks ❌

With no hard evidence of abuse, are bans warranted? The real security concerns will likely come after the ban goes into effect, researchers said in our exclusive roundtable.

πŸ“– Read

via "Threatpost".
21 September 2020
?
05:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – β€œThe Zerologon hole: are you at risk?” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
?
10:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Windows Server: Patch this critical flaw now says Homeland Security in emergency warning πŸ”

Government agencies in the US have until today to patch a Windows Server vulnerability that could give hackers control over federal networks.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hacking Yourself: Marie Moe and Pacemaker Security πŸ•΄

Future consumer devices, including pacemakers, should be built with security from the start.

πŸ“– Read

via "Dark Reading: ".
11:34
πŸ•΄ 5 Steps to Greater Cyber Resiliency πŸ•΄

Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.

πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Patch by Tonight: CISA Issues Emergency Directive for Critical Netlogon Flaw πŸ•΄

The directive requires all federal agencies to apply a patch for Windows Netlogon vulnerability CVE-2020-1472 by midnight on Sept. 21.

πŸ“– Read

via "Dark Reading: ".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Android Malware Bypasses 2FA And Targets Telegram, Gmail Passwords ❌

A new Android malware strain has been uncovered, part of the Rampant Kitten threat group's widespread surveillance campaign that targets Telegram credentials and more.

πŸ“– Read

via "Threatpost".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Firefox for Android Bug Allows β€˜Epic Rick-Rolling’ ❌

Anyone on the same Wi-Fi network can force websites to launch, with no user interaction.

πŸ“– Read

via "Threatpost".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Defending Against Deepfakes: From Tells to Crypto πŸ•΄

Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.

πŸ“– Read

via "Dark Reading: ".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Mozilla's VPN service works across mobile and desktop platforms πŸ”

Mozilla now offers a VPN service that protects Windows and mobile devices, and soon your Linux and macOS desktops. Jack Wallen shows you how to use the new offering.

πŸ“– Read

via "Security on TechRepublic".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CISA Asks Federal Agencies to Patch Zerologon Vulnerability ASAP πŸ”

In a rare emergency directive, CISA asked all federal agencies to immediately deploy last month's Windows Security Update to remediate a critical vulnerability in Netlogon.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DHS Issues Dire Patch Warning for β€˜Zerologon’ ❌

The deadline looms for U.S. Cybersecurity and Infrastructure Security Agency’s emergency directive for federal agencies to patch against the so-called β€˜Zerologon’ vulnerability.

πŸ“– Read

via "Threatpost".
17:09
❌ Unsecured Microsoft Bing Server Leaks Search Queries, Location Data ❌

Data exposed included search terms, location coordinates, and device information - but no personal data.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Dark Overlord' Cyber Extortionist Pleads Guilty πŸ•΄

Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.

πŸ“– Read

via "Dark Reading: ".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Dark Overlord' Cyber Extortionist Pleads Guilty πŸ•΄

Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Fileless Malware Tops Critical Endpoint Threats for 1H 2020 ❌

When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Remote Work Exacerbating Data Sprawl πŸ•΄

More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.

πŸ“– Read

via "Dark Reading: ".
?
20:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  nfstream 6.1.3 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
22 September 2020
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work πŸ•΄

New research shows how security skills are lacking across multiple IT disciplines as well - including network engineers, sys admins, and cloud developers.

πŸ“– Read

via "Dark Reading: ".
10:49
πŸ” Tech jobs: These are the skills most in demand as companies change their priorities πŸ”

Keeping the hackers out remains a top priority but firms are also looking at new areas of investment.

πŸ“– Read

via "Security on TechRepublic".
10:49
πŸ” 75% of AppSec practitioners see a growing cultural divide between AppSec and developers πŸ”

Thirty-nine percent of developers said the security team is responsible for securing apps, while 67% of AppSec practitioners said their teams are responsible, according to a new study.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Permission Management & the Goldilocks Conundrum πŸ•΄

In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right."

πŸ“– Read

via "Dark Reading: ".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Cloud Buckets Exposed in Rampant Misconfiguration ❌

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

πŸ“– Read

via "Threatpost".
12:17
❌ Activision Refutes Claims of 500K-Account Hack ❌

The Call of Duty behemoth said that the reports of widespread hacks are false.

πŸ“– Read

via "Threatpost".
12:17
❌ Firefox 81 Release Kills High-Severity Code-Execution Bugs ❌

Mozilla has fixed three high-severity flaws with the release of Firefox 81 and Firefox ESR 78.3.

πŸ“– Read

via "Threatpost".
?
13:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Overhauls Patch Tuesday Security Update Guide ❌

Microsoft announced a new Security Guide to help cybersecurity profession more quickly untangle relevant bugs in its monthly security bulletins.

πŸ“– Read

via "Threatpost".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Extends Data Loss Prevention to Cloud App Security πŸ•΄

The update, one of several announced today, is intended to help employees remain compliant when handling data across cloud applications.

πŸ“– Read

via "Dark Reading: ".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Can Schools Pass Their Biggest Cybersecurity Test Yet? πŸ•΄

Understaffed, underfunded, and underequipped, IT teams in the K-12 sector face a slew of challenges amid remote and hybrid learning models. Here's where they can begin to protect their schools against cyberattacks.

πŸ“– Read

via "Dark Reading: ".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Known Citrix Workspace Bug Open to New Attack ❌

Windows MSI files provide an opening for attackers even though the bug was mostly patched in July.

πŸ“– Read

via "Threatpost".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Startup Aims to Map and Track All the IT and Security Things πŸ•΄

Security service JupiterOne spins off from a healthcare service provider's homegrown technology.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ New Google Search Hacks Push Viruses & Porn πŸ•΄

Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulate search results.

πŸ“– Read

via "Dark Reading: ".
15:47
πŸ” Georgia Clinic Pays $1.5M to Settle HIPAA Noncompliance πŸ”

An investigation by HHS OCR at this clinic uncovered "longstanding, systemic noncompliance with the HIPAA Privacy and Security Rules."

πŸ“– Read

via "Subscriber Blog RSS Feed ".
15:49
πŸ” Four ways CISOs can move enterprise security into the new normal πŸ”

Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.

πŸ“– Read

via "Security on TechRepublic".
15:53
πŸ›  OpenSSL Toolkit 1.1.1h πŸ› 

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Chrome Bugs Open Browsers to Attack ❌

Google's new release of Chrome 85.0.4183.121 for Windows, Mac, and Linux fixes 10 security flaws.

πŸ“– Read

via "Threatpost".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to create a secure username πŸ”

Passwords are the most important factor for securing your accounts. But you need to pay attention to your usernames as well, says NordPass.

πŸ“– Read

via "Security on TechRepublic".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vulnerability Disclosure Programs See Signups & Payouts Surge πŸ•΄

More than $44.75 million in rewards were paid to hackers over the past year, driving total payouts beyond $100 million.

πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Target Small Manufacturing Firms πŸ•΄

The most common tactics include credential stuffing using valid accounts, various forms of deception, and vulnerabilities in third-party software, Rapid7 says in its latest quarterly threat report.

πŸ“– Read

via "Dark Reading: ".
23 September 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-1983

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) and Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to cause repeated crashes in some internal processes that are running on the affected devices, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation of email attachments. An attacker could exploit this vulnerability by sending an email message with a crafted attachment through an affected device. A successful exploit could allow the attacker to cause specific processes to crash repeatedly, resulting in the complete unavailability of both the Cisco Advanced Malware Protection (AMP) and message tracking features and in severe performance degradation while processing email. After the affected processes restart, the software resumes filtering for the same attachment, causing the affected processes to crash and restart again. A successful exploit could also allow the attacker to cause a repeated DoS condition. Manual intervention may be required to recover from this situation.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-1947

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause the CPU utilization to increase to 100 percent, causing a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of email messages that contain large attachments. An attacker could exploit this vulnerability by sending a malicious email message through the targeted device. A successful exploit could allow the attacker to cause a permanent DoS condition due to high CPU utilization. This vulnerability may require manual intervention to recover the ESA.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-1888

A vulnerability in the Administration Web Interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to upload arbitrary files and execute commands on the underlying operating system. To exploit this vulnerability, an attacker needs valid Administrator credentials. The vulnerability is due to insufficient restrictions for the content uploaded to an affected system. An attacker could exploit this vulnerability by uploading arbitrary files containing operating system commands that will be executed by an affected system. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the web interface and then elevate their privileges to root.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-1736

A vulnerability in the firmware of the Cisco UCS C-Series Rack Servers could allow an authenticated, physical attacker to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot validation checks and load a compromised software image on an affected device. The vulnerability is due to improper validation of the server firmware upgrade images. An attacker could exploit this vulnerability by installing a server firmware version that would allow the attacker to disable UEFI Secure Boot. A successful exploit could allow the attacker to bypass the signature validation checks that are done by UEFI Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16028

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper handling of Lightweight Directory Access Protocol (LDAP) authentication responses from an external authentication server. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to gain administrative access to the web-based management interface of the affected device.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16025

A vulnerability in the web framework of Cisco Emergency Responder could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of some parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by persuading a user to access a malicious link or by intercepting a user request for the affected web interface and injecting malicious code into that request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web-based management interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16023

Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16021

Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16019

Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16017

A vulnerability in the Operations, Administration, Maintenance and Provisioning (OAMP) OpsConsole Server for Cisco Unified Customer Voice Portal (CVP) could allow an authenticated, remote attacker to execute Insecure Direct Object Reference actions on specific pages within the OAMP application. The vulnerability is due to insufficient input validation on specific pages of the OAMP application. An attacker could exploit this vulnerability by authenticating to Cisco Unified CVP and sending crafted HTTP requests. A successful exploit could allow an attacker with administrator or read-only privileges to learn information outside of their expected scope. An attacker with administrator privileges could modify certain configuration details of resources outside of their defined scope, which could result in a denial of service (DoS) condition.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16009

A vulnerability in the web UI of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16007

A vulnerability in the inter-service communication of Cisco AnyConnect Secure Mobility Client for Android could allow an unauthenticated, local attacker to perform a service hijack attack on an affected device or cause a denial of service (DoS) condition. The vulnerability is due to the use of implicit service invocations. An attacker could exploit this vulnerability by persuading a user to install a malicious application. A successful exploit could allow the attacker to access confidential user information or cause a DoS condition on the AnyConnect application.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16004

A vulnerability in the REST API endpoint of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected device. The vulnerability is due to missing authentication on some of the API calls. An attacker could exploit this vulnerability by sending a request to one of the affected calls. A successful exploit could allow the attacker to interact with some parts of the API.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-16000

A vulnerability in the automatic update process of Cisco Umbrella Roaming Client for Windows could allow an authenticated, local attacker to install arbitrary, unapproved applications on a targeted device. The vulnerability is due to insufficient verification of the Windows Installer. An attacker could exploit this vulnerability by placing a file in a specific location in the Windows file system. A successful exploit could allow the attacker to bypass configured policy and install unapproved applications.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-15993

A vulnerability in the web UI of Cisco Small Business Switches could allow an unauthenticated, remote attacker to access sensitive device information. The vulnerability exists because the software lacks proper authentication controls to information accessible from the web UI. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web UI of an affected device. A successful exploit could allow the attacker to access sensitive device information, which includes configuration files.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-15992

A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-15974

A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-15969

A vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script or HTML code in the context of the interface, which could allow the attacker to gain access to sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-15963

A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view sensitive information in the web-based management interface of the affected software. The vulnerability is due to insufficient protection of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by accessing the interface and viewing restricted portions of the software configuration. A successful exploit could allow the attacker to gain access to sensitive information or conduct further attacks.

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2019-15959

A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by accessing the physical interface of a device and inserting a USB storage device. A successful exploit could allow the attacker to execute scripts on the device in an elevated security context.

πŸ“– Read

via "National Vulnerability Database".
?
03:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-15957

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system. When processed, the commands will be executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by providing malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as the root user.

πŸ“– Read

via "National Vulnerability Database".
03:55
ATENTIONβ€Ό New - CVE-2019-15289

Multiple vulnerabilities in the video service of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by sending crafted traffic to the video service of an affected endpoint. A successful exploit could allow the attacker to cause the video service to crash, resulting in a DoS condition on an affected device.

πŸ“– Read

via "National Vulnerability Database".
03:55
ATENTIONβ€Ό New - CVE-2019-15287

Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

πŸ“– Read

via "National Vulnerability Database".
03:55
ATENTIONβ€Ό New - CVE-2019-15285

Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

πŸ“– Read

via "National Vulnerability Database".
03:55
ATENTIONβ€Ό New - CVE-2019-15283

Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

πŸ“– Read

via "National Vulnerability Database".
?
09:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 12 Bare-Minimum Benchmarks for AppSec Initiatives πŸ•΄

The newly published Building Security in Maturity Model provides the software security basics organizations should cover to keep up with their peers.

πŸ“– Read

via "Dark Reading: ".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Non-Technical Skills Threat Analysts Should Master to Keep Their Jobs πŸ•΄

It's not just technical expertise and certifications that enable analysts to build long-term careers in cybersecurity.

πŸ“– Read

via "Dark Reading: ".
11:49
πŸ” Experts discuss ways IT can maximize budget amid COVID-19 shrinkage πŸ”

With revenue down, CIOs are rearranging their technology spending to prioritize return to office needs and security, executives say.

πŸ“– Read

via "Security on TechRepublic".
11:49
πŸ” FBI warns of cybercriminals spreading false info about 2020 election results πŸ”

Bad actors could create or change websites and social media content to discredit this year's electoral process, cautions the FBI and CISA.

πŸ“– Read

via "Security on TechRepublic".
11:49
πŸ” How rogue TikTok accounts are promoting malicious mobile apps πŸ”

The accounts are pushing games, wallpaper, and other apps designed to deploy adware scams toward iOS and Android users, says Avast.

πŸ“– Read

via "Security on TechRepublic".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ OldGremlin Ransomware Group Bedevils Russian Orgs ❌

The cybercriminal group has plagued firms with ransomware, sent via spear phishing emails with COVID-19 lures, since March.

πŸ“– Read

via "Threatpost".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FBI, DHS Warn of 'Likely' Disinformation Campaigns About Election Results πŸ•΄

Nation-state actors and cybercriminals could wage cyberattacks and spread false information about the integrity of the election results while officials certify the final vote counts.

πŸ“– Read

via "Dark Reading: ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ CISA: LokiBot Stealer Storms Into a Resurgence ❌

The trojan has seen a big spike in activity since August, the Feds are warning.

πŸ“– Read

via "Threatpost".
13:09
❌ Critical Industrial Flaws Pose Patching Headache For Manufacturers ❌

When it comes to patching critical flaws, industrial firms face various challenges - with some needing to shut down entire factories in order to apply updates.

πŸ“– Read

via "Threatpost".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How to combat cyber threats amid the shift to remote working πŸ”

Some 85% of CISOs surveyed by Netwrix revealed that they sacrificed cybersecurity to quickly set up employees to work remotely.

πŸ“– Read

via "Security on TechRepublic".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Making the Case for Medical Device Cybersecurity πŸ•΄

With an increasing number of Internet-connected medical devices in use to manage diabetes, protection against a variety of wireless network attacks could very well be a matter of life and death for patients.

πŸ“– Read

via "Dark Reading: ".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ My Journey Toward SAP Security πŸ•΄

When applications are critical to the business's core functions, the CISO and their staff better get the security right.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Microsoft's Azure Defender for IoT Uses CyberX Tech πŸ•΄

Azure Defender for IoT is built to help IT and OT teams discover IoT and OT assets, identify critical flaws, and detect malicious behavior.

πŸ“– Read

via "Dark Reading: ".
?
16:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” How cyberattacks are targeting video gamers and companies πŸ”

Game players are affected by phishing campaigns, while gaming companies are getting hit by DDoS attacks, says Akamai.

πŸ“– Read

via "Security on TechRepublic".
16:49
πŸ” Cybersecurity Perception Study shows increasing admiration for those in the profession πŸ”

The study by (ISC)Β² also finds a global shortage of 4.07 million.

πŸ“– Read

via "Security on TechRepublic".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Gamer Credentials Now a Booming, Juicy Target for Hackers ❌

Credential abuse drives illicit market for in-game rare skins, special weapons and unique tools.

πŸ“– Read

via "Threatpost".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ India's Cybercrime and APT Operations on the Rise πŸ•΄

Growing geopolitical tensions with China in particular are fueling an increase in cyberattacks between the two nations, according to IntSights.

πŸ“– Read

via "Dark Reading: ".
17:47
πŸ” Shopify Acknowledges Insider Breach of 200 Stores πŸ”

A breach at the popular e-commerce site was linked back to two "rogue" support team employees.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Cloud Debuts Threat-Detection Service πŸ•΄

Lockdown economics are driving a threat-intelligence business boom. Chronicle Detect is Google's answer to monitoring so much log data created by the distributed workforce.

πŸ“– Read

via "Dark Reading: ".
18:34
πŸ•΄ Shopify's Employee Data Theft Underscores Risk of Rogue Insiders πŸ•΄

The e-commerce platform has alerted more than 100 merchants of a data breach, highlighting the danger of malicious insiders.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zerologon Patches Roll Out Beyond Microsoft ❌

A Samba patch and a micropatch for end-of-life servers have debuted in the face of the critical vulnerability.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Gaming Industry Hit With 10B+ Attacks In Past Two Years πŸ•΄

Criminals scored big with credential stuffing and web app attacks, yet many gamers seem unfazed.

πŸ“– Read

via "Dark Reading: ".
24 September 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2015-4719

The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ iPhone 12 scam pretends to be Apple β€œchatbot” – don’t fall for it! ⚠

If you got someone else's "free offer" in what looked like a misdirected message, would you take a peek?

πŸ“– Read

via "Naked Security".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Synack: Federal agencies and banks have made the most cybersecurity improvements πŸ”

The overall Attacker Resistance Score for the IT sector dropped this year due in part to digital transformation work, according to the 2020 Trust Report.

πŸ“– Read

via "Security on TechRepublic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Since Remote Work Isn't Going Away, Security Should Be the Focus πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Alien Android Banking Trojan Sidesteps 2FA ❌

A new 'fork' of the Cerberus banking trojan, called Alien, targets victims' credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook.

πŸ“– Read

via "Threatpost".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Warns of Attackers Now Exploiting 'Zerologon' Flaw πŸ•΄

The Security Intelligence team at Microsoft is tracking newly waged exploits in the wild.

πŸ“– Read

via "Dark Reading: ".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CrowdStrike Agrees to Acquire Preemptive Security for $96M πŸ•΄

CrowdStrike plans to use Preemptive Security's conditional access technology to strengthen its Falcon platform.

πŸ“– Read

via "Dark Reading: ".
14:49
πŸ” How to install the Graylog system log manager on Ubuntu Server 20.04 πŸ”

Combing through logs on numerous servers can be a chore. Learn how to simplify that with the Graylog monitoring server.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CrowdStrike Agrees to Acquire Preempt Security for $96M πŸ•΄

CrowdStrike plans to use Preempt Security's conditional access technology to strengthen its Falcon platform.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Solving the Problem With Security Standards πŸ•΄



πŸ“– Read

via "Dark Reading: ".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Free Apple iPhone 12? Chatbot Scam Spreads Via Texts ❌

Convincing SMS messages tell victims that they've been selected for a pre-release trial for the soon-to-be-launched device.

πŸ“– Read

via "Threatpost".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” SEC Looks to Tamp Down Credential Stuffing πŸ”

The SEC's compliance arm is encouraging banks and financialΒ institutions to remain vigilant in the face of an uptick in credential stuffing attacks.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
16:53
πŸ›  Falco 0.26.0 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
16:53
πŸ›  Wireshark Analyzer 3.2.7 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Critical Instagram Flaw Could Let Attackers Spy on Victims πŸ•΄

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.

πŸ“– Read

via "Dark Reading: ".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Patch-Palooza Tackles 29 High-Severity Bugs ❌

Patches and workaround fixes address flaws on networking hardware running Cisco IOS XE software.

πŸ“– Read

via "Threatpost".
18:09
❌ Feds Hit with Successful Cyberattack, Data Stolen ❌

The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.

πŸ“– Read

via "Threatpost".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Bluetooth Security Weaknesses Pile Up, While Patching Remains Problematic πŸ•΄

Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard.

πŸ“– Read

via "Dark Reading: ".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Malware Attacks Declined But Became More Evasive in Q2 πŸ•΄

Most of the malware used in attacks last quarter were designed to evade signature-based detection tools, WatchGuard says.

πŸ“– Read

via "Dark Reading: ".
?
20:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2016-11086

lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
25 September 2020
?
02:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-10585

Pexip Infinity before 18 allows remote Denial of Service (XML parsing).

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2018-10432

Pexip Infinity before 18 allows Remote Denial of Service (TLS handshakes in RTMP).

πŸ“– Read

via "National Vulnerability Database".
02:55
ATENTIONβ€Ό New - CVE-2017-17477

Pexip Infinity before 17 allows an unauthenticated remote attacker to achieve stored XSS via management web interface views.

πŸ“– Read

via "National Vulnerability Database".
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2019-11556

Pagure before 5.6 allows XSS via the templates/blame.html blame view.

πŸ“– Read

via "National Vulnerability Database".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WannaCry Has IoT in Its Crosshairs πŸ•΄

The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware.

πŸ“– Read

via "Dark Reading: ".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ RASP 101: Staying Safe With Runtime Application Self-Protection πŸ•΄

The dream of RASP is to empower applications to protect themselves. How close do current implementations get to living the dream? Here's what to know.

πŸ“– Read

via "Dark Reading: ".
12:47
πŸ” Friday Five 9/25 πŸ”

Insider data breaches, COVID contact tracing apps, and FBI indictments - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Kills 18 Azure Accounts Tied to Nation-State Attacks ❌

An APT group has started heavily relying on cloud services like Azure Active Directory and OneDrive, as well as open-source tools, to obfuscate its attacks.

πŸ“– Read

via "Threatpost".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Blast from the past! Windows XP source code allegedly leaked online ⚠

Windows XP source code! Fair game to take a peek, or best to look away?

πŸ“– Read

via "Naked Security".
?
13:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
ATENTIONβ€Ό New - CVE-2018-6449

Host Header Injection vulnerability in the http management interface in Brocade Fabric OS versions before v9.0.0 could allow a remote attacker to exploit this vulnerability by injecting arbitrary HTTP headers

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2018-6448

A vulnerability in the management interface in Brocade Fabric OS Versions before Brocade Fabric OS v9.0.0 could allow a remote attacker to perform a denial of service attack on the vulnerable host.

πŸ“– Read

via "National Vulnerability Database".
13:55
ATENTIONβ€Ό New - CVE-2018-6447

A Reflective XSS Vulnerability in HTTP Management Interface in Brocade Fabric OS versions before Brocade Fabric OS v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g could allow authenticated attackers with access to the web interface to hijack a userÒ€ℒs session and take over the account.

πŸ“– Read

via "National Vulnerability Database".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Facebook removes a slew of accounts ahead of the US election πŸ”

These campaigns used tailored messages to target audiences around the globe. As part of the announcement, Facebook also details account followers and advertising spending pertaining to these efforts.

πŸ“– Read

via "Security on TechRepublic".
14:49
πŸ” SpyCloud and CyberDefenses join forces on election security effort πŸ”

A cybersecurity company providing services to one in five election jurisdictions across the United States has teamed up with another company to beef up digital protections.

πŸ“– Read

via "Security on TechRepublic".
?
15:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Getting Over the Security-to-Business Communication Gap in DevSecOps πŸ•΄

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff.

πŸ“– Read

via "Dark Reading: ".
15:34
πŸ•΄ Navigating the Asia-Pacific Threat Landscape: Experts Dive In πŸ•΄

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.

πŸ“– Read

via "Dark Reading: ".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ring’s Flying In-Home Camera Drone Escalates Privacy Worries ❌

Privacy fears are blasting off after Amazon's Ring division unveiled the new Always Home Cam, a smart home security camera drone.

πŸ“– Read

via "Threatpost".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Industrial Cyberattacks Get Rarer but More Complex ❌

The first half of 2020 saw decreases in attacks on most ICS sectors, but oil/gas firms and building automation saw upticks.

πŸ“– Read

via "Threatpost".
?
18:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Things to Know About the Microsoft 'Zerologon' Flaw πŸ•΄

Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.

πŸ“– Read

via "Dark Reading: ".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FortiGate VPN Default Config Allows MitM Attacks ❌

The client's default configuration for SSL-VPN has a certificate issue, researchers said.

πŸ“– Read

via "Threatpost".
26 September 2020
?
07:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bug Bounty FAQ: Top Questions, Expert Answers ❌

Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.

πŸ“– Read

via "Threatpost".
27 September 2020
?
19:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25827 β€Ό

An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.

πŸ“– Read

via "National Vulnerability Database".
19:48
β€Ό CVE-2020-25812 β€Ό

An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.

πŸ“– Read

via "National Vulnerability Database".
19:48
β€Ό CVE-2020-25814 β€Ό

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.

πŸ“– Read

via "National Vulnerability Database".
28 September 2020
?
05:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – β€œSMS scams: keep yourself and your family safe!” ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ MFA-Minded Attackers Continue to Figure Out Workarounds πŸ•΄

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.

πŸ“– Read

via "Dark Reading".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Safeguarding Schools Against RDP-Based Ransomware πŸ•΄

How getting online learning right today will protect schools, and the communities they serve, for years to come.

πŸ“– Read

via "Dark Reading".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Tips to Prepare for the Future of Cloud & Network Security πŸ•΄

Cloud and network security analysts outline trends and priorities businesses should keep top of mind as they grow more reliant on cloud.

πŸ“– Read

via "Dark Reading".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ REvil ransomware crew dangles $1,000,000 cybercrime carrot ⚠

When a company pays a multimillion dollar ransomware blackmail demand, where do you think the money goes?

πŸ“– Read

via "Naked Security".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Joker Trojans Flood the Android Ecosystem ❌

September saw dozens of Joker malware variants hitting Google Play and third-party app stores.

πŸ“– Read

via "Threat Post".
?
13:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 10_r2 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to install common security tools via Homebrew on a Mac 🦿

We'll guide you through the process of using Homebrew package manager to install common security tools on macOS computers to assess and aid in hardening devices on your network.

πŸ“– Read

via "Tech Republic".
14:37
❌ Universal Health Services Ransomware Attack Impacts Hospitals Nationwide ❌

The Ryuk ransomware is suspected to be the culprit.

πŸ“– Read

via "Threat Post".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ransomware Reportedly Behind Nationwide UHS Hospital Outage πŸ”

The full scope of the incident isn't yet known but as a result, many facilities have been left without access to computer systems.

πŸ“– Read

via "Digital Guardian".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mac, Linux Users Now Targeted by FinSpy Variants ❌

FinSpy has returned in new campaigns targeting dissident organizations in Egypt - and researchers uncovered new samples of the spyware targeting macOS and Linux users.

πŸ“– Read

via "Threat Post".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Windows 7 β€˜Upgrade’ Emails Steal Outlook Credentials ❌

Researchers warn of emails pretending to help business employees upgrade to Windows 10 - and then stealing their Outlook emails and passwords.

πŸ“– Read

via "Threat Post".
?
17:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How companies can meet the needs of the future workforce 🦿

The workforce is changing in the wake of a global pandemic. Learn some insights from industry executives about what companies and employees should be doing to evolve accordingly.

πŸ“– Read

via "Tech Republic".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ivanti Acquires Two Security Companies πŸ•΄

Purchase of MobilIron and Pulse Secure announced simultaneously.

πŸ“– Read

via "Dark Reading".
29 September 2020
?
02:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25770 β€Ό

An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25771.

πŸ“– Read

via "National Vulnerability Database".
02:50
β€Ό CVE-2020-24565 β€Ό

An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit these vulnerabilities. The subs affected in this vulnerability makes it unique compared to similar CVEs such as CVE-2020-24564 and CVE-2020-25770.

πŸ“– Read

via "National Vulnerability Database".
?
09:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Telehealth Poll: How Risky Are Remote Doctor Visits? ❌

Threatpost's latest poll probes telehealth security risks and asks for IT cures.

πŸ“– Read

via "Threat Post".
?
11:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Shared Irresponsibility Model in the Cloud Is Putting You at Risk πŸ•΄

Step up, put the architecture and organization in place, and take responsibility. If you don't, who will?

πŸ“– Read

via "Dark Reading".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ State-Sponsored Groups Increasingly Use Cloud & Open Source Infrastructure πŸ•΄

Microsoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing.

πŸ“– Read

via "Dark Reading".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Las Vegas Students’ Personal Data Leaked, Post-Ransomware Attack ❌

A researcher said he discovered an open data cache with names, grades, birthdates and more, after the Clark County School District refused to pay the ransom.

πŸ“– Read

via "Threat Post".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to handle security risks in a hybrid work environment 🦿

Half of the organizations surveyed by Tessian were hit by a security incident while employees were working remotely. Here are some tips for mitigation.

πŸ“– Read

via "Tech Republic".
?
13:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4607 β€Ό

IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.

πŸ“– Read

via "National Vulnerability Database".
?
14:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Network Perimeter: This Time, It’s Personal ❌

Botnets and IoT devices are forming a perfect storm for IT staff wrestling with WFH employee security.

πŸ“– Read

via "Threat Post".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Shifting Left of Left: Why Secure Code Isn't Always Quality Code πŸ•΄

Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points.

πŸ“– Read

via "Dark Reading".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zerologon Attacks Against Microsoft DCs Snowball in a Week ❌

The attempted compromises, which could allow full control over Active Directory identity services, are flying thick and fast just a week after active exploits of CVE-2020-1472 were first flagged.

πŸ“– Read

via "Threat Post".
15:51
β€Ό CVE-2020-15216 β€Ό

In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0

πŸ“– Read

via "National Vulnerability Database".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ahead of Election, FBI, CISA Issue Warning on Disinformation Campaigns πŸ”

The FBI and CISA have issued another warning about the 2020 election, asserting that foreign actors are spreading disinformation around hacked voter information.

πŸ“– Read

via "Digital Guardian".
16:09
πŸ•΄ Vulnerability in Wireless Router Chipsets Prompts Advisory πŸ•΄

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek.

πŸ“– Read

via "Dark Reading".
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 FBI says hackers want to stoke doubt about the 2020 election 🦿

In a PSA on Monday, the FBI and CISA warned about the potential for widespread disinformation campaigns in the run-up to November.

πŸ“– Read

via "Tech Republic".
17:40
πŸ•΄ Securing Slack: 5 Tips for Safer Messaging, Collaboration πŸ•΄

Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.

πŸ“– Read

via "Dark Reading".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Campaign by China-Linked Group Targets US Orgs for First Time πŸ•΄

In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec.

πŸ“– Read

via "Dark Reading".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DDoS Attacks Soar in First Half of 2020 πŸ•΄

Shorter, faster, multivector attacks had a greater impact on victims.

πŸ“– Read

via "Dark Reading".
?
20:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated πŸ•΄

Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats.

πŸ“– Read

via "Dark Reading".
?
20:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Why Web Browser Padlocks Shouldn’t Be Trusted ❌

Popular β€˜safe browsing’ padlocks are now passe as a majority of bad guys also use them.

πŸ“– Read

via "Threat Post".
30 September 2020
?
07:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5132 β€Ό

SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature misconfiguration leads to possible DNS flaw known as domain name collision vulnerability. When the users publicly display their organizationΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s internal domain names in the SSL-VPN authentication page, an attacker with knowledge of internal domain names can potentially take advantage of this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attacker Dwell Time: Ransomware's Most Important Metric πŸ•΄

How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network

πŸ“– Read

via "Dark Reading".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Exchange Servers Still Open to Actively Exploited Flaw ❌

Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable.

πŸ“– Read

via "Threat Post".
11:51
β€Ό CVE-2020-15731 β€Ό

An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.

πŸ“– Read

via "National Vulnerability Database".
11:52
β€Ό CVE-2019-17098 β€Ό

Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior versions on Android. August Connect Firmware version 2.2.12 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 The state of security and the evolving role of CISOs in a pandemic 🦿

Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020.

πŸ“– Read

via "Tech Republic".
?
13:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Small Business Grants Spark Identity-Theft Scam ❌

The cybercrooks spread the COVID-19 relief scam via Telegram and WhatsApp, and ultimately harvest account credentials and even pics of IDs.

πŸ“– Read

via "Threat Post".
13:52
β€Ό CVE-2020-4629 β€Ό

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.

πŸ“– Read

via "National Vulnerability Database".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Account takeover fraud rates skyrocketed 282% over last year 🦿

ATO is the weapon of choice for fraudsters leading up to the holiday shopping season, new data from Sift shows, and consumers place account security burden on businesses.

πŸ“– Read

via "Tech Republic".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19 Creates Opening for OT Security Reform πŸ•΄

Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.

πŸ“– Read

via "Dark Reading".
15:11
πŸ•΄ Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures πŸ•΄

Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands.

πŸ“– Read

via "Dark Reading".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-12506 β€Ό

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version FW03 and prior versions. WAGO 750-823 version FW03 and prior versions. WAGO 750-832/xxx-xxx version FW03 and prior versions. WAGO 750-862 version FW03 and prior versions. WAGO 750-891 version FW03 and prior versions. WAGO 750-890/xxx-xxx version FW03 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
15:52
β€Ό CVE-2020-12505 β€Ό

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 version FW07 and prior versions. WAGO 750-831/xxx-xxx version FW07 and prior versions. WAGO 750-882 version FW07 and prior versions. WAGO 750-885/xxx-xxx version FW07 and prior versions. WAGO 750-889 version FW07 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Insider Stole Yacht IP via USB, Company Alleges πŸ”

The latest industrial espionage case involves theft at a yacht manufacturer by a now ex-employee.

πŸ“– Read

via "Digital Guardian".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Android Spyware Variant Snoops on WhatsApp, Telegram Messages ❌

The Android malware comes from threat group APT-C-23, also known as Two-Tailed Scorpion and Desert Scorpion.

πŸ“– Read

via "Threat Post".
?
17:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Guide to the NIST Cybersecurity Framework πŸ•΄

With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help.

πŸ“– Read

via "Dark Reading".
17:52
β€Ό CVE-2019-20921 β€Ό

bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-21523 β€Ό

A Server-Side Freemarker template injection vulnerability in halo CMS v1.1.3 In the Edit Theme File function. The ftl file can be edited. This is the Freemarker template file. This file can cause arbitrary code execution when it is rendered in the background. exp: <#assign test="freemarker.template.utility.Execute"?new()> ${test("touch /tmp/freemarkerPwned")}

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-21527 β€Ό

There is an Arbitrary file deletion vulnerability in halo v1.1.3. A backup function in the background allows a user, when deleting their backup files, to delete any files on the system through directory traversal.

πŸ“– Read

via "National Vulnerability Database".
17:58
β€Ό CVE-2020-21244 β€Ό

An issue was discovered in FrontAccounting 2.4.7. There is a Directory Traversal vulnerability that can empty folder via admin/inst_lang.php.

πŸ“– Read

via "National Vulnerability Database".
17:58
β€Ό CVE-2020-25763 β€Ό

Seat Reservation System version 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading PHP files.

πŸ“– Read

via "National Vulnerability Database".
17:58
β€Ό CVE-2020-26157 β€Ό

Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled during syncing. This leads to remote code execution because of Node integration.

πŸ“– Read

via "National Vulnerability Database".
18:11
πŸ•΄ What Legal Language Should I Look Out for When Selecting Cyber Insurance? πŸ•΄

At times, vague coverage can actually work for you.

πŸ“– Read

via "Dark Reading".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ OAuth Consent Phishing Ramps Up with Microsoft Office 365 Attacks ❌

Attackers gain read-only permissions to snoop around Office 365 accounts, including emails, contacts and more.

πŸ“– Read

via "Threat Post".
18:42
πŸ•΄ Cloud Misconfiguration Mishaps Businesses Must Watch πŸ•΄

Cloud security experts explain which misconfigurations are most common and highlight other areas of the cloud likely to threaten businesses.

πŸ“– Read

via "Dark Reading".
?
19:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GitHub Tool Spots Security Vulnerabilities in Code πŸ•΄

Scanner, which just became generally available, lets developers spot problems before code gets into production.

πŸ“– Read

via "Dark Reading".
?
19:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25781 β€Ό

An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.

πŸ“– Read

via "National Vulnerability Database".
19:52
β€Ό CVE-2020-25816 β€Ό

HashiCorp Vault and Vault Enterprise 1.0 before 1.5.4 have Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
19:52
β€Ό CVE-2020-13336 β€Ό

An issue has been discovered in GitLab affecting versions from 11.8 before 12.10.13. GitLab was vulnerable to a stored XSS by in the error tracking feature.

πŸ“– Read

via "National Vulnerability Database".
?
20:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The No Good, Very Bad Week for Iran's Nation-State Hacking Ops πŸ•΄

A look at the state of Iran's cyber operations as the US puts the squeeze on it with a pile of indictments and sanctions.

πŸ“– Read

via "Dark Reading".
1 October 2020
?
02:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-20902 β€Ό

Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.

πŸ“– Read

via "National Vulnerability Database".
02:52
β€Ό CVE-2019-20903 β€Ό

The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.

πŸ“– Read

via "National Vulnerability Database".
?
08:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ InterPlanetary Storm Botnet Infects 13K Mac, Android Devices ❌

In addition to Windows and Linux machines, a new variant of the malware now targets Mac and Android devices.

πŸ“– Read

via "Threat Post".
08:12
⚠ #BeCyberSmart – why friends don’t let friends get scammed ⚠

Friends don't let friends get scammed. Because cybercrime hurts us all.

πŸ“– Read

via "Naked Security".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
?
11:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cryptojacking: The Unseen Threat πŸ•΄

Mining malware ebbs and flows with the price of cryptocurrencies, and given the momentum on price is upward, cryptojacking is a very present threat.

πŸ“– Read

via "Dark Reading".
?
11:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cisco Talos researchers explain psychology behind election disinformation posts on social media 🦿

With the 2020 presidential election looming, here are questions to consider before posting on social media.

πŸ“– Read

via "Tech Republic".
?
11:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-8109 β€Ό

A vulnerability has been discovered in the ace.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. This can result in denial-of-service. This issue affects: Bitdefender Engines version 7.84892 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  WhatWeb Scanner 0.5.3 πŸ› 

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

πŸ“– Read

via "Packet Storm Security".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spammers Smuggle LokiBot Via URL Obfuscation Tactic ❌

Researchers say that the campaign sidesteps end user detection and security solutions.

πŸ“– Read

via "Threat Post".
13:43
πŸ•΄ Russian National Sentenced to 7+ Years for Hacking US Tech Firms πŸ•΄

Yevgeniy Nikulin received an 88-month sentence for breaking into LinkedIn, Dropbox, and the now-defunct social platform Formspring.

πŸ“– Read

via "Dark Reading".
13:53
β€Ό CVE-2020-24860 β€Ό

CMS Made Simple 2.2.14 allows an authenticated user with access to the Content Manager to edit content and put persistent XSS payload in the affected text fields. The user can get cookies from every authenticated user who visits the website.

πŸ“– Read

via "National Vulnerability Database".
?
14:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is Data Loss Prevention (DLP)? A Definition of Data Loss Prevention πŸ”

Learn more about data loss prevention software in Data Protection 101, our series covering the fundamentals of data security.

πŸ“– Read

via "Digital Guardian".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk ❌

Federal prosecutors charged two men with crimes that carry up to 20 years in prison.

πŸ“– Read

via "Threat Post".
?
15:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness πŸ•΄

To protect your organization from all emerging file-borne threats, the security and leadership teams must align to develop a streamlined approach to file security.

πŸ“– Read

via "Dark Reading".
?
15:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs ❌

Cybercriminals set up three different CAPTCHAs that Office 365 targets must click through before the final phishing page.

πŸ“– Read

via "Threat Post".
15:53
β€Ό CVE-2020-16844 β€Ό

In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.

πŸ“– Read

via "National Vulnerability Database".
16:06
🦿 How to add clients to the Graylog system log manager 🦿

Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
16:13
πŸ•΄ Imperva Agrees to Buy jSonar πŸ•΄

The deal is expected to close in mid-October.

πŸ“– Read

via "Dark Reading".
?
16:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros πŸ•΄

From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.

πŸ“– Read

via "Dark Reading".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers πŸ•΄

An alarming new advisory issued today by the federal government could upend ransomware response.

πŸ“– Read

via "Dark Reading".
17:53
β€Ό CVE-2020-15673 β€Ό

Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

πŸ“– Read

via "National Vulnerability Database".
17:53
β€Ό CVE-2020-15533 β€Ό

In Zoho ManageEngine Application Manager 14.7 Build 14730 (before 14684, and between 14689 and 14750), the AlarmEscalation module is vulnerable to unauthenticated SQL Injection attack.

πŸ“– Read

via "National Vulnerability Database".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ QR Codes: A Sneaky Security Threat ❌

What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.

πŸ“– Read

via "Threat Post".
18:13
πŸ•΄ New HP Bug Bounty Program Targets Vulns in Printer Cartridges πŸ•΄

White-hat hackers will receive $10,000 for each security bug they discover plus a base fee, under this invitation-only initiative.

πŸ“– Read

via "Dark Reading".
?
18:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Singapore Asks Big Cybersecurity Questions to Improve National Defense πŸ•΄

An executive from Singapore's Cyber Security Agency examines the role of security in a nation increasingly dependent on technology.

πŸ“– Read

via "Dark Reading".
?
19:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybersecurity best practices: An open letter to end users 🦿

In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure.

πŸ“– Read

via "Tech Republic".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5787 β€Ό

Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated attacker to delete arbitrary files on disk via the admin/services/packages/remove action.

πŸ“– Read

via "National Vulnerability Database".
19:53
β€Ό CVE-2020-5786 β€Ό

Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.

πŸ“– Read

via "National Vulnerability Database".
19:53
β€Ό CVE-2020-9486 β€Ό

In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.

πŸ“– Read

via "National Vulnerability Database".
2 October 2020
?
07:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26524 β€Ό

CodeLathe FileCloud before 20.2.0.11915 allows username enumeration.

πŸ“– Read

via "National Vulnerability Database".
07:53
β€Ό CVE-2020-26538 β€Ό

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. It allows attackers to execute arbitrary code via a Trojan horse taskkill.exe in the current working directory.

πŸ“– Read

via "National Vulnerability Database".
?
09:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security: Phishing without links – when phishers bring along their own web pages ⚠

How do you "check the URL before you click" if the web page you're visiting is already on your own computer?

πŸ“– Read

via "Naked Security".
09:53
β€Ό CVE-2020-7737 β€Ό

All versions of package safetydance are vulnerable to Prototype Pollution via the set function.

πŸ“– Read

via "National Vulnerability Database".
09:53
β€Ό CVE-2020-7736 β€Ό

The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.

πŸ“– Read

via "National Vulnerability Database".
09:53
β€Ό CVE-2020-8110 β€Ό

A vulnerability has been discovered in the ceva_emu.cvd module that results from a lack of proper validation of user-supplied data, which can result in a pointer that is fetched from uninitialized memory. This can lead to denial-of-service. This issue affects: Bitdefender Engines version 7.84897 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 10/2 πŸ”

A legal right to work from home, insensitive phishing, and election disinformation - catch up on the week's news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer ❌

Larry Cashdollar, senior security response engineer at Akamai, talks about the craziest stories he's faced, reporting CVEs since 1994.

πŸ“– Read

via "Threat Post".
11:16
πŸ•΄ Truncated URLs Look to Make Big Dent in Phishing πŸ•΄

The approach is a long time in coming and will test the premise that users can more easily detect a suspicious domain from the name alone.

πŸ“– Read

via "Dark Reading".
?
11:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Report: Despite more cyberthreats during COVID-19, most businesses confident about cybersecurity 🦿

Remote working and phishing attacks spiked during the coronavirus pandemic, but organizations believe they're on track with their cybersecurity plans, according to a new report from CompTIA.

πŸ“– Read

via "Tech Republic".
11:46
πŸ•΄ 3 Months for the Cybercrime Books πŸ•΄

From July through September, US law enforcement handed down major indictments or sanctions against foreign threat groups at least six times.

πŸ“– Read

via "Dark Reading".
11:54
β€Ό CVE-2020-25623 β€Ό

Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.

πŸ“– Read

via "National Vulnerability Database".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Years-Long β€˜SilentFade’ Attack Drained Facebook Victims of $4M ❌

Facebook detailed an ad-fraud cyberattack that's been ongoing since 2016, stealing Facebook credentials and browser cookies.

πŸ“– Read

via "Threat Post".
?
13:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7069 β€Ό

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.

πŸ“– Read

via "National Vulnerability Database".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ LatAm Banking Trojans Collaborate in Never-Before-Seen Effort ❌

Eleven different malware families are coordinating on distribution, features, geo-targeting and more.

πŸ“– Read

via "Threat Post".
14:16
πŸ•΄ Name That Toon: Castle in the Sky πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Emotet Spoofs DNC In New Attack Campaign πŸ•΄

Thousands of Emotet emails contain a message body pulled directly from the Democratic National Committee website, researchers report.

πŸ“– Read

via "Dark Reading".
?
15:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Researchers Mixed on Sanctions for Ransomware Negotiators ❌

Financial institutions, cyber-insurance firms, and security firms have all been put on notice by the U.S. Department of the Treasury.

πŸ“– Read

via "Threat Post".
?
15:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Vulnerable supply chains introduce increasingly interconnected attack surfaces 🦿

Accenture Security lists five other "extreme but plausible threat scenarios in financial services" in a new report.

πŸ“– Read

via "Tech Republic".
15:54
β€Ό CVE-2020-5422 β€Ό

BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).

πŸ“– Read

via "National Vulnerability Database".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Bing.com Hostname / IP Enumerator 1.0.4 πŸ› 

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

πŸ“– Read

via "Packet Storm Security".
17:12
❌ Account Takeover Fraud Losses Total Billions Across Online Retailers ❌

Account takeover fraud (ATO) attacks are on the rise, up nearly 300 percent since last year.

πŸ“– Read

via "Threat Post".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Voter Registration β€˜Error’ Phish Hits During U.S. Election Frenzy ❌

Phishing emails tell recipients that their voter's registration applications are incomplete - but instead steal their social security numbers, license data and more.

πŸ“– Read

via "Threat Post".
17:54
β€Ό CVE-2020-24568 β€Ό

An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the lancompenent component, allowing logged-in attackers to discover arbitrary information.

πŸ“– Read

via "National Vulnerability Database".
17:54
β€Ό CVE-2020-24627 β€Ό

A remote stored xss vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3.

πŸ“– Read

via "National Vulnerability Database".
17:54
β€Ό CVE-2020-5979 β€Ό

NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
?
18:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Biometric Data Collection Demands Scrutiny of Privacy Law πŸ•΄

An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.

πŸ“– Read

via "Dark Reading".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Egregor Ransomware Threatens β€˜Mass-Media’ Release of Corporate Data ❌

The newly discovered ransomware is hitting companies worldwide, including the GEFCO global logistics company.

πŸ“– Read

via "Threat Post".
18:46
πŸ•΄ Researchers Adapt AI With Aim to Identify Anonymous Authors πŸ•΄

At Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.

πŸ“– Read

via "Dark Reading".
?
19:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5984 β€Ό

NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.

πŸ“– Read

via "National Vulnerability Database".
19:54
β€Ό CVE-2020-15231 β€Ό

In mapfish-print before version 3.24, a user can use the JSONP support to do a Cross-site scripting.

πŸ“– Read

via "National Vulnerability Database".
19:54
β€Ό CVE-2020-26526 β€Ό

An issue was discovered in Damstra Smart Asset 2020.7. It is possible to enumerate valid usernames on the login page. The application sends a different server response when the username is invalid than when the username is valid ("Unable to find an APIDomain" versus "Wrong email or password").

πŸ“– Read

via "National Vulnerability Database".
?
21:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25776 β€Ό

Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
4 October 2020
?
07:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2017-18924 β€Ό

** DISPUTED ** oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'

πŸ“– Read

via "National Vulnerability Database".
5 October 2020
?
02:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ test chunk server πŸ•΄

Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.

πŸ“– Read

via "Dark Reading".
?
05:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Serious Security: Phishing without links – when phishers bring along their own web pages ⚠

How do you "check the URL before you click" if the web page you're visiting is already on your own computer?

πŸ“– Read

via "Naked Security".
?
07:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7709 β€Ό

This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.

πŸ“– Read

via "National Vulnerability Database".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Nmap Port Scanner 7.90 πŸ› 

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

πŸ“– Read

via "Packet Storm Security".
11:21
πŸ›  GRR 3.4.2.3 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Read

via "Packet Storm Security".
11:24
πŸ•΄ 3 Ways Data Breaches Accelerate the Fraud Supply Chain πŸ•΄

The battle's just beginning as bad actors glean more personal information from victims and use that data to launch larger attacks.

πŸ“– Read

via "Dark Reading".
11:27
β€Ό CVE-2020-25636 β€Ό

A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2020-26166 β€Ό

The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task.

πŸ“– Read

via "National Vulnerability Database".
?
11:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Video-Game Piracy Group β€˜Team Xecuter’ Leaders in Custody ❌

The two alleged leaders of Team Xecuter targeted popular consoles like the Nintendo Switch, the Sony PlayStation Classic and Microsoft Xbox.

πŸ“– Read

via "Threat Post".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Tenda Router Zero-Days Emerge in Spyware Botnet Campaign ❌

A variant of the Mirai botnet, called Ttint, has added espionage capabilities to complement its denial-of-service functions.

πŸ“– Read

via "Threat Post".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25635 β€Ό

A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
13:27
β€Ό CVE-2020-8228 β€Ό

A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.

πŸ“– Read

via "National Vulnerability Database".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – Stay on top of phishing scams ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Rare Bootkit Malware Targets North Korea-Linked Diplomats ❌

The MosaicRegressor espionage framework is newly discovered and appears to be the work of Chinese-speaking actors.

πŸ“– Read

via "Threat Post".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Telework Tips to Help Organizations Grappling with WFH Life πŸ”

The Cybersecurity & Infrastructure Security Agency has released a collection of tips and best practices to help companies and employees better secure the new extended network perimeter.

πŸ“– Read

via "Digital Guardian".
15:20
❌ Malware Families Turn to Legit Pastebin-Like Service ❌

AgentTesla, LimeRAT, W3Cryptolocker and Redline Stealer are now using Paste.nrecom in spear-phishing attacks.

πŸ“– Read

via "Threat Post".
15:23
πŸ•΄ 'Virtual Cyber Carnival' Kicks off Cybersecurity Awareness Month πŸ•΄

A new initiative will run throughout the month of October, invites the general public to play cybersecurity games (and win fabulous prizes).

πŸ“– Read

via "Dark Reading".
15:27
β€Ό CVE-2020-24231 β€Ό

Symmetric DS <3.12.0 uses mx4j to provide access to JMX over HTTP. mx4j, by default, has no auth and is available on all interfaces. An attacker can interact with JMX: get system info, and invoke MBean methods. It is possible to install additional MBeans from a remote host using MLet that leads to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
15:27
β€Ό CVE-2020-15235 β€Ό

In RACTF before commit f3dc89b, unauthenticated users are able to get the value of sensitive config keys that would normally be hidden to everyone except admins. All versions after commit f3dc89b9f6ab1544a289b3efc06699b13d63e0bd(3/10/20) are patched.

πŸ“– Read

via "National Vulnerability Database".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Top 5 things to know about Confidential Computing 🦿

The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.

πŸ“– Read

via "Tech Republic".
16:50
❌ Black-T Malware Emerges From Cryptojacker Group TeamTNT ❌

Researchers have discovered the latest cryptojacking malware gambit from TeamTNT, called Black-T. The variant builds on the group’s typical approach, with a few new β€” and sophisticated β€” extras. TeamTNT is known for its targeting of Amazon Web Services (AWS) credentials, to break into the cloud and use it to mine for the Monero cryptocurrency. […]

πŸ“– Read

via "Threat Post".
?
17:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-16226 β€Ό

Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
17:27
β€Ό CVE-2020-15237 β€Ό

In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.

πŸ“– Read

via "National Vulnerability Database".
?
18:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Post Grid WordPress Plugin Flaws Allow Site Takeovers ❌

Team Showcase, a sister plugin, is also vulnerable to the XSS and PHP object-injection bugs -- together they have 66,000 installs.

πŸ“– Read

via "Threat Post".
18:23
πŸ•΄ Android Camera Bug Under the Microscope πŸ•΄

Critical Android vulnerability CVE-2019-2234 could enable attackers to take control of a victim's camera and take photos, record videos, and learn location.

πŸ“– Read

via "Dark Reading".
?
18:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Meet 'Egregor,' a New Ransomware Family to Watch πŸ•΄

Egregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment.

πŸ“– Read

via "Dark Reading".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ John McAfee Indicted on Tax Charges πŸ•΄

The indictment alleging tax evasion and failure to file returns was unsealed after his arrest in Spain.

πŸ“– Read

via "Dark Reading".
6 October 2020
?
02:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26572 β€Ό

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

πŸ“– Read

via "National Vulnerability Database".
02:27
β€Ό CVE-2020-26571 β€Ό

The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.

πŸ“– Read

via "National Vulnerability Database".
?
07:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5632 β€Ό

InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.

πŸ“– Read

via "National Vulnerability Database".
?
10:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Recon Informer 1.2 πŸ› 

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

πŸ“– Read

via "Packet Storm Security".
?
11:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Gone phishing: workplace email security in five steps ⚠

David Mitchell, Senior Director of Email Product Management at Sophos, shares his top tips to optimize workplace email security.

πŸ“– Read

via "Naked Security".
11:20
❌ Unpatched Apple T2 Chip Flaw Plagues Macs ❌

A researcher claims that the issue can be exploited by attackers in order to gain root access.

πŸ“– Read

via "Threat Post".
11:24
πŸ•΄ 6 Best Practices for Using Open Source Software Safely πŸ•΄

Open source software is critical yet potentially dangerous. Here are ways to minimize the risk.

πŸ“– Read

via "Dark Reading".
11:27
β€Ό CVE-2020-25613 β€Ό

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2020-23832 β€Ό

A Persistent Cross-Site Scripting (XSS) vulnerability in message_admin.php in Projectworlds Car Rental Management System v1.0 allows unauthenticated remote attackers to harvest an admin login session cookie and steal an admin session upon an admin login.

πŸ“– Read

via "National Vulnerability Database".
?
12:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to defend your organization against the surge in ransomware attacks 🦿

Ransomware attacks doubled in the US over the last three months, says Check Point Research.

πŸ“– Read

via "Tech Republic".
12:20
❌ APT Attack Injects Malware into Windows Error Reporting ❌

The fileless attack uses a phishing campaign that lures victims with information about a worker’s compensation claim.

πŸ“– Read

via "Threat Post".
12:21
❌ COVID-19 Clinical Trials Slowed After Ransomware Attack ❌

The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the incident.

πŸ“– Read

via "Threat Post".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is ITAR Compliance? 2020 ITAR Regulations, Fines, Certifications & More πŸ”

Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Digital Guardian".
12:54
πŸ•΄ Malware for Ad Fraud Gets More Sophisticated πŸ•΄

Facebook says SilentFade campaign disabled notifications that could have warned users that their accounts had been compromised.

πŸ“– Read

via "Dark Reading".
?
13:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Podcast – we’re back for Series 3! ⚠

Join us weekly for the Naked Security Podcast - back for Series 3 and available wherever good podcasts are found!

πŸ“– Read

via "Naked Security".
13:20
❌ Microsoft Zerologon Flaw Under Attack By Iranian Nation-State Actors ❌

Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks.

πŸ“– Read

via "Threat Post".
13:27
β€Ό CVE-2020-25742 β€Ό

pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.

πŸ“– Read

via "National Vulnerability Database".
13:28
β€Ό CVE-2020-25803 β€Ό

Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.

πŸ“– Read

via "National Vulnerability Database".
13:39
🦿 Wi-Fi security: FBI warns of risks of using wireless hotel networks 🦿

Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.

πŸ“– Read

via "Tech Republic".
?
14:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Lynis Auditing Tool 3.0.1 πŸ› 

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

πŸ“– Read

via "Packet Storm Security".
?
14:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Boom! Mobile Customer Data Lost to Fullz House/Magecart Attack ❌

The Magecart spinoff group targeted the wireless service provider in an odd choice of victim.

πŸ“– Read

via "Threat Post".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to boost the effectiveness of your cybersecurity operations 🦿

Data breaches occur despite tight security. Arctic Wolf explains how to increase your security effectiveness.

πŸ“– Read

via "Tech Republic".
15:24
πŸ•΄ 10 Years Since Stuxnet: Is Your Operational Technology Safe? πŸ•΄

The destructive worm may have debuted a decade ago, but Stuxnet is still making its presence known. Here are steps you can take to stay safer from similar attacks.

πŸ“– Read

via "Dark Reading".
15:28
β€Ό CVE-2020-26582 β€Ό

D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).

πŸ“– Read

via "National Vulnerability Database".
15:28
β€Ό CVE-2019-4725 β€Ό

IBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131.

πŸ“– Read

via "National Vulnerability Database".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Brings Password Protection to iOS, Android in Chrome 86 πŸ•΄

Chrome 86 will alert users when stored passwords are compromised, and block or warn of insecure downloads, among other security updates.

πŸ“– Read

via "Dark Reading".
?
16:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Male Chastity Device Comes with Massive Security Flaws ❌

Smart sex toy vulnerable to hacks, researchers say -- which could expose users’ most sensitive bits (of data) to cybercriminals.

πŸ“– Read

via "Threat Post".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26598 β€Ό

An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, and 9.0 software. The Network Management component could allow an unauthorized actor to kill a TCP connection. The LG ID is LVE-SMP-200023 (October 2020).

πŸ“– Read

via "National Vulnerability Database".
17:28
β€Ό CVE-2020-15239 β€Ό

In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0.

πŸ“– Read

via "National Vulnerability Database".
?
18:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Research Finds Bugs in Every Anti-Malware Product Tested πŸ•΄

Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.

πŸ“– Read

via "Dark Reading".
?
19:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zerologon Vulnerability Used in APT Attacks πŸ•΄

MERCURY, the Iranian advanced persistent threat group, is using Zerologon in a new series of attacks detected by Microsoft.

πŸ“– Read

via "Dark Reading".