6 October 2020
?
21:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-14183 β€Ό

Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1.

πŸ“– Read

via "National Vulnerability Database".
?
21:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Verizon Payment Security Report is a Wake-up Call: Time to Refocus on PCI DSS Compliance πŸ•΄

Too many organizations fail to enact the baseline payment security controls, according to the Verizon 2020 Payment Security Report, and the recent Blackbaud ransomware incident is merely the latest evidence.

πŸ“– Read

via "Dark Reading".
7 October 2020
?
07:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7742 β€Ό

This affects the package simpl-schema before 1.10.2.

πŸ“– Read

via "National Vulnerability Database".
?
10:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Comcast TV Remote Hack Opens Homes to Snooping ❌

Researchers disclosed the 'WarezTheRemote' attack, affecting Comcast's XR11 voice remote control.

πŸ“– Read

via "Threat Post".
10:21
❌ IRS COVID-19 Relief Payment Deadlines Anchor Convincing Phish ❌

The upcoming deadlines for applying for coronavirus relief are the lure for a phish that gets around email security gateways by using a legitimate SharePoint page for data-harvesting.

πŸ“– Read

via "Threat Post".
?
10:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Okta opens the door to third-party developers with new Okta Devices SDK and API 🦿

The new platform will allow developers to leverage Okta's SSO technology to build branded biometric authentication for iOS and Android apps.

πŸ“– Read

via "Tech Republic".
10:40
🦿 Security firm: WarezTheRemote flaw could turn a Comcast remote into a listening device 🦿

Could your cable TV device spy on you? Vulnerability found and patched in Comcast TV remote.

πŸ“– Read

via "Tech Republic".
10:51
❌ PoetRAT Resurfaces in Attacks in Azerbaijan Amid Escalating Conflict ❌

Spear-phishing attacks targeting VIPs and others show key malware changes and are likely linked to the current conflict with Armenia.

πŸ“– Read

via "Threat Post".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What the Sci-Fi Hit Altered Carbon Teaches Us About Virtualization Security πŸ•΄

The Netflix show may be fantastical, but it has real-world lessons about virtualization.

πŸ“– Read

via "Dark Reading".
11:28
β€Ό CVE-2020-25985 β€Ό

MonoCMS Blog 1.0 is affected by: Arbitrary File Deletion. Any authenticated user can delete files on and off the webserver (php files can be unlinked and not deleted).

πŸ“– Read

via "National Vulnerability Database".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Phishing attack spoofs IRS COVID-19 relief to steal personal data 🦿

The phishing page tries to obtain email credentials, Social Security numbers, driver's license numbers, and tax numbers, says Armorblox.

πŸ“– Read

via "Tech Republic".
?
12:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google’s Chrome 86: Critical Payments Bug, Password Checker Among Security Notables ❌

Google is rolling out 35 security fixes, and a new password feature, in Chrome 86 versions for Windows, Mac, Android and iOS users.

πŸ“– Read

via "Threat Post".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-13332 β€Ό

Improper access expiration date validation in GitLab version >=8.11.0-rc6+ allows user to have access to projects with expiration.

πŸ“– Read

via "National Vulnerability Database".
13:28
β€Ό CVE-2020-13346 β€Ό

Membership changes are not reflected in ToDo subscriptions in GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, allowing guest users to access confidential issues through API.

πŸ“– Read

via "National Vulnerability Database".
13:28
β€Ό CVE-2020-14355 β€Ό

Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.

πŸ“– Read

via "National Vulnerability Database".
?
13:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Packet Fence 10.2.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Read

via "Packet Storm Security".
?
14:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FINRA Warns Financial Services Firms of New Phishing Campaign πŸ”

FINRA, a self-regulatory organization that oversees brokers and broker-dealers, is warning about a new phishing attack that looks like its coming from the organization.

πŸ“– Read

via "Digital Guardian".
?
14:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ BAHAMUT Spies-for-Hire Linked to Extensive Nation-State Activity ❌

Researchers uncovered a sophisticated, incredibly well-resourced APT that has its fingers in wide-ranging espionage and disinformation campaigns.

πŸ“– Read

via "Threat Post".
?
15:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The New War Room: Cybersecurity in the Modern Era πŸ•΄

The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.

πŸ“– Read

via "Dark Reading".
15:29
β€Ό CVE-2019-16160 β€Ό

An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.

πŸ“– Read

via "National Vulnerability Database".
15:29
β€Ό CVE-2020-26870 β€Ό

Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.

πŸ“– Read

via "National Vulnerability Database".
?
15:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Rolls Out Fixes for High-Severity Android System Flaws ❌

The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-0215 and CVE-2020-0416).

πŸ“– Read

via "Threat Post".
15:55
πŸ•΄ CISA Warns of Renewed Emotet Activity πŸ•΄

The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.

πŸ“– Read

via "Dark Reading".
?
16:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Feds Sound Alarm Over Emotet Attacks on State, Local Govs ❌

CISA warned already-strained public-sector entities about disturbing spikes in Emotet phishing attacks aimed at municipalities.

πŸ“– Read

via "Threat Post".
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 3 ways criminals use artificial intelligence in cybersecurity attacks 🦿

Bad actors use machine learning to break passwords more quickly and build malware that knows how to hide, experts warn.

πŸ“– Read

via "Tech Republic".
?
17:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 5 strategies for CISOs during a time of rapid business transformation 🦿

A survey of business leaders by PwC finds the pandemic is causing rapid changes in the roles CISOs play, and offers five tips for ensuring that security remains stable as we enter a new normal.

πŸ“– Read

via "Tech Republic".
17:25
πŸ•΄ Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats πŸ•΄

Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

πŸ“– Read

via "Dark Reading".
17:29
β€Ό CVE-2020-26880 β€Ό

Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2020-15176 β€Ό

In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2020-15217 β€Ό

In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2020-15175 β€Ό

In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in Ò€œ/files/Ҁ�. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.

πŸ“– Read

via "National Vulnerability Database".
?
17:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Ways Companies are Working on Security by Design πŸ•΄

Execs from top financial organizations and other companies share insights on building a security culture.

πŸ“– Read

via "Dark Reading".
17:55
πŸ•΄ Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs πŸ•΄

Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.

πŸ“– Read

via "Dark Reading".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybersecurity Awareness Month: How to protect your kids from identity theft 🦿

Freezing your child's credit is one way to stop cybercriminals from destroying their credit. But you have to be careful to keep the key to thaw it later.

πŸ“– Read

via "Tech Republic".
18:25
πŸ•΄ Open Source Threat Intelligence Searches for Sustainable Communities πŸ•΄

As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...

πŸ“– Read

via "Dark Reading".
?
18:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New 'HEH' Botnet Targets Exposed Telnet Services πŸ•΄

Latest threat is one in a growing list of malware developed in the Go programming language.

πŸ“– Read

via "Dark Reading".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Bahamut' Threat Group Targets Government & Industry in Middle East πŸ•΄

Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.

πŸ“– Read

via "Dark Reading".
19:29
β€Ό CVE-2020-25867 β€Ό

SoPlanning before 1.47 doesn't correctly check the security key used to publicly share plannings. It allows a bypass to get access without authentication.

πŸ“– Read

via "National Vulnerability Database".
19:29
β€Ό CVE-2020-25768 β€Ό

Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.

πŸ“– Read

via "National Vulnerability Database".
?
21:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15501 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Smarter Coffee Maker before 2nd generation allows firmware replacement without authentication or authorization. User interaction is required to press a button. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
21:29
β€Ό CVE-2015-7379 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
8 October 2020
?
07:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MontysThree APT Takes Unusual Aim at Industrial Targets ❌

The newly discovered APT specializes in espionage campaigns against industrial holdings -- a rare target for spyware.

πŸ“– Read

via "Threat Post".
07:30
β€Ό CVE-2020-3602 β€Ό

A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command.

πŸ“– Read

via "National Vulnerability Database".
07:30
β€Ό CVE-2020-3567 β€Ό

A vulnerability in the management REST API of Cisco Industrial Network Director (IND) could allow an authenticated, remote attacker to cause the CPU utilization to increase to 100 percent, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of requests sent to the REST API. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to cause a permanent DoS condition that is due to high CPU utilization. Manual intervention may be required to recover the Cisco IND.

πŸ“– Read

via "National Vulnerability Database".
07:30
β€Ό CVE-2020-3536 β€Ό

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.

πŸ“– Read

via "National Vulnerability Database".
?
10:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks ❌

A spike in phishing and malicious websites aimed at defrauding Amazon.com customers aim to make Prime Day a field day for hackers.

πŸ“– Read

via "Threat Post".
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Key Considerations & Best Practices for Establishing a Secure Remote Workforce πŸ•΄

Cybersecurity is challenging but not paralyzing, and now is the moment to educate our employees to overcome these challenges.

πŸ“– Read

via "Dark Reading".
11:30
β€Ό CVE-2020-25262 β€Ό

PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/pages/delete/ URI: pages will be deleted.

πŸ“– Read

via "National Vulnerability Database".
11:30
β€Ό CVE-2020-2289 β€Ό

Jenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
11:30
β€Ό CVE-2020-2296 β€Ό

A cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.

πŸ“– Read

via "National Vulnerability Database".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Buyers beware: Hackers poised to make Amazon Prime Day into a prime phishing day 🦿

Analysis of hundreds of millions of web pages found phishing and fraudulent sites using the Amazon brand and logos poised for big Prime Day sales, according to Bolster Research.

πŸ“– Read

via "Tech Republic".
?
12:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Azure Flaws Open Admin Servers to Takeover ❌

Two flaws in Microsoft's cloud-based Azure App Services could have allowed server-side forgery request (SSFR) and remote code-execution attacks.

πŸ“– Read

via "Threat Post".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Kaspersky Researchers Spot Russia-on-Russia Cyber-Espionage Campaign πŸ•΄

Steganography-borne malware used to spy on industrial targets in Russia.

πŸ“– Read

via "Dark Reading".
13:25
πŸ•΄ US Election-Related Websites Vulnerable to Fraud, Abuse πŸ•΄

New research finds the vast majority of reputable news, political, and donor-oriented sites don't use registry locks.

πŸ“– Read

via "Dark Reading".
13:30
β€Ό CVE-2020-5389 β€Ό

Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an information disclosure vulnerability. Authenticated low privileged OMIMSCC users may be able to retrieve sensitive information from the logs.

πŸ“– Read

via "National Vulnerability Database".
13:30
β€Ό CVE-2020-13344 β€Ό

An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Sessions keys are stored in plain-text in Redis which allows attacker with Redis access to authenticate as any user that has a session stored in Redis

πŸ“– Read

via "National Vulnerability Database".
13:41
🦿 Security pros: Cyber threats to industrial enterprises increase due to pandemic 🦿

86% polled said their organization made cybersecurity a priority during the COVID-19 crisis and implemented appropriate training for remote workers, according to a report.

πŸ“– Read

via "Tech Republic".
13:48
⚠ Naked Security Podcast – we’re back for Series 3! ⚠

Join us weekly for the Naked Security Podcast - back for Series 3 and available wherever good podcasts are found!

πŸ“– Read

via "Naked Security".
14:00
πŸ›  Zeek 3.2.2 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ 8 tips to tighten up your work-from-home network ⚠

You don't have to be an IT guru to beef up your cybersecurity at home. Sometimes it's enough to ask yourself, "Which bits can I turn off?"

πŸ“– Read

via "Naked Security".
?
14:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Fixes High-Severity Webex, Security Camera Flaws ❌

Three high-severity flaws exist in Cisco's Webex video conferencing system, Cisco’s Video Surveillance 8000 Series IP Cameras and Identity Services Engine.

πŸ“– Read

via "Threat Post".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How SMBs can better protect their data from cyberattacks 🦿

SMBs compromised by an effective cyberattack can not only lose data and suffer financially but go out of business entirely, says Infrascale.

πŸ“– Read

via "Tech Republic".
15:25
πŸ•΄ Scale Up Threat Hunting to Skill Up Analysts πŸ•΄

Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why.

πŸ“– Read

via "Dark Reading".
15:30
β€Ό CVE-2020-10816 β€Ό

Zoho ManageEngine Applications Manager 14780 and before allows a remote unauthenticated attacker to register managed servers via AAMRequestProcessor servlet.

πŸ“– Read

via "National Vulnerability Database".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is HIPAA Compliance? πŸ”

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Digital Guardian".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cloud and remote work support strengthened US market performance 🦿

The IT outlook for 2021, top trends and guidance as the enterprise prepares for "the next normal," according to a new report from IDC.

πŸ“– Read

via "Tech Republic".
16:52
❌ RAINBOWMIX Apps in Google Play Serve Up Millions of Ad Fraud Victims ❌

Collectively, 240 fraudulent Android apps -- masquerading as retro game emulators -- account for 14 million installs.

πŸ“– Read

via "Threat Post".
?
17:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-9048 β€Ό

A vulnerability in victor Web Client versions up to and including v5.4.1 could allow a remote unauthenticated attacker to delete arbitrary files on the system or render the system unusable by conducting a Denial of Service attack.

πŸ“– Read

via "National Vulnerability Database".
?
18:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cyberattacks Up, But Companies (Mostly) Succeed in Securing Remote Workforce πŸ•΄

Despite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.

πŸ“– Read

via "Dark Reading".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15241 β€Ό

TYPO3 Fluid Engine (package `typo3fluid/fluid`) before versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like `{showFullName ? fullName : defaultValue}`. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) versions as well: TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.4) and TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1).

πŸ“– Read

via "National Vulnerability Database".
19:31
β€Ό CVE-2020-15242 β€Ό

Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.

πŸ“– Read

via "National Vulnerability Database".
19:42
🦿 COVID-19 budgets, data security, and automation are concerns of IT leaders and staff 🦿

Dueling surveys from Kaseya showed that IT department leaders share their underlings' worries about security and productivity.

πŸ“– Read

via "Tech Republic".
19:42
🦿 Password managers: A cheat sheet for professionals 🦿

The sheer number of passwords the average person has can lead to confusion and tons of password retrieval emails. Simplify and secure your digital life by learning about password managers.

πŸ“– Read

via "Tech Republic".
?
21:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15243 β€Ό

Affected versions of Smartstore have a missing WebApi Authentication attribute. This vulnerability affects Smartstore shops in version 4.0.0 & 4.0.1 which have installed and activated the Web API plugin. Users of Smartstore 4.0.0 and 4.0.1 must merge their repository with 4.0.x or overwrite the file SmartStore.Web.Framework in the */bin* directory of the deployed shop with this file. As a workaround without updating uninstall the Web API plugin to close this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
9 October 2020
?
07:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26162 β€Ό

Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages.

πŸ“– Read

via "National Vulnerability Database".
07:33
β€Ό CVE-2020-26921 β€Ό

Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.

πŸ“– Read

via "National Vulnerability Database".
?
08:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective πŸ•΄

In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

πŸ“– Read

via "Dark Reading".
?
10:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wormable Apple iCloud Bug Allows Automatic Photo Theft ❌

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack.

πŸ“– Read

via "Threat Post".
?
11:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep1: Ransomware – is it really OK to pay? – Naked Security Podcast ⚠

The Naked Security Podcast is back for Series 3 - here's Episode 1!

πŸ“– Read

via "Naked Security".
11:26
πŸ•΄ Why MSPs Are Hacker Targets, and What To Do About It πŸ•΄

Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

πŸ“– Read

via "Dark Reading".
11:33
β€Ό CVE-2020-9105 β€Ό

Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.

πŸ“– Read

via "National Vulnerability Database".
11:33
β€Ό CVE-2020-13955 β€Ό

HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.

πŸ“– Read

via "National Vulnerability Database".
?
11:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Debuts Bug-Bounty β€˜Loyalty Program’ ❌

Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports -- which will dictate new bonus percentages.

πŸ“– Read

via "Threat Post".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 The new Ring Always Home Camera is a security disaster in the making 🦿

Jack Wallen offers his take on the upcoming release of the Ring Always Home Cam.

πŸ“– Read

via "Tech Republic".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Could Microsoft be en route to dumping Windows in favor of Linux? 🦿

Microsoft Linux is the next evolution of the Microsoft desktop operating system, argues Jack Wallen. He explains why this would be a win-win for Microsoft, IT pros, users, and the Linux community.

πŸ“– Read

via "Tech Republic".
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sophisticated Android Ransomware Executes with the Home Button ❌

The malware also has a unique machine-learning module.

πŸ“– Read

via "Threat Post".
14:56
πŸ•΄ CISOs Planning on Bigger Budgets: Report πŸ•΄

Budgets are on the rise, even in a time of revenue worries across the industry.

πŸ“– Read

via "Dark Reading".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to secure your open source supply chain 🦿

Commentary: Open source has never been more popular, which means it's time to figure out how to effectively secure the open source you use. Two experts weigh in.

πŸ“– Read

via "Tech Republic".
15:12
🦿 How the enterprise can shut down cyber criminals and protect a remote staff 🦿

Hackers accidentally allowed into company software by security noncompliant employees cost businesses millions annually; we asked experts to weigh in on best safety practices.

πŸ“– Read

via "Tech Republic".
15:26
πŸ•΄ Critical Zerologon Flaw Exploited in TA505 Attacks πŸ•΄

Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

πŸ“– Read

via "Dark Reading".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 10/9 Friday Five πŸ”

Antitrust reforms, biometic data collection, and DHS malware warnings - catch up on all the week's news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
16:23
❌ Fitbit Spyware Steals Personal Data via Watch Face ❌

Immersive Labs Researcher takes advantage of lax Fitbit privacy controls to build a malicious spyware watch face.

πŸ“– Read

via "Threat Post".
?
17:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Pays Bug Bounty to Enterprise Network Researchers πŸ•΄

So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.

πŸ“– Read

via "Dark Reading".
?
17:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Latest Version of MalLocker Android Ransomware Packs New Tricks πŸ•΄

Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.

πŸ“– Read

via "Dark Reading".
10 October 2020
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26935 β€Ό

An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.

πŸ“– Read

via "National Vulnerability Database".
?
19:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26947 β€Ό

monero-wallet-gui in Monero GUI 0.17.0.1 includes the . directory in an embedded RPATH (with a preference ahead of /usr/lib), which allows local users to gain privileges via a Trojan horse library in the current working directory.

πŸ“– Read

via "National Vulnerability Database".
19:35
β€Ό CVE-2020-26948 β€Ό

Emby Server before 4.5.0 allows SSRF via the Items/RemoteSearch/Image ImageURL parameter.

πŸ“– Read

via "National Vulnerability Database".
12 October 2020
?
02:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-14184 β€Ό

Affected versions of Atlassian Jira Server allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in Jira issue filter export files. The affected versions are before 8.5.9, from version 8.6.0 before 8.12.3, and from version 8.13.0 before 8.13.1.

πŸ“– Read

via "National Vulnerability Database".
?
07:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security and DevOps πŸ•΄



πŸ“– Read

via "Dark Reading".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5141 β€Ό

A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.

πŸ“– Read

via "National Vulnerability Database".
09:50
⚠ S3 Ep1: Ransomware – is it really OK to pay? – Naked Security Podcast ⚠

Our podcast is back for Series 3 - here's Episode 1!

πŸ“– Read

via "Naked Security".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – Cybersecurity tips for your own network ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
10:26
❌ Ransomware Attackers Buy Network Access in Cyberattack Shortcut ❌

Network access to various industries is being offered in underground forums at as little as $300 a pop - and researchers warn that ransomware groups like Maze and NetWalker could be buying in.

πŸ“– Read

via "Threat Post".
10:29
πŸ•΄ How to Pinpoint Rogue IoT Devices on Your Network πŸ•΄

Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

πŸ“– Read

via "Dark Reading".
?
11:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Security Officers, Are Your Employers Practicing Good Habits from Home? πŸ•΄

Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain.

πŸ“– Read

via "Dark Reading".
11:29
πŸ•΄ A 7-Step Cybersecurity Plan for Healthcare Organizations πŸ•΄

With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations.

πŸ“– Read

via "Dark Reading".
11:37
β€Ό CVE-2020-4772 β€Ό

An XML External Entity Injection (XXE) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10. A remote attacker could exploit this vulnerability to expose sensitive information, denial of service, server side request forgery or consume memory resources. IBM X-Force ID: 189150.

πŸ“– Read

via "National Vulnerability Database".
11:37
β€Ό CVE-2020-4773 β€Ό

A cross-site request forgery (CSRF) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, which is an attack that forces a user to execute unwanted actions on the web application while they are currently authenticated. This applies to a single server class only, with no impact to remainder of web application. IBM X-Force ID: 189151.

πŸ“– Read

via "National Vulnerability Database".
?
13:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-9108 β€Ό

HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) have an out-of-bounds read and write vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the process reboot.

πŸ“– Read

via "National Vulnerability Database".
13:37
β€Ό CVE-2020-4689 β€Ό

IBM Security Guardium 11.2 is vulnerable to CVS Injection. A remote privileged attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-ForceID: 186696.

πŸ“– Read

via "National Vulnerability Database".
?
15:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-8820 β€Ό

An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload will be rendered and executed.

πŸ“– Read

via "National Vulnerability Database".
15:37
β€Ό CVE-2020-25825 β€Ό

In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.

πŸ“– Read

via "National Vulnerability Database".
15:43
🦿 Infographic: Ransomware attacks by industry, continent, and more 🦿

Cyberattacks have surged during the coronavirus pandemic. This infographic details ransomware attack trends by industry, continent, and more.

πŸ“– Read

via "Tech Republic".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What is End-to-End Encryption? πŸ•΄

Many services advertise E2EE, but not all of them actually offer it.

πŸ“– Read

via "Dark Reading".
16:04
πŸ›  Nmap Port Scanner 7.91 πŸ› 

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

πŸ“– Read

via "Packet Storm Security".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Attackers Chaining Together Netlogon, VPN Bugs to Attack Govts πŸ”

CISA is warning that attackers are chaining together vulnerabilities in Windows Netlogon protocol and VPNs to hack government networks.

πŸ“– Read

via "Digital Guardian".
16:29
πŸ•΄ Security Firms & Financial Group Team Up to Take Down Trickbot πŸ•΄

Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.

πŸ“– Read

via "Dark Reading".
?
17:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15250 β€Ό

In JUnit4 before version 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
17:37
β€Ό CVE-2020-26546 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in HelpDeskZ 1.0.2. The feature to auto-login a user, via the RememberMe functionality, is prone to SQL injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
?
18:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft on the counter­attack! Trickbot malware network takes a hit ⚠

The crooks haven't yet been caught and arrested, but their malware distribution network has been hit hard.

πŸ“– Read

via "Naked Security".
18:29
πŸ•΄ Software AG Continues Efforts Against $20M Ransomware Attack πŸ•΄

The attack, which now includes extortion components, has moved into its second week.

πŸ“– Read

via "Dark Reading".
?
19:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15012 β€Ό

A Directory Traversal issue was discovered in Sonatype Nexus Repository Manager 2.x before 2.14.19. A user that requests a crafted path can traverse up the file system to get access to content on disk (that the user running nxrm also has access to).

πŸ“– Read

via "National Vulnerability Database".
?
21:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-17444 β€Ό

Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.

πŸ“– Read

via "National Vulnerability Database".
13 October 2020
?
09:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7743 β€Ό

The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.

πŸ“– Read

via "National Vulnerability Database".
09:41
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
?
10:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Office 365: A Favorite for Cyberattack Persistence ❌

Bad actors are leveraging legitimate services and tools within Microsoft's productivity suite to launch cyberattacks on COVID-19 stay-at-home workers, new research finds.

πŸ“– Read

via "Threat Post".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Online Voting Is Coming, but How Secure Will It Be? πŸ•΄

It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.

πŸ“– Read

via "Dark Reading".
?
11:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ TrickBot Takedown Disrupts Major Crimeware Apparatus ❌

Microsoft and partners went after the botnet using a copyright infringement tactic and hunting down C2 servers.

πŸ“– Read

via "Threat Post".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybercriminals use stolen data and hacking tools as prizes in poker games and rap battles 🦿

Prizes for bad actors can be access to stolen data and tools to make hacks easier, according to new research from Trend Micro.

πŸ“– Read

via "Tech Republic".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-16124 β€Ό

Integer Overflow or Wraparound vulnerability in the XML RPC library of OpenRobotics ros_comm communications packages allows unauthenticated network traffic to cause unexpected behavior. This issue affects: OpenRobotics ros_comm communications packages Noetic and prior versions. Fixed in https://github.com/ros/ros_comm/pull/2065.

πŸ“– Read

via "National Vulnerability Database".
?
13:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Election Systems Under Attack via Microsoft Zerologon Exploits ❌

Cybercriminals are chaining Microsoft's Zerologon flaw with other exploits in order to infiltrate government systems, putting election systems at risk, a new CISA and FBI advisory warns.

πŸ“– Read

via "Threat Post".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to improve the cybersecurity of your remote workers 🦿

Cyberattacks against businesses have spiked since the shift to remote work began in early 2020, says Keeper Security.

πŸ“– Read

via "Tech Republic".
14:20
⚠ Creepy covert camera β€œfeature” found in popular smartwatch for kids ⚠

This popular smartwatch aimed at kids had a backdoor that received covert encrypted commands via SMS.

πŸ“– Read

via "Naked Security".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trickbot Botnet Response Highlights Partnerships Preventing U.S. Election Interference πŸ•΄

Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

πŸ“– Read

via "Dark Reading".
?
14:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Flash Player Flaw Opens Adobe Users to RCE ❌

The flaw stems from a NULL Pointer Dereference error and plagues the Windows, macOS, Linux and ChromeOS versions of Adobe Flash Player.

πŸ“– Read

via "Threat Post".
15:10
πŸ•΄ Where are the 'Great Exits' in the Data Security Market? πŸ•΄

If data security were a student, its report card would read "Not performing to potential." Here's why.

πŸ“– Read

via "Dark Reading".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-17411 β€Ό

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11190.

πŸ“– Read

via "National Vulnerability Database".
15:38
β€Ό CVE-2020-17413 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11226.

πŸ“– Read

via "National Vulnerability Database".
15:38
β€Ό CVE-2020-17414 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of Foxit Reader 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the configuration files used by the Foxit Reader Update Service. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-11229.

πŸ“– Read

via "National Vulnerability Database".
15:41
πŸ•΄ 25% of BEC Cybercriminals Based in the US πŸ•΄

While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers.

πŸ“– Read

via "Dark Reading".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators πŸ•΄

With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.

πŸ“– Read

via "Dark Reading".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Software AG Data Released After Clop Ransomware Strike – Report ❌

The Clop group attacked Software AG, a German conglomerate with operations in more than 70 countries, threatening to dump stolen data if the whopping $23 million ransom isn’t paid.

πŸ“– Read

via "Threat Post".
16:40
πŸ•΄ Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections πŸ•΄

The state of email defenses has a role to play in the US presidential election.

πŸ“– Read

via "Dark Reading".
?
17:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” 50 Colleges Where You Can Get a Cybersecurity Degree Online Now πŸ”

You can gain many valuable cybersecurity skills online now. To celebrate National Cyber Security Awareness Month (NCSAM) we put together a list of 50 schools offering cybersecurity degrees online.

πŸ“– Read

via "Digital Guardian".
17:35
πŸ›  Raptor WAF 0.61 πŸ› 

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.

πŸ“– Read

via "Packet Storm Security".
17:38
β€Ό CVE-2018-20243 β€Ό

The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.

πŸ“– Read

via "National Vulnerability Database".
17:38
β€Ό CVE-2020-15251 β€Ό

In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Lemon Duck Cryptocurrency-Mining Botnet Activity Spikes ❌

Researchers warn of a spike in the cryptocurrency-mining botnet since August 2020.

πŸ“– Read

via "Threat Post".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Coalition Pokes Five Eyes on Call for Backdoors πŸ•΄

The Five Eyes international law enforcement group had called for implementing backdoors for law enforcement in all encryption implementations.

πŸ“– Read

via "Dark Reading".
?
19:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Fixes Critical Windows TCP/IP Flaw in Patch Rollout πŸ•΄

The October 2020 Patch Tuesday fixed 87 vulnerabilities, including 21 remote code execution flaws, in Microsoft products and services.

πŸ“– Read

via "Dark Reading".
?
19:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25645 β€Ό

A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
19:45
β€‹β€‹βš οΈ ======================= ⚠️

πŸ‘€ LOOK! It's amazing‼️

⚠️ ======================= ⚠️
?
21:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-12911 β€Ό

A denial of service vulnerability exists in the D3DKMTCreateAllocation handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTCreateAllocation API request can cause an out-of-bounds read and denial of service (BSOD). This vulnerability can be triggered from a non-privileged account.

πŸ“– Read

via "National Vulnerability Database".
?
22:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Windows β€œPing of Death” bug revealed – patch now! ⚠

No one has figured out how to run code with this bug yet - but if they do, you can bet that someone will turn it into a computer worm.

πŸ“– Read

via "Naked Security".
14 October 2020
?
07:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7330 β€Ό

Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial prior to 4.0.176.1 allows local users to schedule tasks which call malicious software to execute with elevated privileges via editing of environment variables

πŸ“– Read

via "National Vulnerability Database".
?
10:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm ❌

Databases of sensitive, financial and personally identifiable info and documents from Intcomex were leaked on Russian-language hacker forum after a ransomware attack.

πŸ“– Read

via "Threat Post".
?
10:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google, Intel Warn on β€˜Zero-Click’ Kernel Bug in Linux-Based IoT Devices ❌

Intel and Google are urging users to update the Linux kernel to version 5.9 or later.

πŸ“– Read

via "Threat Post".
11:10
πŸ•΄ NIST Quantum Cryptography Program Nears Completion πŸ•΄

The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.

πŸ“– Read

via "Dark Reading".
11:14
🦿 Survey finds that IT departments victimized by ransomware forever changed 🦿

IT managers at organizations hit by ransomware are nearly three times as likely to feel "significantly behind" when it comes to understanding cyberthreats, compared to their peers that have never been hit.

πŸ“– Read

via "Tech Republic".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-6087 β€Ό

An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.

πŸ“– Read

via "National Vulnerability Database".
11:39
β€Ό CVE-2020-6083 β€Ό

An exploitable denial of service vulnerability exists in the ENIP Request Path Port Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
12:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips ❌

Intel's addition of memory encryption to its upcoming 3rd generation Xeon Scalable processors matches AMD's Secure Memory Encryption (SME) feature.

πŸ“– Read

via "Threat Post".
?
13:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-0415 β€Ό

In various locations in SystemUI, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure of contact data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-156020795

πŸ“– Read

via "National Vulnerability Database".
13:39
β€Ό CVE-2020-0414 β€Ό

In AudioFlinger::RecordThread::threadLoop of audioflinger/Threads.cpp, there is a possible non-silenced audio buffer due to a permissions bypass. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-157708122

πŸ“– Read

via "National Vulnerability Database".
13:45
🦿 Zoom announces end-to-end encryption, customizable SDKs and more at Zoomtopia 🦿

Zoom's two-day online conference kicked off with a bevy of new product announcements around security and developer enhancements.

πŸ“– Read

via "Tech Republic".
13:45
🦿 IoT security: University creates new labels for devices to increase awareness for consumers 🦿

What if you could compare security on IoT devices, similar to nutrition labels, before you buy them? One organization is trying to make that happen.

πŸ“– Read

via "Tech Republic".
13:58
❌ Silent Librarian Goes Back to School with Global Research-Stealing Effort ❌

The Iranian hacker group is targeting universities in 12 countries.

πŸ“– Read

via "Threat Post".
14:10
πŸ•΄ Intel's Ice Lake Beefs Up CPU Security for Cloud Workloads πŸ•΄

The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.

πŸ“– Read

via "Dark Reading".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Assuring Business Continuity by Reducing Malware Dwell Time πŸ•΄

Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.

πŸ“– Read

via "Dark Reading".
?
15:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4395 β€Ό

IBM Security Access Manager Appliance 9.0.7 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 179358.

πŸ“– Read

via "National Vulnerability Database".
15:51
πŸ” Microsoft Fixes Critical TCP/IP Vulnerability πŸ”

A new, potentially wormable remote code execution vulnerability in the Windows TCP/IP stack was patched this week.

πŸ“– Read

via "Digital Guardian".
15:58
❌ Critical SonicWall VPN Portal Bug Allows DoS, Worming RCE ❌

The CVE-2020-5135 stack-based buffer overflow security vulnerability is trivial to exploit, without logging in.

πŸ“– Read

via "Threat Post".
?
17:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What's Really Happening in Infosec Hiring Now? πŸ•΄

As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

πŸ“– Read

via "Dark Reading".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  See-SURF 2.0 πŸ› 

See-SURF is a python-based scanner to find potential SSRF parameters in a web application.

πŸ“– Read

via "Packet Storm Security".
17:39
β€Ό CVE-2020-15224 β€Ό

In Open Enclave before version 0.12.0, an information disclosure vulnerability exists when an enclave application using the syscalls provided by the sockets.edl is loaded by a malicious host application. An attacker who successfully exploited the vulnerability could read privileged data from the enclave heap across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information otherwise considered confidential in an enclave, which could be used in further compromises. The issue has been addressed in version 0.12.0 and the current master branch. Users will need to to recompile their applications against the patched libraries to be protected from this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
17:39
β€Ό CVE-2020-7318 β€Ό

Cross-Site Scripting vulnerability in McAfee ePolicy Orchistrator (ePO) prior to 5.10.9 Update 9 allows administrators to inject arbitrary web script or HTML via parameter values for "syncPointList" not being correctly sanitsed.

πŸ“– Read

via "National Vulnerability Database".
?
17:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On ❌

Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS attacks on their network unless a $230K ransom is paid.

πŸ“– Read

via "Threat Post".
18:11
πŸ•΄ Zoom Announces Rollout of End-to-End Encryption πŸ•΄

Phase 1 removes Zoom servers from the key generation and distribution processes.

πŸ“– Read

via "Dark Reading".
?
19:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7383 β€Ό

A SQL Injection issue in Rapid7 Nexpose version prior to 6.6.49 that may have allowed an authenticated user with a low permission level to access resources & make changes they should not have been able to access.

πŸ“– Read

via "National Vulnerability Database".
?
21:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-8345 β€Ό

A DLL search path vulnerability was reported in the Lenovo HardwareScan Plugin for the Lenovo Vantage hardware scan feature prior to version 1.0.46.11 that could allow escalation of privilege.

πŸ“– Read

via "National Vulnerability Database".
15 October 2020
?
02:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-6373 β€Ό

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

πŸ“– Read

via "National Vulnerability Database".
02:40
β€Ό CVE-2020-6372 β€Ό

SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.

πŸ“– Read

via "National Vulnerability Database".
02:40
β€Ό CVE-2020-5642 β€Ό

Cross-site request forgery (CSRF) vulnerability in Live Chat - Live support version 3.1.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
?
07:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7334 β€Ό

Improper privilege assignment vulnerability in the installer McAfee Application and Change Control (MACC) prior to 8.3.2 allows local administrators to change or update the configuration settings via a carefully constructed MSI configured to mimic the genuine installer. This version adds further controls for installation/uninstallation of software.

πŸ“– Read

via "National Vulnerability Database".
?
08:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Office 365 Accounts a Big Target for Attackers πŸ•΄

Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

πŸ“– Read

via "Dark Reading".
?
09:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Carnival Corp. Ransomware Attack Affected Three Cruise Lines ❌

Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations.

πŸ“– Read

via "Threat Post".
09:40
β€Ό CVE-2020-7327 β€Ό

Improperly implemented security check in McAfee MVISION Endpoint Detection and Response Client (MVEDR) prior to 3.2.0 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MVEDR failing open rather than closed

πŸ“– Read

via "National Vulnerability Database".
09:40
β€Ό CVE-2020-7326 β€Ό

Improperly implemented security check in McAfee Active Response (MAR) prior to 2.4.4 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MAR failing open rather than closed

πŸ“– Read

via "National Vulnerability Database".
?
10:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Barnes & Noble Hack: A Reading List for Phishers and Crooks ❌

Customers' lists of book purchases along with email addresses and more could have been exposed -- and that's a problem.

πŸ“– Read

via "Threat Post".
11:12
πŸ•΄ The Ruthless Cyber Chaos of Business Recovery πŸ•΄

Critical technology initiatives leveraging the best of technology solutions are the only way through the cyber chaos of 2020.

πŸ“– Read

via "Dark Reading".
11:16
🦿 Ransomware campaign threatens organizations with DDoS attacks 🦿

All the organizations that contacted security provider Radware after receiving an extortion letter were hit by Distributed Denial of Service attacks.

πŸ“– Read

via "Tech Republic".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4499 β€Ό

IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an unauthorized public Oauth client to bypass some or all of the authentication checks and gain access to applications. IBM X-Force ID: 182216.

πŸ“– Read

via "National Vulnerability Database".
11:40
β€Ό CVE-2020-7744 β€Ό

This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background).

πŸ“– Read

via "National Vulnerability Database".
?
11:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts ❌

Companies that use Broadvoice's cloud-based VoIP platform may find their patients, customers, suppliers and partners to be impacted by a massive data exposure.

πŸ“– Read

via "Threat Post".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Rolls Out End-to-End Encryption After Setbacks ❌

After backlash over false marketing around its encryption policies, Zoom will finally roll out end-to-end encryption next week.

πŸ“– Read

via "Threat Post".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Survey: 53% of young cybersecurity professionals fear replacement by automation 🦿

Cybersecurity professionals largely embrace automation, but half of younger employees worry that technology could make their roles obsolete, according to a new survey by Exabeam.

πŸ“– Read

via "Tech Republic".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-6107 β€Ό

An exploitable information disclosure vulnerability exists in the dev_read functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause an uninitialized read resulting in an information disclosure. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:40
β€Ό CVE-2020-6105 β€Ό

An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
15:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Overcoming the Challenge of Shorter Certificate Lifespans πŸ•΄

We could be in the middle of a major transition to shorter and shorter certificate life spans, which has significant implications for how IT organizations manage certificates across the enterprise.

πŸ“– Read

via "Dark Reading".
?
15:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-12411 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:40
β€Ό CVE-2020-13939 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:51
πŸ” Proposed Modifications to the CCPA Issued πŸ”

Potential modifications to the CCPA include would change β€œDo Not Sell My Personal Information” requests and how companies provide notice when they collect information offline.

πŸ“– Read

via "Digital Guardian".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Barnes & Noble Warns Customers About Data Breach πŸ•΄

Famed bookseller says non-financial data was exposed in a new attack.

πŸ“– Read

via "Dark Reading".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  GRR 3.4.2.4 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Read

via "Packet Storm Security".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Twitter Hack Analysis Drives Calls for Greater Security Regulation πŸ•΄

New York's Department of Financial Services calls for more cybersecurity regulation at social media firms following the "jarringly easy" Twitter breach.

πŸ“– Read

via "Dark Reading".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FIFA 21 Blockbuster Release Gives Fraudsters an Open Field for Theft ❌

In-game features of the just-released FIFA 21 title give scammers easy access its vast audience.

πŸ“– Read

via "Threat Post".
17:40
β€Ό CVE-2020-12503 β€Ό

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.

πŸ“– Read

via "National Vulnerability Database".
?
18:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Magento Holes Open Online Shops to Code Execution ❌

Adobe says the two critical flaws (CVE-2020-24407 and CVE-2020-24400) could allow arbitrary code execution as well as read or write access to the database.

πŸ“– Read

via "Threat Post".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-17640 β€Ό

In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0.milestone1, 4.0.0.milestone2, 4.0.0.milestone3, 4.0.0.milestone4, 4.0.0.milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.

πŸ“– Read

via "National Vulnerability Database".
19:43
πŸ•΄ US Indicts Members of Transnational Money-Laundering Organization πŸ•΄

Members of the QQAAZZ group helped cybercriminals conceal origins of stolen funds, DoJ alleges.

πŸ“– Read

via "Dark Reading".
?
21:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-14185 β€Ό

Affected versions of Jira Server allow remote unauthenticated attackers to enumerate issue keys via a missing permissions check in the ActionsAndOperations resource. The affected versions are before 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before version 8.12.2.

πŸ“– Read

via "National Vulnerability Database".
16 October 2020
?
02:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27173 β€Ό

In vm-superio before 0.1.1, the serial console FIFO can grow to unlimited memory usage when data is sent to the input source (i.e., standard input). This behavior cannot be reproduced from the guest side. When no rate limiting is in place, the host can be subject to memory pressure, impacting all other VMs running on the same host.

πŸ“– Read

via "National Vulnerability Database".
02:41
β€Ό CVE-2020-27163 β€Ό

phpRedisAdmin before 1.13.2 allows XSS via the login.php username parameter.

πŸ“– Read

via "National Vulnerability Database".
?
07:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27176 β€Ό

Mutation XSS exists in Mark Text through 0.16.2 that leads to Remote Code Execution. NOTE: this might be considered a duplicate of CVE-2020-26870; however, it can also be considered an issue in the design of the "source code mode" feature, which parses HTML even though HTML support is not one of the primary advertised roles of the product.

πŸ“– Read

via "National Vulnerability Database".
07:42
β€Ό CVE-2020-24352 β€Ό

An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
?
08:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Windows 10: Microsoft's key new security feature helps to protect your information 🦿

Remote work makes protecting data on the PC a higher priority, while the Edge browser gets more control.

πŸ“– Read

via "Tech Republic".
?
10:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 10/16 πŸ”

Botnet disruptions, ransomware, and insensitive cybersecurity ads - catch up on the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
10:29
❌ TikTok Launches Bug Bounty Program Amid Security Snafus ❌

The move is a distinct change in direction for the app, which has been criticized and even banned for its security practices.

πŸ“– Read

via "Threat Post".
?
10:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US Department of Justice reignites the Battle to Break Encryption ⚠

How strong is too strong?

πŸ“– Read

via "Naked Security".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercrime Losses Up 50%, Exceeding $1.8B πŸ•΄

Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often.

πŸ“– Read

via "Dark Reading".
11:16
🦿 Barnes & Noble restores Nook services after notifying customers about cyberattack 🦿

Analysts point to specific clues from the company's response that show it may have been a ransomware attack.

πŸ“– Read

via "Tech Republic".
11:19
πŸ•΄ Cybercrime Losses Up 50%, Exceeding $1.8B πŸ•΄

Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often.

πŸ“– Read

via "Dark Reading".
?
11:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-18796 β€Ό

The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Denial of Service vulnerability (infinite loop) via a crafted .mp3 file. This weakness could allow attackers to consume excessive CPU and the application becomes unresponsive.

πŸ“– Read

via "National Vulnerability Database".
11:42
β€Ό CVE-2020-26893 β€Ό

An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.

πŸ“– Read

via "National Vulnerability Database".
?
12:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 5 ways to manage computers securely (and remotely) using PowerShell 🦿

Being able to secure communications between remote resources is just as important as being able to access the device. Using PowerShell, IT can do both when accessing off-site devices cross-platform.

πŸ“– Read

via "Tech Republic".
12:52
⚠ S3 Ep2: Creepy smartwatches, botnets and Pings of Death – Podcast ⚠

Listen to the latest episode of the Naked Security Podcast

πŸ“– Read

via "Naked Security".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Academia Adopts Mitre ATT&CK Framework πŸ•΄

Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers.

πŸ“– Read

via "Dark Reading".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Dickey’s BBQ Breach: Meaty 3M Payment Card Upload Drops on Joker’s Stash ❌

After cybercriminals smoked out 3 million compromised payment cards on the Joker’s Stash marketplace, researchers linked the data to a breach at the popular barbecue franchise.

πŸ“– Read

via "Threat Post".
13:42
β€Ό CVE-2020-26682 β€Ό

In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.

πŸ“– Read

via "National Vulnerability Database".
13:42
β€Ό CVE-2020-15867 β€Ό

The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution.

πŸ“– Read

via "National Vulnerability Database".
13:42
β€Ό CVE-2020-14299 β€Ό

A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Fuzzing (fuzz testing) 101: Lessons from cyber security expert Dr. David Brumley 🦿

Dr. David Brumley, Carnegie Mellon University professor and CEO of ForAllSecure, explains what fuzzing, or fuss testing, is and how you can use it to improve application security and speed up your software development.

πŸ“– Read

via "Tech Republic".
?
15:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-9878 β€Ό

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
15:42
β€Ό CVE-2020-9885 β€Ό

An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A user that is removed from an iMessage group could rejoin the group.

πŸ“– Read

via "National Vulnerability Database".
15:48
🦿 How to view website trackers in mobile Safari 🦿

Learn how to use Apple's Privacy Report in Safari so you can see which websites attempted to track you on your iPhone or iPad.

πŸ“– Read

via "Tech Republic".
15:48
🦿 How to recover deleted files in Linux with testdisk 🦿

If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.

πŸ“– Read

via "Tech Republic".
15:48
β€Ό CVE-2020-9948 β€Ό

A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
15:48
β€Ό CVE-2020-9959 β€Ό

A lock screen issue allowed access to messages on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0. A person with physical access to an iOS device may be able to view notification contents from the lockscreen.

πŸ“– Read

via "National Vulnerability Database".
15:59
❌ Phishing Lures Shift from COVID-19 to Job Opportunities ❌

Fortinet researchers are seeing a pivot in the spear-phishing and phishing lures used by cybercriminals, to entice potential job candidates as businesses open up.

πŸ“– Read

via "Threat Post".
?
16:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ An Uncommon 20 Years of Commonly Enumerating Vulns πŸ•΄

Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).

πŸ“– Read

via "Dark Reading".
16:43
πŸ•΄ US Counterintelligence Director & Fmr. Europol Leader Talk Election Security πŸ•΄

The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.

πŸ“– Read

via "Dark Reading".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Leading more girls to STEM careers drives professor to create cybersecurity camp 🦿

Teaching students around the world has become easier, thanks to Zoom classes, one college professor says. She's still trying to find a way to teach robotics, though.

πŸ“– Read

via "Tech Republic".
17:16
🦿 Professor creates cybersecurity camp to inspire girls to choose STEM careers 🦿

Teaching via Zoom has had some unexpected benefits, college professor says, though robotics class is still a challenge. Her real passion is inspiring young women and girls to go into computer science.

πŸ“– Read

via "Tech Republic".
17:29
❌ Biden Campaign Staffers Targeted in Cyberattack Leveraging Anti-Virus Lure, Dropbox Ploy ❌

Google's Threat Analysis Group sheds more light on targeted credential phishing and malware attacks on the staff of Joe Biden's presidential campaign.

πŸ“– Read

via "Threat Post".
17:42
β€Ό CVE-2020-26183 β€Ό

Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner.

πŸ“– Read

via "National Vulnerability Database".
17:42
β€Ό CVE-2020-26182 β€Ό

Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform 'saveset' related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP.

πŸ“– Read

via "National Vulnerability Database".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Fixes RCE Flaws in Out-of-Band Windows Update ❌

The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution.

πŸ“– Read

via "Threat Post".
?
18:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Phishers Capitalize on Headlines with Breakneck Speed ❌

Marking a pivot from COVID-19 scams, researchers track a single threat actor through the evolution from the pandemic to PayPal, and on to more timely voter scams -- all with the same infrastructure.

πŸ“– Read

via "Threat Post".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Massive New Phishing Campaigns Target Microsoft, Google Cloud Users πŸ•΄

At least three campaigns are now underway.

πŸ“– Read

via "Dark Reading".
?
19:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-1679 β€Ό

On Juniper Networks PTX and QFX Series devices with packet sampling configured using tunnel-observation mpls-over-udp, sampling of a malformed packet can cause the Kernel Routing Table (KRT) queue to become stuck. KRT is the module within the Routing Process Daemon (RPD) that synchronized the routing tables with the forwarding tables in the kernel. This table is then synchronized to the Packet Forwarding Engine (PFE) via the KRT queue. Thus, when KRT queue become stuck, it can lead to unexpected packet forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device > show krt state ... Number of async queue entries: 65007 <--- this value keep on increasing. When this issue occurs, the following message might appear in the /var/log/messages: DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Too many delayed route/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (7297134592) Current delayed unref = (60000), Current unique delayed unref = (18420), Max delayed unref on this platform = (40000) Current delayed weight unref = (60000) Max delayed weight unref on this platform= (400000) curproc = rpd This issue affects Juniper Networks Junos OS on PTX/QFX Series: 17.2X75 versions prior to 17.2X75-D105; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.

πŸ“– Read

via "National Vulnerability Database".
19:42
β€Ό CVE-2020-1660 β€Ό

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS Filtering service are no longer protected and at risk of exploitation. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions prior to 18.4R3; 19.1 versions prior to 19.1R3; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3. This issue does not affect Juniper Networks Junos OS 17.4, 18.1, and 18.2.

πŸ“– Read

via "National Vulnerability Database".
?
21:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-16936 β€Ό

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976.

πŸ“– Read

via "National Vulnerability Database".
21:42
β€Ό CVE-2020-16863 β€Ό

A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Service Denial of Service Vulnerability'.

πŸ“– Read

via "National Vulnerability Database".
21:42
β€Ό CVE-2020-16995 β€Ό

An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extension for Linux, aka 'Network Watcher Agent Virtual Machine Extension for Linux Elevation of Privilege Vulnerability'.

πŸ“– Read

via "National Vulnerability Database".
21:42
β€Ό CVE-2020-16937 β€Ό

An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory, aka '.NET Framework Information Disclosure Vulnerability'.

πŸ“– Read

via "National Vulnerability Database".
21:48
β€Ό CVE-2020-16901 β€Ό

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.To exploit this vulnerability, an authenticated attacker could run a specially crafted application, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16938.

πŸ“– Read

via "National Vulnerability Database".
21:48
β€Ό CVE-2020-16946 β€Ό

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-16945.

πŸ“– Read

via "National Vulnerability Database".
21:48
β€Ό CVE-2020-16927 β€Ό

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'.

πŸ“– Read

via "National Vulnerability Database".
21:48
β€Ό CVE-2020-16969 β€Ό

An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages, aka 'Microsoft Exchange Information Disclosure Vulnerability'.

πŸ“– Read

via "National Vulnerability Database".
21:48
β€Ό CVE-2020-16877 β€Ό

An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points, aka 'Windows Elevation of Privilege Vulnerability'.

πŸ“– Read

via "National Vulnerability Database".
17 October 2020
?
19:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27197 β€Ό

** DISPUTED ** TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may be an issue to "raise ... to the lxml group."

πŸ“– Read

via "National Vulnerability Database".
18 October 2020
?
17:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-13893 β€Ό

Multiple stored cross-site scripting (XSS) vulnerabilities in Sage EasyPay 10.7.5.10 allow authenticated attackers to inject arbitrary web script or HTML via multiple parameters through Unicode Transformations (Best-fit Mapping), as demonstrated by the full-width variants of the less-than sign (%EF%BC%9C) and greater-than sign (%EF%BC%9E).

πŸ“– Read

via "National Vulnerability Database".
19 October 2020
?
07:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft: Most-Imitated Brand for Phishing Emails ❌

The shift to remote working spurred Microsoft and Amazon to the top of the heap for cybercriminals to use as lures in the third quarter.

πŸ“– Read

via "Threat Post".
?
08:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – Ping of Death: are you at risk? ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
?
09:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7745 β€Ό

This affects the package MintegralAdSDK before 6.6.0.0. The SDK distributed by the company contains malicious functionality that acts as a backdoor. Mintegral and their partners (advertisers) can remotely execute arbitrary code on a user device.

πŸ“– Read

via "National Vulnerability Database".
?
11:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A New Risk Vector: The Enterprise of Things πŸ•΄

Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.

πŸ“– Read

via "Dark Reading".
11:32
❌ Hackers Claim Source Code Theft for Watch Dogs: Legion, Albion ❌

In both cases, cybercriminals claim to have reams of information for the popular gaming titles.

πŸ“– Read

via "Threat Post".
11:46
β€Ό CVE-2020-15909 β€Ό

SolarWinds N-central through 2020.1 allows session hijacking.

πŸ“– Read

via "National Vulnerability Database".
11:46
β€Ό CVE-2020-15910 β€Ό

SolarWinds N-central through 12.3 does not include the HTTPOnly flag in the Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

πŸ“– Read

via "National Vulnerability Database".
11:46
β€Ό CVE-2020-13778 β€Ό

rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.

πŸ“– Read

via "National Vulnerability Database".
11:49
🦿 Microsoft now the most impersonated brand in phishing attacks 🦿

Almost 20% of phishing campaigns last quarter spoofed Microsoft as many people continue to work remotely due to the coronavirus pandemic, says Check Point Research.

πŸ“– Read

via "Tech Republic".
?
12:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Expert Tips to Keep WordPress Safe πŸ•΄

The most widely used content management system on the Web relies heavily on plug-ins and add-on software, rigorous security measures at every level.

πŸ“– Read

via "Dark Reading".
12:32
❌ Microsoft Exchange, Outlook Under Siege By APTs ❌

A new threat report shows that APTs are switching up their tactics when exploiting Microsoft services like Exchange and OWA, in order to avoid detection.

πŸ“– Read

via "Threat Post".
?
12:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Swift Reminder About Cybersecurity πŸ•΄

The hackers gonna crack, crack, crack, crack, crack ...

πŸ“– Read

via "Dark Reading".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-24265 β€Ό

An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in MemcmpInterceptorCommon() that can make tcpprep crash and cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
13:46
β€Ό CVE-2020-24266 β€Ό

An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in get_l2len() that can make tcpprep crash and cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
13:49
πŸ•΄ Chart: The Pandemic Reprioritizes Security Projects πŸ•΄

Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.

πŸ“– Read

via "Dark Reading".
14:02
❌ Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack ❌

Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours.

πŸ“– Read

via "Threat Post".
?
14:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Tips for Choosing Security Metrics That Matter πŸ•΄

Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

πŸ“– Read

via "Dark Reading".
14:32
❌ Overlay Malware Targets Windows Users with a DLL Hijack Twist ❌

Brazilians are warned of a new Vizom malware masquerading as video conferencing and browser software.

πŸ“– Read

via "Threat Post".
?
15:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ GravityRAT Comes Back to Earth with Android, macOS Spyware ❌

The espionage tool masquerades as legitimate applications and robs victims blind of their data.

πŸ“– Read

via "Threat Post".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trickbot, Phishing, Ransomware & Elections πŸ•΄

The botnet has taken some hits lately, but that doesn't mean the threat is over. Here are some steps you can take to keep it from your door.

πŸ“– Read

via "Dark Reading".
?
15:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26891 β€Ό

AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS due to unsafe interpolation of the session GET parameter. This allows a remote attacker to execute an XSS attack on the domain Synapse is hosted on, by supplying the victim user with a malicious URL to the /_matrix/client/r0/auth/m.login.recaptcha or /_matrix/client/r0/auth/m.login.terms Synapse 974923.

πŸ“– Read

via "National Vulnerability Database".
15:49
🦿 State-sponsored hackers and ransomware gangs are diversifying tactics to inflict more harm 🦿

The groups have been using off-the-shelf tooling and open source penetration testing tools at unprecedented scale, according to Accenture's 2020 Cyber Threatscape Report.

πŸ“– Read

via "Tech Republic".
?
16:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Why ransomware has become such a huge problem for businesses 🦿

Ransomware has evolved into a significant threat for all types of organizations. How and why is it such a pervasive issue, and how can organizations better defend themselves against it?

πŸ“– Read

via "Tech Republic".
16:25
πŸ” DOJ Charges 14 Members of QQAAZZ in International Cybercrime Conspiracy πŸ”

The latest international law enforcement takedown involves a money laundering ring responsible for doing the dirty work of cybercriminals.

πŸ“– Read

via "Digital Guardian".
16:32
❌ Rapper Scams $1.2M in COVID-19 Relief, Gloats with β€˜EDD’ Video ❌

"Nuke Bizzle" faces 22 years in prison after brazenly bragging about an identity-theft campaign in his music video, "EDD."

πŸ“– Read

via "Threat Post".
?
17:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7156 β€Ό

A faultinfo_content expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:46
β€Ό CVE-2020-7193 β€Ό

A ictexpertcsvdownload expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:46
β€Ό CVE-2020-24649 β€Ό

A remote bytemessageresource transformentity" input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-24647 β€Ό

A remote accessmgrservlet classname input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-7145 β€Ό

A chooseperfview expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-7153 β€Ό

A iccselectdevtype expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-16160 β€Ό

GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_Decompress(). Parsing malicious input can result in a crash.

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-24651 β€Ό

A syslogtempletselectwin expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-7159 β€Ό

A customtemplateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
?
18:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Tops Q3 List of Most-Impersonated Brands πŸ•΄

The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.

πŸ“– Read

via "Dark Reading".
?
18:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GravityRAT Spyware Targets Android & MacOS in India πŸ•΄

The Trojan once used in attacks against Windows systems has been transformed into a multiplatform tool targeting macOS and Android.

πŸ“– Read

via "Dark Reading".
?
19:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15262 β€Ό

In webpack-subresource-integrity before version 1.5.1, all dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. This issue is patched in version 1.5.1.

πŸ“– Read

via "National Vulnerability Database".
19:46
β€Ό CVE-2020-9263 β€Ό

HUAWEI Mate 30 versions earlier than 10.1.0.150(C00E136R5P3) and HUAWEI P30 version earlier than 10.1.0.160(C00E160R2P11) have a use after free vulnerability. There is a condition exists that the system would reference memory after it has been freed, the attacker should trick the user into running a crafted application with common privilege, successful exploit could cause code execution.

πŸ“– Read

via "National Vulnerability Database".
?
20:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns πŸ•΄

US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.

πŸ“– Read

via "Dark Reading".
?
20:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSS Labs Shuttered πŸ•΄

The testing firm's website says it has 'ceased operations' as of Oct. 15.

πŸ“– Read

via "Dark Reading".
?
21:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15261 β€Ό

On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.

πŸ“– Read

via "National Vulnerability Database".
21:46
β€Ό CVE-2020-15256 β€Ό

A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.

πŸ“– Read

via "National Vulnerability Database".
20 October 2020
?
07:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5640 β€Ό

Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
08:02
❌ Google’s Waze Can Allow Hackers to Identify and Track Users ❌

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it.

πŸ“– Read

via "Threat Post".
?
09:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7748 β€Ό

This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.

πŸ“– Read

via "National Vulnerability Database".
10:03
❌ Mobile Browser Bugs Open Safari, Opera Users to Malware ❌

A set of address-spoofing bugs affect users of six different types of mobile browsers, with some remaining unpatched.

πŸ“– Read

via "Threat Post".
?
10:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trickbot Tenacity Shows Infrastructure Resistant to Takedowns πŸ•΄

Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot -- but with only a short-term impact.

πŸ“– Read

via "Dark Reading".
?
11:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Homebrew: How to install reconnaissance tools on macOS 🦿

We'll guide you through the process of using Homebrew package manager to install security tools on macOS to perform reconnaissance, discovery, and fingerprinting of the devices on your network.

πŸ“– Read

via "Tech Republic".
?
11:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Building the Human Firewall πŸ•΄

Cybersecurity was a challenge before COVID-19 sent millions of employees home to work from their own devices and networks. Now what?

πŸ“– Read

via "Dark Reading".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Office 365 OAuth Attack Targets Coinbase Users ❌

Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth.

πŸ“– Read

via "Threat Post".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Businesses Rethink Endpoint Security for 2021 πŸ•΄

The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?

πŸ“– Read

via "Dark Reading".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts ❌

Hundreds of medical patients taking cancer drugs, Premarin, Lyrica and more are now vulnerable to phishing, malware and identity fraud.

πŸ“– Read

via "Threat Post".
?
13:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4748 β€Ό

IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188517.

πŸ“– Read

via "National Vulnerability Database".
13:49
β€Ό CVE-2020-6367 β€Ό

There is a reflected cross site scripting vulnerability in SAP NetWeaver Composite Application Framework, versions - 7.20, 7.30, 7.31, 7.40, 7.50. An unauthenticated attacker can trick an unsuspecting authenticated user to click on a malicious link. The end users browser has no way to know that the script should not be trusted, and will execute the script, resulting in sensitive information being disclosed or modified.

πŸ“– Read

via "National Vulnerability Database".
14:03
❌ Facebook: A Top Launching Pad For Phishing Attacks ❌

Amazon, Apple, Netflix, Facebook and WhatsApp are top brands leveraged by cybercriminals in phishing and fraud attacks - including a recent strike on a half-million Facebook users.

πŸ“– Read

via "Threat Post".
14:06
πŸ•΄ Farsight Labs Launched as Security Collaboration Platform πŸ•΄

Farsight Security's platform will offer no-cost access to certain tools and services.

πŸ“– Read

via "Dark Reading".
?
14:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – Ping of Death: are you at risk? ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
14:24
⚠ Russian β€œgovernment hackers” charged with cybercrimes by the US ⚠

What can we learn from the US DOJ indictments against the "Sandworm Team"?

πŸ“– Read

via "Naked Security".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Cybersecurity Maturity Model Certification: Are You in Compliance? πŸ•΄



πŸ“– Read

via "Dark Reading".
?
15:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe Fixes 16 Critical Code-Execution Bugs Across Portfolio ❌

The out-of-band patches follow a lighter-than-usual Patch Tuesday update earlier this month.

πŸ“– Read

via "Threat Post".
?
15:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-3992 β€Ό

OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
15:49
β€Ό CVE-2020-7370 β€Ό

User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of Danyil Vasilenko's Bolt Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Bolt Browser version 1.4 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
?
16:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers πŸ•΄

Officials urge organizations to patch the vulnerabilities most commonly scanned for, and exploited by, Chinese attackers.

πŸ“– Read

via "Dark Reading".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Do Standards Exist That Certify Secure IoT Systems? πŸ•΄

The IoT industry remains fragmented with a lot of players, big and small, churning out a lot of products.

πŸ“– Read

via "Dark Reading".
?
16:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” DOJ Charges Sandworm, The Group Behind Destructive NotPetya Attack πŸ”

That Russians were behind the attacks has always been a forgone conclusion to many experts but this is the first time that the U.S. has formally made the accusation.

πŸ“– Read

via "Digital Guardian".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 10.4g πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
?
18:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware Group Makes Splashy $20K Donation to Charities ❌

Cybercriminal gang Darkside sent $20K in donations to charities in a β€˜Robin Hood’ effort that’s likely intended to draw attention to future data dumps, according to experts.

πŸ“– Read

via "Threat Post".
?
19:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Attacks Show Little Sign of Slowing in 2021 πŸ•΄

Attackers have little motivation to stop when businesses are paying increasingly larger ransoms, say security experts who foresee a rise in attacks.

πŸ“– Read

via "Dark Reading".
19:49
β€Ό CVE-2020-9417 β€Ό

The Transaction Insight reporting component of TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction Insight, and TIBCO Foresight Transaction Insight Healthcare Edition contains a vulnerability that theoretically allows an authenticated attacker to perform SQL injection. Affected releases are TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Archive and Retrieval System Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Transaction Insight: versions 5.1.0 and below, version 5.2.0, and TIBCO Foresight Transaction Insight Healthcare Edition: versions 5.1.0 and below, version 5.2.0.

πŸ“– Read

via "National Vulnerability Database".
19:49
β€Ό CVE-2019-9080 β€Ό

DomainMOD before 4.14.0 uses MD5 without a salt for password storage.

πŸ“– Read

via "National Vulnerability Database".
?
21:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5790 β€Ό

Cross-site request forgery in Nagios XI 5.7.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.

πŸ“– Read

via "National Vulnerability Database".
21:50
β€Ό CVE-2020-25648 β€Ό

A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.

πŸ“– Read

via "National Vulnerability Database".
21 October 2020
?
02:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26895 β€Ό

Prior to 0.10.0-beta, LND (Lightning Network Daemon) would have accepted a counterparty high-S signature and broadcast tx-relay invalid local commitment/HTLC transactions. This can be exploited by any peer with an open channel regardless of the victim situation (e.g., routing node, payment-receiver, or payment-sender). The impact is a loss of funds in certain situations.

πŸ“– Read

via "National Vulnerability Database".
?
09:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Patches Actively-Exploited Zero-Day Bug in Chrome Browser ❌

The memory-corruption vulnerability exists in the browser’s FreeType font rendering library.

πŸ“– Read

via "Threat Post".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cisco reports highlight widespread desire for data privacy and fears over remote work security 🦿

Workers are increasingly concerned about the ability of enterprises to keep them protected as they work from home.

πŸ“– Read

via "Tech Republic".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cybercriminals Step Up Their Game Ahead of U.S. Elections ❌

Ahead of the November U.S. elections, cybercriminals are stepping up their offensive in both attacks against security infrastructure and disinformation campaigns - but this time, social media giants, the government and citizens are more prepared.

πŸ“– Read

via "Threat Post".
11:04
πŸ•΄ Modern Day Insider Threat: Network Bugs That Are Stealing Your Data πŸ•΄

Attacks involving an unmanaged device and no malware expose gaps in cybersecurity that must be addressed.

πŸ“– Read

via "Dark Reading".
?
11:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25820 β€Ό

BigBlueButton before 2.2.7 allows remote authenticated users to read local files and conduct SSRF attacks via an uploaded Office document that has a crafted URL in an ODF xlink field.

πŸ“– Read

via "National Vulnerability Database".
11:55
⚠ Chrome zero-day in the wild – patch now! ⚠

Exploitable bug in Chrome - patch now!

πŸ“– Read

via "Naked Security".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Egregor Claims Responsibility for Barnes & Noble Attack, Leaks Data ❌

The ransomware gang claims to have bought network access to the bookseller's systems before encrypting the networks and stealing "financial and audit data."

πŸ“– Read

via "Threat Post".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to protect your privacy when selling your phone 🦿

If your currrent phone is ready for retirement or you need to sell your current phone to upgrade to a new model, follow these steps to keep your data private.

πŸ“– Read

via "Tech Republic".
13:05
πŸ•΄ Are You One COVID-19 Test Away From a Cybersecurity Disaster? πŸ•΄

One cybersecurity failure can result in a successful ransomware attack or data breach that could cause tremendous damage. There's no need to panic, but neither is there time to ignore the issue.

πŸ“– Read

via "Dark Reading".
13:05
πŸ•΄ Iranian Cyberattack Group Deploys New PowGoop Downloader Against Mideast Targets πŸ•΄

Seedworm Group, aka MuddyWater, is also deploying commodity ransomware as part of espionage attacks on companies and government agencies in the Middle East region.

πŸ“– Read

via "Dark Reading".
13:14
πŸ›  nfstream 6.2.0 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".
?
13:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-14796 β€Ό

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
13:51
β€Ό CVE-2020-14820 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
13:57
β€Ό CVE-2020-14894 β€Ό

Vulnerability in the Oracle Banking Corporate Lending product of Oracle Financial Services Applications (component: Core). Supported versions that are affected are 12.3.0 and 14.0.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
13:57
β€Ό CVE-2020-14672 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
13:57
β€Ό CVE-2020-14887 β€Ό

Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.3.0 and 14.0.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-27603 β€Ό

BigBlueButton before 2.2.7 has an unsafe JODConverter setting in which LibreOffice document conversions can access external files.

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14811 β€Ό

Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: AMP EBS Integration). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14835 β€Ό

Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 - 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14841 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14819 β€Ό

Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Print Server). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14809 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14869 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14875 β€Ό

Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or complete access to all Oracle Marketing accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14858 β€Ό

Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Logging). Supported versions that are affected are 5.5 and 5.6. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality OPERA 5 Property Services. CVSS 3.1 Base Score 6.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14790 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-27608 β€Ό

In BigBlueButton before 2.2.8 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document.

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14862 β€Ό

Vulnerability in the Oracle Universal Work Queue product of Oracle E-Business Suite (component: Internal Operations). Supported versions that are affected are 12.2.3 - 12.2.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Universal Work Queue. Successful attacks of this vulnerability can result in takeover of Oracle Universal Work Queue. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:01
β€Ό CVE-2020-14825 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-10138 β€Ό

Acronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\jenkins_agent\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14753 β€Ό

Vulnerability in the Oracle Hospitality Reporting and Analytics product of Oracle Food and Beverage Applications (component: Installation). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality Reporting and Analytics executes to compromise Oracle Hospitality Reporting and Analytics. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Hospitality Reporting and Analytics, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Reporting and Analytics accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14810 β€Ό

Vulnerability in the Oracle Hospitality Suite8 product of Oracle Hospitality Applications (component: WebConnect). Supported versions that are affected are 8.10.2 and 8.11-8.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Suite8. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Suite8 accessible data as well as unauthorized read access to a subset of Oracle Hospitality Suite8 accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14866 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14882 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14762 β€Ό

Vulnerability in the Oracle Application Express component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having SQL Workshop privilege with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14795 β€Ό

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14899 β€Ό

Vulnerability in the Oracle Application Express Data Reporter component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Data Reporter. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Data Reporter, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Data Reporter accessible data as well as unauthorized read access to a subset of Oracle Application Express Data Reporter accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14740 β€Ό

Vulnerability in the SQL Developer Install component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows low privileged attacker having Client Computer User Account privilege with logon to the infrastructure where SQL Developer Install executes to compromise SQL Developer Install. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of SQL Developer Install accessible data. CVSS 3.1 Base Score 2.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14900 β€Ό

Vulnerability in the Oracle Application Express Group Calendar component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Group Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Group Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Group Calendar accessible data as well as unauthorized read access to a subset of Oracle Application Express Group Calendar accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14803 β€Ό

Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14873 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14822 β€Ό

Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-27613 β€Ό

The installation procedure in BigBlueButton before 2.2.8 (or earlier) uses ClueCon as the FreeSWITCH password, which allows local users to achieve unintended FreeSWITCH access.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14884 β€Ό

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-27612 β€Ό

Greenlight in BigBlueButton through 2.2.8 places usernames in room URLs, which may represent an unintended information leak to users in a room, or an information leak to outsiders if any user publishes a screenshot of a browser window.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14801 β€Ό

Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14769 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14789 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-14895 β€Ό

Vulnerability in the Oracle Utilities Framework product of Oracle Utilities Applications (component: System Wide). Supported versions that are affected are 2.2.0.0.0, 4.2.0.2.0, 4.2.0.3.0, 4.3.0.1.0 - 4.3.0.6.0, 4.4.0.0.0 and 4.4.0.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Utilities Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Utilities Framework accessible data as well as unauthorized read access to a subset of Oracle Utilities Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14818 β€Ό

Vulnerability in the Oracle Solaris product of Oracle Systems (component: Utility). The supported version that is affected is 11. Difficult to exploit vulnerability allows low privileged attacker with network access via SSH to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.0 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
πŸ•΄ IASME Consortium to Kick-start New IoT Assessment Scheme πŸ•΄

The IASME Consortium has been awarded a DCMS grant, enabling the UK organization to kick-start an Internet of Things (IoT) assessment scheme. IASME is looking for manufacturers interested in getting their IoT device certified cyber secure for free via the new pilot scheme.

πŸ“– Read

via "Dark Reading".
14:07
β€Ό CVE-2020-14897 β€Ό

Vulnerability in the Oracle FLEXCUBE Direct Banking product of Oracle Financial Services Applications (component: Pre Login). Supported versions that are affected are 12.0.1, 12.0.2 and 12.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Direct Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14770 β€Ό

Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-27611 β€Ό

BigBlueButton through 2.2.8 uses STUN/TURN resources from a third party, which may represent an unintended endpoint.

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14732 β€Ό

Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Promotions). The supported version that is affected is 19.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14829 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14845 β€Ό

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14877 β€Ό

Vulnerability in the Oracle Hospitality OPERA 5 Property Services product of Oracle Hospitality Applications (component: Logging). Supported versions that are affected are 5.5 and 5.6. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14890 β€Ό

Vulnerability in the Oracle FLEXCUBE Direct Banking product of Oracle Financial Services Applications (component: Pre Login). Supported versions that are affected are 12.0.1, 12.0.2 and 12.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Direct Banking accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N).

πŸ“– Read

via "National Vulnerability Database".
14:07
β€Ό CVE-2020-14876 β€Ό

Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

πŸ“– Read

via "National Vulnerability Database".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oracle Kills 402 Bugs in Massive October Patch Update ❌

Over half of Oracle's flaws in its quarterly patch update can be remotely exploitable without authentication; 65 are critical, and two have CVSS scores of 10 out of 10.

πŸ“– Read

via "Threat Post".
14:34
πŸ•΄ How AI Will Supercharge Spear-Phishing πŸ•΄

To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own.

πŸ“– Read

via "Dark Reading".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dealing With Insider Threats in the Age of COVID πŸ•΄

Dangerous gray areas like new BYOD policies and shadow IT devices have increased, thanks to the rapid shift to remote working.

πŸ“– Read

via "Dark Reading".
?
15:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5651 β€Ό

SQL injection vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to execute arbitrary SQL commands via a specially crafted URL.

πŸ“– Read

via "National Vulnerability Database".
15:51
β€Ό CVE-2020-5650 β€Ό

Cross-site scripting vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
16:04
❌ Cisco Warns of Severe DoS Flaws in Network Security Software ❌

The majority of the bugs in Cisco’s Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software can enable denial of service (DoS) on affected devices.

πŸ“– Read

via "Threat Post".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” NSA: Patch These 25 Vulnerabilities to Deter Chinese Hackers πŸ”

In hopes that enterprises patch them, the NSA shared a list of 25 vulnerabilities currently being targeted by Chinese hackers.

πŸ“– Read

via "Digital Guardian".
?
17:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ As Smartphones Become a Hot Target, Can Mobile EDR Help? πŸ•΄

Lookout Security debuts a mobile endpoint detection and response offering that will integrate into its mobile security platform.

πŸ“– Read

via "Dark Reading".
?
17:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bug Parade: NSA Warns on Cresting China-Backed Cyberattacks ❌

The Feds have published a Top 25 exploits list, rife with big names like BlueKeep, Zerologon and other notorious security vulnerabilities.

πŸ“– Read

via "Threat Post".
?
17:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-3563 β€Ό

A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a large number of TCP packets to a specific port on an affected device. A successful exploit could allow the attacker to exhaust system memory, which could cause the device to reload unexpectedly. No manual intervention is needed to recover the device after it has reloaded.

πŸ“– Read

via "National Vulnerability Database".
17:51
β€Ό CVE-2020-3565 β€Ό

A vulnerability in the TCP Intercept functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Access Control Policies (including Geolocation) and Service Polices on an affected system. The vulnerability exists because TCP Intercept is invoked when the embryonic connection limit is reached, which can cause the underlying detection engine to process the packet incorrectly. An attacker could exploit this vulnerability by sending a crafted stream of traffic that matches a policy on which TCP Intercept is configured. A successful exploit could allow the attacker to match on an incorrect policy, which could allow the traffic to be forwarded when it should be dropped. In addition, the traffic could incorrectly be dropped.

πŸ“– Read

via "National Vulnerability Database".
17:51
β€Ό CVE-2020-3317 β€Ό

A vulnerability in the ssl_inspection component of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to crash Snort instances. The vulnerability is due to insufficient input validation in the ssl_inspection component. An attacker could exploit this vulnerability by sending a malformed TLS packet through a Cisco Adaptive Security Appliance (ASA). A successful exploit could allow the attacker to crash a Snort instance, resulting in a denial of service (DoS) condition.

πŸ“– Read

via "National Vulnerability Database".
17:57
β€Ό CVE-2020-3585 β€Ό

A vulnerability in the TLS handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000 Series firewalls could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper implementation of countermeasures against the Bleichenbacher attack for cipher suites that rely on RSA for key exchange. An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. To exploit this vulnerability, an attacker must be able to perform both of the following actions: Capture TLS traffic that is in transit between clients and the affected device Actively establish a considerable number of TLS connections to the affected device

πŸ“– Read

via "National Vulnerability Database".
17:57
β€Ό CVE-2020-3599 β€Ό

A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
?
18:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Oracle Releases Another Mammoth Security Patch Update πŸ•΄

October's CPU contains 402 patches for vulnerabilities across 29 product sets, many of which are remotely executable without the need for authentication.

πŸ“– Read

via "Dark Reading".
?
19:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FIRST Announces Cyber-Response Ethical Guidelines πŸ•΄

The 12 points seek to provide security professionals with advice on ethical behavior during incident response.

πŸ“– Read

via "Dark Reading".
?
19:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27615 β€Ό

The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.

πŸ“– Read

via "National Vulnerability Database".
19:51
β€Ό CVE-2020-9749 β€Ό

Adobe Animate version 20.5 (and earlier) is affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate.

πŸ“– Read

via "National Vulnerability Database".
?
21:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-24421 β€Ό

Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
21:51
β€Ό CVE-2020-17355 β€Ό

Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause a denial of service (restart of agents) by crafting a malformed DHCP packet which leads to an incorrect route being installed.

πŸ“– Read

via "National Vulnerability Database".
22 October 2020
?
02:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27619 β€Ό

In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.

πŸ“– Read

via "National Vulnerability Database".
02:51
β€Ό CVE-2020-27620 β€Ό

The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.

πŸ“– Read

via "National Vulnerability Database".
?
09:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Time for a mobile privacy reset? ⚠

Can you remember which permissions you gave to what apps, and why? Nor can we... time for a reset!

πŸ“– Read

via "Naked Security".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Implementing Proactive Cyber Controls in OT: Myths vs. Reality πŸ•΄

Debunking the myths surrounding the implementation of proactive cyber controls in operational technology.

πŸ“– Read

via "Dark Reading".
11:06
❌ Feds: Iran Behind β€˜Proud Boys’ Email Attacks on Democratic Voters ❌

Messages that threaten people to β€˜vote for Trump or else’ are part of foreign adversaries’ attempts to interfere with the Nov. 3 election, according to feds.

πŸ“– Read

via "Threat Post".
?
11:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Need for 'Guardrails' in Cloud-Native Applications Intensifies πŸ•΄

With more organizations shifting to cloud services in the pandemic, experts say the traditionally manual process of securing them will be replaced by automated tools in 2021 and beyond.

πŸ“– Read

via "Dark Reading".
?
11:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27642 β€Ό

A cross-site scripting (XSS) vulnerability exists in the 'merge account' functionality in admins.js in BigBlueButton Greenlight 2.7.6.

πŸ“– Read

via "National Vulnerability Database".
11:52
β€Ό CVE-2020-27638 β€Ό

receive.c in fastd before v21 allows denial of service (assertion failure) when receiving packets with an invalid type code.

πŸ“– Read

via "National Vulnerability Database".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 1Password for Linux desktop app now available in beta 🦿

A full Linux version of the popular password manager is expected early next year.

πŸ“– Read

via "Tech Republic".
13:36
πŸ•΄ McAfee Raises $740M in Second IPO πŸ•΄

The security software giant and its investors sold 37 million shares priced at $20 each, putting McAfee's value around $8.6 billion.

πŸ“– Read

via "Dark Reading".
?
13:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26650 β€Ό

AtomXCMS 2.0 is affected by Arbitrary File Read via admin/dump.php

πŸ“– Read

via "National Vulnerability Database".
13:52
β€Ό CVE-2020-27646 β€Ό

Biscom Secure File Transfer (SFT) before 5.1.1082 and 6.x before 6.0.1011 allows user credential theft.

πŸ“– Read

via "National Vulnerability Database".
14:06
❌ Chrome 86 Aims to Bar Abusive Notification Content ❌

Google said Chrome 86 will automatically block malicious notifications that may be used for phishing or malware.

πŸ“– Read

via "Threat Post".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook, News and XSS Underpin Complex Browser Locker Attack ❌

A sophisticated β€œbrowser locker” campaign is spreading via Facebook, ultimately pushing a tech-support scam. The effort is more advanced than most, because it involves exploiting a cross-site scripting (XSS) vulnerability on a popular news site, researchers said. Browser lockers are a type of redirection attack where web surfers will click on a site, only to […]

πŸ“– Read

via "Threat Post".
15:11
πŸ•΄ To Err Is Human: Misconfigurations & Employee Neglect Are a Fact of Life πŸ•΄

The cyber kill chain is only as strong as its weakest link, so organizations should reinforce that link with a properly equipped dedicated security team.

πŸ“– Read

via "Dark Reading".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Former Employee Breached Company Payroll Data πŸ”

Before resigning, the employee stole company data and created a "superuser" account that let him access the network after he left.

πŸ“– Read

via "Digital Guardian".
?
15:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27195 β€Ό

HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6

πŸ“– Read

via "National Vulnerability Database".
16:07
❌ Researcher: I Hacked Trump’s Twitter by Guessing Password ❌

Trump’s weak Twitter password and lack of basic two-factor authentication protections made it shockingly simple to hack his account, Dutch security researcher Victor Gevers reported. Β 

πŸ“– Read

via "Threat Post".
16:11
πŸ•΄ 8 New and Hot Cybersecurity Certifications for 2020 πŸ•΄

While the usual security certs remain popular, interest in privacy skills and cloud experience are pushing new credentials into the market.

πŸ“– Read

via "Dark Reading".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ WordPress Plug-in Updated in Rare Forced Action πŸ•΄

The Logonizer login security plug-in was automatically updated to patch a SQL injection vulnerability.

πŸ“– Read

via "Dark Reading".
?
17:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to create a new user with admin privileges on Linux 🦿

Adding a user with admin privileges on Linux is easier than you think. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
17:52
β€Ό CVE-2020-27664 β€Ό

admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-9900 β€Ό

An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A local attacker may be able to elevate their privileges.

πŸ“– Read

via "National Vulnerability Database".
17:52
β€Ό CVE-2020-9990 β€Ό

A race condition was addressed with additional validation. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Credential-Stuffing Attacks Plague Loyalty Programs πŸ•΄

But that's not the only type of web attack cybercriminals have been profiting from.

πŸ“– Read

via "Dark Reading".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 7 Mobile Browsers Vulnerable to Address-Bar Spoofing πŸ•΄

Flaws allow attackers to manipulate URLs users see on their mobile devices, Rapid7 says

πŸ“– Read

via "Dark Reading".
?
19:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Botnet Infects Hundreds of Thousands of Websites πŸ•΄

KashmirBlack has been targeting popular content management systems, such as WordPress, Joomla, and Drupal, and using Dropbox and GitHub for communication to hide its presence.

πŸ“– Read

via "Dark Reading".
19:52
β€Ό CVE-2020-18129 β€Ό

A CSRF vulnerability in Eyoucms v1.2.7 allows an attacker to add an admin account via login.php.

πŸ“– Read

via "National Vulnerability Database".
19:52
β€Ό CVE-2018-18508 β€Ό

In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
?
21:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15270 β€Ό

Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched.

πŸ“– Read

via "National Vulnerability Database".
23 October 2020
?
07:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep3: Cryptography, hacking and pwning Chrome [Podcast] ⚠

Listen to the latest Naked Security podcast!

πŸ“– Read

via "Naked Security".
?
07:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-14716 β€Ό

Verifone VerixV Pinpad Payment Terminals with QT000530 have an undocumented physical access mode (aka VerixV shell.out).

πŸ“– Read

via "National Vulnerability Database".
07:53
β€Ό CVE-2020-15003 β€Ό

OX App Suite through 7.10.3 allows Information Exposure because a user can obtain the IP address and User-Agent string of a different user (via the session API during shared Drive access).

πŸ“– Read

via "National Vulnerability Database".
07:53
β€Ό CVE-2018-8062 β€Ό

A cross-site scripting (XSS) vulnerability on Comtrend AR-5387un devices with A731-410JAZ-C04_R02.A2pD035g.d23i firmware allows remote attackers to inject arbitrary web script or HTML via the Service Description parameter while creating a WAN service.

πŸ“– Read

via "National Vulnerability Database".
07:59
β€Ό CVE-2019-14711 β€Ό

Verifone MX900 series Pinpad Payment Terminals with OS 30251000 have a race condition for RBAC bypass.

πŸ“– Read

via "National Vulnerability Database".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware Takes Down Network of French IT Giant ❌

Sopra Steria hit with cyber attack that reportedly encrypted parts of their network on Oct. 20 but has remained mostly mum on details.

πŸ“– Read

via "Threat Post".
?
11:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Pause to Address 'Ethical Debt' of Facial Recognition πŸ•΄

Ethical use will require some combination of consistent reporting, regulation, corporate responsibility, and adversarial technology.

πŸ“– Read

via "Dark Reading".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Nvidia Warns Gamers of Severe GeForce Experience Flaws ❌

Versions of Nvidia GeForce Experience for Windows prior to 3.20.5.70 are affected by a high-severity bug that could enable code execution, denial of service and more.

πŸ“– Read

via "Threat Post".
?
11:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27216 β€Ό

In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
12:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 10-23 πŸ”

Indictments of Russian intelligence officers, NSA advisories, and stolen money donated to charities - catch up on the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-3998 β€Ό

VMware Horizon Client for Windows (5.x prior to 5.5.0) contains an information disclosure vulnerability. A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes.

πŸ“– Read

via "National Vulnerability Database".
14:08
❌ COVID-19 Vaccine-Maker Hit with Cyberattack, Data Breach ❌

Dr. Reddy's, the contractor for Russia’s β€œSputinik V” COVID-19 vaccine and a major generics producer, has had to close plants and isolate its data centers.

πŸ“– Read

via "Threat Post".
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 75% of all 56 US states and territories show signs of vulnerable election IT infrastructure, report finds 🦿

The report comes as officials in Georgia revealed more information about a ransomware attack that affected a digital voter database.

πŸ“– Read

via "Tech Republic".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Georgia Election Data Hit in Ransomware Attack ❌

With Election Day approaching, local governments need to be prepared for malware attacks on election infrastructure.

πŸ“– Read

via "Threat Post".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Election Security: Beyond Mail-In Voting ❌

There are many areas of the election process that criminal hackers can target to influence election results.

πŸ“– Read

via "Threat Post".
?
17:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Louisiana Calls Out National Guard to Fight Ransomware Surge ❌

An investigation showed a custom backdoor RAT and the Emotet trojan in the networks of municipal victims of the attacks.

πŸ“– Read

via "Threat Post".
17:44
πŸ•΄ Flurry of Warnings Highlight Cyber Threats to US Elections πŸ•΄

FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.

πŸ“– Read

via "Dark Reading".
17:54
β€Ό CVE-2020-25483 β€Ό

An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.

πŸ“– Read

via "National Vulnerability Database".
17:54
β€Ό CVE-2020-24848 β€Ό

FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.

πŸ“– Read

via "National Vulnerability Database".
18:08
❌ IoT Device Takeovers Surge 100 Percent in 2020 ❌

The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks.

πŸ“– Read

via "Threat Post".
18:14
πŸ•΄ Cybercriminals Could be Coming After Your Coffee πŸ•΄

Researchers show no IoT device is too small to fall victim to ransomware techniques.

πŸ“– Read

via "Dark Reading".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ U.S. Levies Sanctions Against Russian Research Institution Linked to Triton Malware ❌

The latest in a flurry of actions this week, tied to foreign threats against U.S. computer systems, includes sanctions by the Department of the Treasury.

πŸ“– Read

via "Threat Post".
18:44
πŸ•΄ US Treasury Sanctions Russian Institution Linked to Triton Malware πŸ•΄

Triton, also known as TRISIS and HatMan, was developed to target and manipulate industrial control systems, the US Treasury reports.

πŸ“– Read

via "Dark Reading".
?
20:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€‹β€‹βš οΈ ======================= ⚠️

πŸ‘€ LOOK! It's amazing‼️

⚠️ ======================= ⚠️
26 October 2020
?
08:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Naked Security Live – Who’s watching you? 5 mobile privacy tips ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
?
09:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27388 β€Ό

Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.

πŸ“– Read

via "National Vulnerability Database".
?
10:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27388 β€Ό

Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.

πŸ“– Read

via "National Vulnerability Database".
?
11:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Story of McAfee: How the Security Giant Arrived at a Second IPO πŸ•΄

Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.

πŸ“– Read

via "Dark Reading".
11:27
β€Ό CVE-2020-27678 β€Ό

An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2020-7751 β€Ό

This affects all versions of package pathval.

πŸ“– Read

via "National Vulnerability Database".
?
11:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft's Kubernetes Threat Matrix: Here's What's Missing πŸ•΄

With a fuller picture of the Kubernetes threat matrix, security teams can begin to implement mitigation strategies to protect their cluster from threats.

πŸ“– Read

via "Dark Reading".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Nando’s Hackers Feast on Customer Accounts ❌

Multiple chicken diners said their usernames and passwords were stolen and the accounts used to place high-volume orders.

πŸ“– Read

via "Threat Post".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Vastaamo Breach: Hackers Blackmailing Psychotherapy Patients ❌

Cybercriminals have already reportedly posted the details of 300 Vastaamo patients - and are threatening to release the data of others unless a ransom is paid.

πŸ“– Read

via "Threat Post".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25470 β€Ό

AntSword 2.1.8.1 contains a cross-site scripting (XSS) vulnerability in the View Site funtion. When viewing an added site, an XSS payload can be injected in cookies view which can lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
?
13:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 10.5f πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
?
14:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Teach Your Employees Well: How to Spot Smishing & Vishing Scams πŸ•΄

One of the best ways to keep employees from falling victim to these social-engineering attacks is to teach them the signs.

πŸ“– Read

via "Dark Reading".
?
14:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Containerd Bug Exposes Cloud Account Credentials ❌

The flaw (CVE-2020-15157) is located in the container image-pulling process.

πŸ“– Read

via "Threat Post".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Report Links Cybersecurity and Sustainability πŸ•΄

Some have also created the role of chief sustainability officer, according to Kaspersky.

πŸ“– Read

via "Dark Reading".
15:29
β€Ό CVE-2020-7126 β€Ό

A remote server-side request forgery (ssrf) vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
15:29
β€Ό CVE-2020-7196 β€Ό

The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the url "/bdswebui/assignusers/".

πŸ“– Read

via "National Vulnerability Database".
15:29
β€Ό CVE-2020-7752 β€Ό

This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.

πŸ“– Read

via "National Vulnerability Database".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜Among Us’ Mobile Game Under Siege by Attackers ❌

Ongoing attacks on the wildly popular game Among Us are testing developers’ ability to keep up.

πŸ“– Read

via "Threat Post".
16:55
🦿 Enterprises confident Chief Sustainability Officer (CSO) will improve cybersecurity 🦿

98% of enterprises want CSOs, but 56% of industrial businesses don't have plans to introduce one to their company, according to a new Kaspersky report.

πŸ“– Read

via "Tech Republic".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2017-18925 β€Ό

opentmpfiles through 0.3.1 allows local users to take ownership of arbitrary files because d entries are mishandled and allow a symlink attack.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2020-26566 β€Ό

A Denial of Service condition in Motion-Project Motion 3.2 through 4.3.1 allows remote unauthenticated users to cause a webu.c segmentation fault and kill the main process via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
17:29
β€Ό CVE-2020-26161 β€Ό

In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header.

πŸ“– Read

via "National Vulnerability Database".
17:33
πŸ” Former Healthcare Exec Sentenced for Sabotaging COVID-19 Supply Deliveries πŸ”

The ex-VP conducted an intrusion into his former employer’s package shipping system and delayed PPE essential to healthcare workers.

πŸ“– Read

via "Digital Guardian".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercriminals Extort Psychotherapy Patients Following Vastaamo Breach πŸ•΄

An attacker is running a Tor site to leak the session notes of 300 patients at Vastaamo, a Finnish psychotherapy facility.

πŸ“– Read

via "Dark Reading".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-1915 β€Ό

An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.

πŸ“– Read

via "National Vulnerability Database".
19:41
❌ Microsoft IE Browser Death March Hastens ❌

Internet Explorer redirects more traffic to Edge Chromium browser as Microsoft warns of the upcoming demise of the once dominant browser.

πŸ“– Read

via "Threat Post".
19:47
πŸ•΄ Neural Networks Help Users Pick More-Secure Passwords πŸ•΄

Typically, blocklists are used to prevent users from picking easily guessable patterns, but a small neural network can do the same job and suggests that complex password requirements are not necessary.

πŸ“– Read

via "Dark Reading".
?
21:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27743 β€Ό

libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.

πŸ“– Read

via "National Vulnerability Database".
?
22:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phone scamming – friends don’t let friends get vished! ⚠

You probably back yourself not to be flattered or scared by a voice scammer - but what about vulnerable friends or relatives?

πŸ“– Read

via "Naked Security".
27 October 2020
?
02:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2018-21269 β€Ό

checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink.

πŸ“– Read

via "National Vulnerability Database".
?
07:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27180 β€Ό

konzept-ix publiXone before 2020.015 allows attackers to download files by iterating over the IXCopy fileID parameter.

πŸ“– Read

via "National Vulnerability Database".
07:29
β€Ό CVE-2020-7753 β€Ό

All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) [DNP] via trim().

πŸ“– Read

via "National Vulnerability Database".
07:29
β€Ό CVE-2020-27182 β€Ό

Multiple cross-site scripting (XSS) vulnerabilities in konzept-ix publiXone before 2020.015 allow remote attackers to inject arbitrary JavaScript or HTML via appletError.jsp, job_jacket_detail.jsp, ixedit/editor_component.jsp, or the login form.

πŸ“– Read

via "National Vulnerability Database".
07:29
β€Ό CVE-2020-27183 β€Ό

A RemoteFunctions endpoint with missing access control in konzept-ix publiXone before 2020.015 allows attackers to disclose sensitive user information, send arbitrary e-mails, escalate the privileges of arbitrary user accounts, and have unspecified other impact.

πŸ“– Read

via "National Vulnerability Database".
07:29
β€Ό CVE-2020-8956 β€Ό

Pulse Secure Desktop Client 9.0Rx before 9.0R5 and 9.1Rx before 9.1R4 on Windows reveals users' passwords if Save Settings is enabled.

πŸ“– Read

via "National Vulnerability Database".
?
09:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Boots 21 Bogus Gaming Apps from Play Marketplace ❌

Android apps packed with malware from HiddenAds family downloaded 8 million times from the online marketplace.

πŸ“– Read

via "Threat Post".
?
10:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Holiday Shopping Craze, COVID-19 Spur Retail Security Storm ❌

Veracode's Chris Eng discusses the cyber threats facing shoppers who are going online due to the pandemic and the imminent holiday season.

πŸ“– Read

via "Threat Post".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Majority of Microsoft 365 Admins Don’t Enable MFA ❌

Beyond admins, researchers say that 97 percent of all total Microsoft 365 users do not use multi-factor authentication.

πŸ“– Read

via "Threat Post".
12:26
🦿 How foreign actors are trying to undermine the US presidential election 🦿

Through disinformation campaigns, foreign adversaries attempt to exploit the fear and uncertainty among US voters, says Digital Shadows.

πŸ“– Read

via "Tech Republic".
12:26
🦿 FBI: Hotel Wi-Fi is not safe 🦿

While hotel Wi-Fi is convenient, security is not the priority, federal government says.

πŸ“– Read

via "Tech Republic".
?
13:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes ❌

Popular chat apps, including LINE, Slack, Twitter DMs and others, can also leak location data and share private info with third-party servers.

πŸ“– Read

via "Threat Post".
?
13:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-6023 β€Ό

Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.

πŸ“– Read

via "National Vulnerability Database".
13:30
β€Ό CVE-2020-10256 β€Ό

An issue was discovered in beta versions of the 1Password command-line tool prior to 0.5.5 and in beta versions of the 1Password SCIM bridge prior to 0.7.3. An insecure random number generator was used to generate various keys. An attacker with access to the user's encrypted data may be able to perform brute-force calculations of encryption keys and thus succeed at decryption.

πŸ“– Read

via "National Vulnerability Database".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Employees Aware of Emailed Threats Open Suspicious Messages πŸ•΄

A survey of 1,000 employees finds 96% of employees are aware of digital threats, but 45% click emails they consider to be suspicious.

πŸ“– Read

via "Dark Reading".
13:56
🦿 Going passwordless might be safer for organizations 🦿

Passwords are a constant struggle for businesses and IT departments. There are other ways to stay safe.

πŸ“– Read

via "Tech Republic".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Akamai Acquires Asavie πŸ•΄

Asavie's mobile, IoT, and security products and services will become part of the Akamai Security and Personalization Services product line.

πŸ“– Read

via "Dark Reading".
14:25
🦿 Top 5 things to know about EU-US data privacy 🦿

For companies with data users in both the EU and the US, laws protecting users' privacy vary. Tom Merritt lists five things to know about EU-US data privacy.

πŸ“– Read

via "Tech Republic".
14:25
🦿 Top 5 things to know about EU-US data privacy 🦿

For companies with data users in both the EU and the US, laws protecting users' privacy vary. Tom Merritt lists five things to know about EU-US data privacy.

πŸ“– Read

via "Tech Republic".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ MITRE Shield Matrix Highlights Deception & Concealment Technology πŸ•΄

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape.

πŸ“– Read

via "Dark Reading".
15:28
⚠ Facebook β€œcopyright violation” tries to get past 2FA – don’t fall for it! ⚠

Watch out for "Facebook copyright violation" emails - even if they link straight back to Facebook.com

πŸ“– Read

via "Naked Security".
15:31
β€Ό CVE-2020-11854 β€Ό

Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
15:31
β€Ό CVE-2020-11858 β€Ό

Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges.

πŸ“– Read

via "National Vulnerability Database".
?
17:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15238 β€Ό

Blueman is a GTK+ Bluetooth Manager. In Blueman before 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is disabled and for versions lower than 2.0.6, any local user can possibly exploit this. If Polkit-1 is enabled for version 2.0.6 and later, a possible attacker needs to be allowed to use the `org.blueman.dhcp.client` action. That is limited to users in the wheel group in the shipped rules file that do have the privileges anyway. On systems with ISC DHCP client (dhclient), attackers can pass arguments to `ip link` with the interface name that can e.g. be used to bring down an interface or add an arbitrary XDP/BPF program. On systems with dhcpcd and without ISC DHCP client, attackers can even run arbitrary scripts by passing `-c/path/to/script` as an interface name. Patches are included in 2.1.4 and master that change the DhcpClient D-Bus method(s) to accept BlueZ network object paths instead of network interface names. A backport to 2.0(.8) is also available. As a workaround, make sure that Polkit-1-support is enabled and limit privileges for the `org.blueman.dhcp.client` action to users that are able to run arbitrary commands as root anyway in /usr/share/polkit-1/rules.d/blueman.rules.

πŸ“– Read

via "National Vulnerability Database".
17:30
β€Ό CVE-2020-26156 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
17:33
πŸ” Employee Surveillance Tied to $41M GDPR Fine πŸ”

The apparel company H&M is being asked to pay a 35 million Euro fine, roughly $41 million dollars, stemming from a GDPR violation.

πŸ“– Read

via "Digital Guardian".
17:42
❌ Amazon Fires Employee Who Leaked Customer Names, Emails ❌

Amazon notified customers and law enforcement of the insider-threat incident this week.

πŸ“– Read

via "Threat Post".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows πŸ•΄

Following the NSA's list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how they're used around the world.

πŸ“– Read

via "Dark Reading".
?
18:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 US elections are still vulnerable to email spoofing 🦿

A recent Valimail report spells out several potential threats that can impact election security. But there are ways to protect your organization.

πŸ“– Read

via "Tech Republic".
?
19:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Lax Security Exposes Smart-Irrigation Systems to Attack Across the Globe   ❌

Systems designed by Mottech Water Management were misconfigured and put in place and connected to the internet without password protections.

πŸ“– Read

via "Threat Post".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-8525 β€Ό

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. An application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
19:30
β€Ό CVE-2019-8640 β€Ό

A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra. A sandboxed process may be able to circumvent sandbox restrictions.

πŸ“– Read

via "National Vulnerability Database".
19:30
β€Ό CVE-2019-8761 β€Ό

This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. Parsing a maliciously crafted text file may lead to disclosure of user information.

πŸ“– Read

via "National Vulnerability Database".
19:36
β€Ό CVE-2019-8776 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with system privileges.

πŸ“– Read

via "National Vulnerability Database".
19:36
β€Ό CVE-2019-6238 β€Ό

A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted package may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:36
β€Ό CVE-2019-8538 β€Ό

A denial of service issue was addressed with improved validation. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. Processing a maliciously crafted vcf file may lead to a denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:36
β€Ό CVE-2019-8712 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 6, iOS 13, tvOS 13. An application may be able to execute arbitrary code with system privileges.

πŸ“– Read

via "National Vulnerability Database".
19:40
β€Ό CVE-2019-8834 β€Ό

A configuration issue was addressed with additional restrictions. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, iOS 13.3 and iPadOS 13.3, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. An attacker in a privileged network position may be able to bypass HSTS for a limited number of specific top-level domains previously not in the HSTS preload list.

πŸ“– Read

via "National Vulnerability Database".
19:40
β€Ό CVE-2019-8638 β€Ό

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:40
β€Ό CVE-2020-3864 β€Ό

A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2019-8708 β€Ό

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15, iOS 13. A local user may be able to check for the existence of arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2019-8853 β€Ό

A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. An application may be able to read restricted memory.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2019-8612 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, tvOS 12.3, watchOS 5.2.1, macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3. An attacker in a privileged network position can modify driver state.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2019-8736 β€Ό

An input validation issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. An attacker in a privileged network position may be able to leak sensitive user information.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2019-8570 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in iOS 12.1.3, iCloud for Windows 7.10, iTunes 12.9.3 for Windows, Safari 12.0.3, tvOS 12.1.2. Processing maliciously crafted web content may disclose sensitive user information.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2018-4428 β€Ό

A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 12.1.1. A local attacker may be able to share items from the lock screen.

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2020-27891 β€Ό

The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Read Reporting Configuration Response message. It crashes in zclHandleExternal().

πŸ“– Read

via "National Vulnerability Database".
19:41
β€Ό CVE-2019-8841 β€Ό

An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.3 and iPadOS 13.3. An application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
19:43
β€Ό CVE-2020-9774 β€Ό

An issue existed with Siri Suggestions access to encrypted data. The issue was fixed by limiting access to encrypted data. This issue is fixed in macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra. Encrypted data may be inappropriately accessed.

πŸ“– Read

via "National Vulnerability Database".
19:43
β€Ό CVE-2020-9979 β€Ό

A trust issue was addressed by removing a legacy API. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0. An attacker may be able to misuse a trust relationship to download malicious content.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8799 β€Ό

This issue was resolved by replacing device names with a random identifier. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15, watchOS 6, tvOS 13. An attacker in physical proximity may be able to passively observe device names in AWDL communications.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8578 β€Ό

A use after free issue was addressed with improved memory management. This issue is fixed in AirPort Base Station Firmware Update 7.8.1, AirPort Base Station Firmware Update 7.9.1. A remote attacker may be able to cause arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8854 β€Ό

A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in macOS Catalina 10.15, watchOS 6, iOS 13, tvOS 13. A device may be passively tracked by its Wi-Fi MAC address.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8824 β€Ό

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. An application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8728 β€Ό

Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, Safari 13, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8831 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6. An application may be able to execute arbitrary code with system privileges.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2018-4296 β€Ό

This issue is fixed in macOS Mojave 10.14. A permissions issue existed in DiskArbitration. This was addressed with additional ownership checks.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8539 β€Ό

A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. A malicious application may be able to execute arbitrary code with system privileges.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2020-27160 β€Ό

Addressed remote code execution vulnerability in AvailableApps.php that allowed escalation of privileges in Western Digital My Cloud NAS devices prior to 5.04.114 (issue 3 of 3).

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8749 β€Ό

Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iTunes 12.10.1 for Windows. Multiple issues in libxml2.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8771 β€Ό

This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2020-9866 β€Ό

A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. A buffer overflow may result in arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8850 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6. Processing a maliciously crafted audio file may disclose restricted memory.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8746 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15, iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, tvOS 13, macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, watchOS 6, iTunes 12.10.1 for Windows. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2020-9932 β€Ό

A memory corruption issue was addressed with improved validation. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, tvOS 13. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2018-4433 β€Ό

A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, watchOS 5, iOS 12, tvOS 12, macOS Mojave 10.14. A malicious application may be able to modify protected parts of the file system.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2018-4339 β€Ό

This issue was addressed with a new entitlement. This issue is fixed in iOS 12.1. A local user may be able to read a persistent device identifier.

πŸ“– Read

via "National Vulnerability Database".
19:44
β€Ό CVE-2019-8858 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. A user who shares their screen may not be able to end screen sharing.

πŸ“– Read

via "National Vulnerability Database".
19:47
β€Ό CVE-2020-9941 β€Ό

This issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. A remote attacker may be able to unexpectedly alter application state.

πŸ“– Read

via "National Vulnerability Database".
19:47
β€Ό CVE-2020-9782 β€Ό

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. A remote attacker may be able to overwrite existing files.

πŸ“– Read

via "National Vulnerability Database".
19:47
β€Ό CVE-2020-25765 β€Ό

Addressed remote code execution vulnerability in reg_device.php due to insufficient validation of user input.in Western Digital My Cloud Devices prior to 5.4.1140.

πŸ“– Read

via "National Vulnerability Database".
19:47
β€Ό CVE-2019-8715 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15, iOS 13. An application may be able to execute arbitrary code with system privileges.

πŸ“– Read

via "National Vulnerability Database".
19:57
πŸ•΄ Survey Uncovers High Level of Concern Over Firewalls πŸ•΄

More than half of respondents are planning to reduce their network firewall footprint because of what they see as limitations in the technology.

πŸ“– Read

via "Dark Reading".
?
21:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-16140 β€Ό

The search functionality of the Greenmart theme 2.4.2 for WordPress is vulnerable to XSS.

πŸ“– Read

via "National Vulnerability Database".
28 October 2020
?
02:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27957 β€Ό

The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.

πŸ“– Read

via "National Vulnerability Database".
02:30
β€Ό CVE-2020-27956 β€Ό

An Arbitrary File Upload in the Upload Image component in SourceCodester Car Rental Management System 1.0 allows the user to conduct remote code execution via admin/index.php?page=manage_car because .php files can be uploaded to admin/assets/uploads/ (under the web root).

πŸ“– Read

via "National Vulnerability Database".
?
08:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Security firm identifies 5 biggest cybersecurity risks for hospitals and healthcare organizations 🦿

Wandera finds malicious network traffic and configuration vulnerabilities on mobile devices as popular entry points for cybercriminals.

πŸ“– Read

via "Tech Republic".
?
08:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Trump Campaign Website Defaced by Cryptocurrency Scam ❌

Hackers claim to have access to classified information linking the president to the origin of the coronavirus and criminal collusion with foreign actors.

πŸ“– Read

via "Threat Post".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Experts Weigh in on E-Commerce Security Amid Snowballing Threats ❌

How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike.

πŸ“– Read

via "Threat Post".
?
09:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5145 β€Ό

SonicWall Global VPN client version 4.10.4.0314 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to remote code execution in the target system.

πŸ“– Read

via "National Vulnerability Database".
09:43
❌ North Korea-Backed Spy Group Poses as Reporters in Spearphishing Attacks, Feds Warn ❌

The Kimsuky/Hidden Cobra APT is going after the commercial sector, according to CISA.

πŸ“– Read

via "Threat Post".
?
10:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote ❌

With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications.

πŸ“– Read

via "Threat Post".
?
11:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Physical Security Has a Lot of Catching Up to Do πŸ•΄

The transformation we need: merging the network operations center with the physical security operations center.

πŸ“– Read

via "Dark Reading".
11:31
β€Ό CVE-2020-8240 β€Ό

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.

πŸ“– Read

via "National Vulnerability Database".
11:31
β€Ό CVE-2020-8261 β€Ό

A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.

πŸ“– Read

via "National Vulnerability Database".
11:31
β€Ό CVE-2020-8239 β€Ό

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.

πŸ“– Read

via "National Vulnerability Database".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iran-linked APT Targets T20 Summit, Munich Security Conference Attendees ❌

The Phosphorous APT has launched successful attacks against world leaders who are attending the Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia, Microsoft warns.

πŸ“– Read

via "Threat Post".
?
13:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27978 β€Ό

Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session.

πŸ“– Read

via "National Vulnerability Database".
?
13:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Trump Campaign Website Defaced by Unknown Attackers πŸ•΄

Individuals behind the brief Tuesday night incident posted anti-Trump sentiments and appeared to solicit cryptocurrency.

πŸ“– Read

via "Dark Reading".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Russian Espionage Group Updates Custom Malware Suite ❌

Turla has outfitted a trio of backdoors with new C2 tricks and increased interop, as seen in an attack on a European government.

πŸ“– Read

via "Threat Post".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rethinking Security for the Next Normal -- Under Pressure πŸ•΄

By making a commitment to a unified approach to security, then doing what's necessary to operationalize it, organizations can establish a better security model for the next normal.

πŸ“– Read

via "Dark Reading".
15:32
β€Ό CVE-2020-15278 β€Ό

Red Discord Bot before version 3.4.1 has an unauthorized privilege escalation exploit in the Mod module. This exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it is possible to perform destructive actions within the guild the user has high privileges in. This exploit has been fixed in version 3.4.1. As a workaround, unloading the Mod module with unload mod or, disabling the massban command with command disable global massban can render this exploit not accessible. We still highly recommend updating to 3.4.1 to completely patch this issue.

πŸ“– Read

via "National Vulnerability Database".
15:32
β€Ό CVE-2020-4782 β€Ό

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.

πŸ“– Read

via "National Vulnerability Database".
15:35
πŸ” Insider Threats Poised to Increase in 2021 πŸ”

Forrester, citing the persistence of remote work, predicts that internal incidents will be responsible for 33% of breaches in 2021.

πŸ“– Read

via "Digital Guardian".
?
15:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Ways Passwords Fail Basic Security Tests πŸ•΄

New data shows humans still struggle with password creation and management.

πŸ“– Read

via "Dark Reading".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-16262 β€Ό

Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
17:32
β€Ό CVE-2020-26132 β€Ό

An issue was discovered in Home DNS Server 0.10. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the HomeDNSServer.exe binary.

πŸ“– Read

via "National Vulnerability Database".
17:43
❌ β€˜Copyright Violation’ Notices Lead to Facebook 2FA Bypass ❌

Fraudulent Facebook messages allege copyright infringement and threaten to take down pages, unless users enter logins, passwords and 2FA codes.

πŸ“– Read

via "Threat Post".
?
18:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Government Issues Warning on Kimsuky APT Group πŸ•΄

The joint alert, from CISA, the FBI, and others, describes activities from the North Korean advanced persistent threat group.

πŸ“– Read

via "Dark Reading".
18:28
🦿 Don't wait for a breach before implementing cybersecurity, expert says 🦿

Professor who specializes in security says we often treat a breach like a home break-in, adding security after the theft. More students are choosing security as a career, she adds.

πŸ“– Read

via "Tech Republic".
?
19:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ More Hospitals Hit by Growing Wave of Ransomware Attacks ❌

Hospitals in New York and Oregon were targeted on Tuesday by threat actors who crippled systems and forced ambulances with sick patients to be rerouted, in some cases.

πŸ“– Read

via "Threat Post".
19:28
πŸ•΄ Breaking the Glass Ceiling: Tough for Women, Tougher for Women of Color πŸ•΄

Security practitioners shed light on obstacles limiting career growth and the steps businesses can take to achieve their promises of a more diverse workforce.

πŸ“– Read

via "Dark Reading".
19:33
β€Ό CVE-2020-24712 β€Ό

Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the IMAP Host field on the account settings page.

πŸ“– Read

via "National Vulnerability Database".
19:33
β€Ό CVE-2020-24711 β€Ό

The Reset button on the Account Settings page in Gophish before 0.11.0 allows attackers to cause a denial of service via a clickjacking attack

πŸ“– Read

via "National Vulnerability Database".
19:33
β€Ό CVE-2020-24708 β€Ό

Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form.

πŸ“– Read

via "National Vulnerability Database".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27986 β€Ό

** DISPUTED ** SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, SVN, and GitLab credentials via the api/settings/values URI. NOTE: reportedly, the vendor's position is "it is the administrator's responsibility to configure it."

πŸ“– Read

via "National Vulnerability Database".
29 October 2020
?
02:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-11487 β€Ό

NVIDIA DGX servers, DGX-1 with BMC firmware versions prior to 3.38.30. DGX-2 with BMC firmware versions prior to 1.06.06 and all DGX A100 Servers with all BMC firmware versions, contains a vulnerability in the AMI BMC firmware in which the use of a hard-coded RSA 1024 key with weak ciphers may lead to information disclosure.

πŸ“– Read

via "National Vulnerability Database".
02:33
β€Ό CVE-2020-11488 β€Ό

NVIDIA DGX servers, all DGX-1 with BMC firmware versions prior to 3.38.30 and all DGX-2 with BMC firmware versions prior to 1.06.06, contains a vulnerability in the AMI BMC firmware in which software does not validate the RSA 1024 public key used to verify the firmware signature, which may lead to information disclosure or code execution.

πŸ“– Read

via "National Vulnerability Database".
?
07:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Xfinity, McAfee Brands Abused by Parked Domains in Active Campaigns ❌

Malicious redirection websites are using typosquatting and impersonation to attack unwary visitors.

πŸ“– Read

via "Threat Post".
07:33
β€Ό CVE-2020-27655 β€Ό

Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic.

πŸ“– Read

via "National Vulnerability Database".
07:33
β€Ό CVE-2020-7746 β€Ό

This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.

πŸ“– Read

via "National Vulnerability Database".
?
10:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Bug-Bounty Awards Spike 26% in 2020 ❌

The most-rewarded flaw is XSS, which is among those that are relatively cheap for organizations to identify.

πŸ“– Read

via "Threat Post".
10:58
🦿 How phishing attacks are targeting schools and colleges 🦿

Attackers are exploiting the need for schools to receive critical updates from teachers, principals, and department heads, says Barracuda.

πŸ“– Read

via "Tech Republic".
11:05
πŸ” Digital Guardian Debuts Exclusive Offer for Forcepoint DLP Customers πŸ”

With news the company will be acquired, Forcepoint DLP customers may be looking for a change.

πŸ“– Read

via "Digital Guardian".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is Your Encryption Ready for Quantum Threats? πŸ•΄

Answers to these five questions will help security teams defend against attackers in the post-quantum computing era.

πŸ“– Read

via "Dark Reading".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oracle WebLogic Server RCE Flaw Under Active Attack ❌

The flaw in the console component of the WebLogic Server, CVE-2020-14882, is under active attack, researchers warn.

πŸ“– Read

via "Threat Post".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 FBI: Hospitals and healthcare providers face imminent ransomware threat 🦿

The FBI warns of a threat against the healthcare sector from Ryuk ransomware, and one that's already affected some hospitals.

πŸ“– Read

via "Tech Republic".
12:44
❌ Home Depot Confirms Data Breach in Order Confirmation SNAFU ❌

Hundreds of emailed order confirmations for random strangers were sent to Canadian customers, each containing personal information.

πŸ“– Read

via "Threat Post".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Increase Voter Turnout & Reduce Fraud πŸ•΄

Digital identity verification has advanced, both technologically and legislatively. Is it the answer to simpler, safer voting?

πŸ“– Read

via "Dark Reading".
?
14:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Buer Loader β€œmalware-as-a-service” joins Emotet for ransomware delivery ⚠

A relative newcomer in the "malware-as-a-service" scene is starting to attract the big-money ransomware criminals.

πŸ“– Read

via "Naked Security".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercriminals Aim BEC Attacks at Education Industry πŸ•΄

Heightened vulnerability comes at a time when the sector has been focusing on setting up a remote workforce and online learning amid the pandemic.

πŸ“– Read

via "Dark Reading".
?
14:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Defense, Not Offense, Will Determine Global Cyber Powers πŸ•΄

Darktrace director of strategic threat Marcus Fowlers explains what to expect from nation-state attackers in the months to come -- and why kindergarten classes are a good model for solid cybersecurity.

πŸ“– Read

via "Dark Reading".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Healthcare Organizations Can Combat Ransomware πŸ•΄

The days of healthcare organizations relying solely on endpoint security software to stop attacks are over. Here are six ways that healthcare providers can fight the ever-present threat.

πŸ“– Read

via "Dark Reading".
15:28
🦿 Business Email Compromise attacks are on the rise 🦿

BEC campaigns continue to shift their targets from C-suite executives and finance employees to group mailboxes, says Abnormal Security.

πŸ“– Read

via "Tech Republic".
?
15:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware Wave Targets US Hospitals: What We Know So Far πŸ•΄

A joint advisory from the CSIA, FBI, and HHS warns of an "increased and imminent" threat to US hospitals and healthcare providers.

πŸ“– Read

via "Dark Reading".
?
16:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hackers Make Off With Millions From Wisconsin Republicans πŸ•΄

According to the Wisconsin Republican Party, thieves used altered invoices to make off with $2.3 million in election funds.

πŸ“– Read

via "Dark Reading".
16:58
🦿 How to install the FreeIPA identity and authorization solution on CentOS 8 🦿

Jack Wallen walks you through the process of installing an identity and authorization platform on CentOS 8.

πŸ“– Read

via "Tech Republic".
?
17:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ REvil Gang Promises a Big Video-Game Hit; Claims Massive Revenue ❌

In a wide-ranging interview, a REvil leader said the gang is earning $100 million per year, and provided insights into the life of a cybercriminal.

πŸ“– Read

via "Threat Post".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ University Email Hijacking Attacks Push Phishing, Malware ❌

Attackers are compromising email accounts from popular universities, including Purdue and Oxford, to launch attacks that get around DMARC and SPF.

πŸ“– Read

via "Threat Post".
18:29
🦿 Government should make cybersecurity policy a priority 🦿

Professor and cybersecurity policy expert says it should be something that is already in place with each purchase or subscription.

πŸ“– Read

via "Tech Republic".
?
18:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Kegtap, Singlemalt, Winekey Malware Serve Up Ransomware to Hospitals ❌

Amid an uptick in attacks on healthcare orgs, malware families, Kegtap, Singlemalt and Winekey are being used to deliver the Ryuk ransomware to already strained systems.

πŸ“– Read

via "Threat Post".
18:58
πŸ•΄ McAfee Launches XDR, Browser Isolation, Cloud App Security Tools πŸ•΄

New additions are built to help organizations better respond to threats and protect applications and data in the cloud.

πŸ“– Read

via "Dark Reading".
?
19:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ First the Good News: Number of Breaches Down 51% Year Over Year πŸ•΄

But the number of records put at risk experiences a massive increase. Here's why.

πŸ“– Read

via "Dark Reading".
19:58
🦿 Cybersecurity policy is a must in government 🦿

One policy expert says cybersecurity measures should be an expected item that comes with every purchase, like the safety measures in your car.

πŸ“– Read

via "Tech Republic".
?
20:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FBI β€œransomware warning” for healthcare is a warning for everyone! ⚠

The US government has warned of a ransomware escalation against the healthcare sector. BUT THAT DOESN'T MEAN THE REST OF US CAN RELAX!

πŸ“– Read

via "Naked Security".
20:44
❌ NVIDIA Patches Critical Bug in High-Performance Servers ❌

NVIDIA said a high-severity information-disclosure bug impacting its DGX A100 server line wouldn't be patched until early 2021.

πŸ“– Read

via "Threat Post".
30 October 2020
?
07:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SANS Launches New CyberStart Program for All High School Students πŸ•΄

Free program lets students solve real-world security problems - and learn about cybersecurity.

πŸ“– Read

via "Dark Reading".
?
08:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Warns Threat Actors Continue to Exploit Zerologon Bug ❌

Tech giant and feds this week renewed their urge to organizations to update Active Directory domain controllers.

πŸ“– Read

via "Threat Post".
?
11:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
11:03
⚠ S3 Ep4: Now THAT’S what I call a fire alarm! [Podcast] ⚠

Listen to the Naked Security podcast!

πŸ“– Read

via "Naked Security".
?
11:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Public Safety & Cybersecurity Concerns Elevate Need for a Converged Approach πŸ•΄

As public and private spaces are opening up, the need for a converged approach to cybersecurity and physical security is essential, as is integration with health measures and tech.

πŸ“– Read

via "Dark Reading".
?
13:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 10/30 πŸ”

Credible ransomware threats against hospitals, data breaches at a Finnish psychotherapy center, and Forrester predictions - catch up on all the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
?
13:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ JavaScript Obfuscation Moves to Phishing Emails πŸ•΄

Attackers are hiding malicious payloads in phishing emails via a technique traditionally used to hide malicious code planted on websites.

πŸ“– Read

via "Dark Reading".
13:30
πŸ•΄ Microsoft Warns of Ongoing Attacks Exploiting Zerologon πŸ•΄

The vulnerability, patched in August, has been weaponized by APT groups and prompted CISA to issue a security alert.

πŸ“– Read

via "Dark Reading".
13:34
⚠ Adobe Flash – it’s the end of the end of the end of the road at last ⚠

The journey to the end of Flash. Are we there yet?

πŸ“– Read

via "Naked Security".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 AWS releases Nitro Enclaves, making it easier to process highly sensitive data 🦿

According to Amazon, Nitro Enclaves will help customers reduce attack surfaces for their applications by providing a highly isolated and hardened environment for data processing.

πŸ“– Read

via "Tech Republic".
?
15:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wroba Mobile Banking Trojan Spreads to the U.S. via Texts ❌

The Roaming Mantis group is targeting the States with a malware that can steal information, harvest financial data and send texts to self-propagate.

πŸ“– Read

via "Threat Post".
15:45
❌ Halloween News Wrap: The Election, Hospital Deaths and Other Scary Cyberattack Stories ❌

Threatpost breaks down the scariest stories of the week ended Oct. 30 haunting the security industry -- including bugs that just won't die.

πŸ“– Read

via "Threat Post".
?
17:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Wisc. GOP’s $2.3M MAGA Hat Debacle Showcases Fraud Concerns ❌

Scammers bilked Wisconsin Republicans out of $2.3 million in a basic BEC scam β€” and anyone working on the upcoming election needs to pay attention.Β  Β 

πŸ“– Read

via "Threat Post".
?
17:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Wroba Campaign Is Latest Sign of Growing Mobile Threats πŸ•΄

After years of mostly targeting users in Japan, Korea, and other countries in the region, operators of the Trojan expanded their campaign to the US this week.

πŸ“– Read

via "Dark Reading".
17:45
❌ Firestarter Android Malware Abuses Google Firebase Cloud Messaging ❌

The DoNot APT threat group is leveraging the legitimate Google Firebase Cloud Messaging server as a command-and-control (C2) communication mechanism.

πŸ“– Read

via "Threat Post".
17:55
πŸ›  Wireshark Analyzer 3.4.0 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
?
18:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Patches 3-Year-Old High-Severity RCE Bug ❌

In all, WordPress patched 10 security bugs as part of the release of version 5.5.2 of its web publishing software.

πŸ“– Read

via "Threat Post".
?
19:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Crippling Cyberattacks, Disinformation Top Concerns for Election Day ❌

Cyber-researchers weigh in on what concerns them the most as the U.S. heads into the final weekend before the presidential election -- and they also highlight the positives.

πŸ“– Read

via "Threat Post".
31 October 2020
?
10:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rising Ransomware Breaches Underscore Cybersecurity Failures πŸ•΄

Ransomware's continued success speaks volumes about what's at stake for businesses and people, and, perhaps, the cybersecurity industry's inability to adapt quickly enough to protect everyone.

πŸ“– Read

via "Dark Reading".
1 November 2020
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7373 β€Ό

vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
09:37
β€Ό CVE-2020-5934 β€Ό

On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted.

πŸ“– Read

via "National Vulnerability Database".
09:37
β€Ό CVE-2020-27886 β€Ό

An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php).

πŸ“– Read

via "National Vulnerability Database".
09:43
β€Ό CVE-2020-15703 β€Ό

There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

πŸ“– Read

via "National Vulnerability Database".
09:43
β€Ό CVE-2020-5933 β€Ό

On versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, when a BIG-IP system that has a virtual server configured with an HTTP compression profile processes compressed HTTP message payloads that require deflation, a Slowloris-style attack can trigger an out-of-memory condition on the BIG-IP system.

πŸ“– Read

via "National Vulnerability Database".
09:43
β€Ό CVE-2020-5932 β€Ό

On BIG-IP ASM 15.1.0-15.1.0.5, a cross-site scripting (XSS) vulnerability exists in the BIG-IP ASM Configuration utility response and blocking pages. An authenticated user with administrative privileges can specify a response page with any content, including JavaScript code that will be executed when preview is opened.

πŸ“– Read

via "National Vulnerability Database".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25849 β€Ό

MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the userΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’s access token.

πŸ“– Read

via "National Vulnerability Database".
2 November 2020
?
08:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Adobe Flash – it’s the end of the end of the end of the road at last ⚠

The journey to the end of Flash. Are we there yet?

πŸ“– Read

via "Naked Security".
08:06
⚠ Naked Security Live – Ransomware: what to do? ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
?
08:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-3657 β€Ό

u'Remote code execution can happen by sending a carefully crafted POST query when Device configuration is accessed from a tethered client through webserver due to lack of array bound check.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6574AU, QCS405, QCS610, QRB5165, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8250

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2020-3684 β€Ό

u'QSEE reads the access permission policy for the SMEM TOC partition from the SMEM TOC contents populated by XBL Loader and applies them without validation' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8098, Bitra, IPQ6018, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8998, Nicobar, QCA6390, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2020-3638 β€Ό

u'An Unaligned address or size can propagate to the database due to improper page permissions and can lead to improper access control' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Agatti, Bitra, Kamorta, QCA6390, QCS404, QCS610, Rennell, SA515M, SC7180, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2020-11174 β€Ό

u'Array index underflow issue in adsp driver due to improper check of channel id before used as array index.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ4019, IPQ5018, IPQ6018, IPQ8064, IPQ8074, Kamorta, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6390, QCA9531, QCM2150, QCS404, QCS405, QCS605, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM8150, SM8250, SXR1130, SXR2130

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2020-3693 β€Ό

u'Use out of range pointer issue can occur due to incorrect buffer range check during the execution of qseecom.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8098, Bitra, MSM8909W, MSM8996AU, Nicobar, QCM2150, QCS605, Saipan, SDM429W, SDX20, SM6150, SM8150, SM8250, SXR2130

πŸ“– Read

via "National Vulnerability Database".
?
11:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ As Businesses Go Remote, Hackers Find New Security Gaps πŸ•΄

Improper access control, information disclosure, and SSRF are among the most impactful, and most awarded, security flaws found this year.

πŸ“– Read

via "Dark Reading".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Can I Help Remote Workers Secure Their Home Routers? πŸ•΄

The most effective way is with employee security education.

πŸ“– Read

via "Dark Reading".
12:17
❌ Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape ❌

Google Project Zero disclosed the bug before a patch becomes available from Microsoft.

πŸ“– Read

via "Threat Post".
?
13:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Fraud Prevention Strategies to Prepare for the Future πŸ•΄

While companies have largely adjusted to the new normal for security management, here are some tips for combatting fraud, post-COVID.

πŸ“– Read

via "Dark Reading".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Scammers Abuse Google Drive to Send Malicious Links ❌

Cybercriminals are sending malicious links to hundreds of thousands of users via Google Drive notifications.

πŸ“– Read

via "Threat Post".
?
14:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Texas Gold-Dealer Mined for Payment Details in Months-Long Data Breach ❌

JM Bullion fell victim to a payment-card skimmer, which was in place for five months.

πŸ“– Read

via "Threat Post".
14:30
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.11 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
14:30
πŸ›  Samhain File Integrity Checker 4.4.3 πŸ› 

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

πŸ“– Read

via "Packet Storm Security".
14:31
🦿 It's an urgent plea this Election Eve: Don't click on ransomware disguised as political ads 🦿

Remote work and social media have made it easier for businesses to be impacted by security breaches. Here's why, and how organizations can protect themselves.

πŸ“– Read

via "Tech Republic".
14:38
β€Ό CVE-2018-19951 β€Ό

If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11.

πŸ“– Read

via "National Vulnerability Database".
14:38
β€Ό CVE-2018-19955 β€Ό

The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10.

πŸ“– Read

via "National Vulnerability Database".
14:47
❌ WordPress Pushes Out Multiple Flawed Security Updates ❌

WordPress bungles critical security 5.5.2 fix and saves face next day with 5.5.3 update.

πŸ“– Read

via "Threat Post".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Digital Guardian Provides Customers Protection Following Spread of Ryuk Ransomware πŸ”

We’ve released a free policy pack to help customers, especially those in the healthcare and public health sector, protect against the latest Ryuk ransomware campaign.

πŸ“– Read

via "Digital Guardian".
?
16:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Windows Zero-Day Used with Chrome Flaw in Targeted Attacks πŸ•΄

Google's Project Zero has disclosed a Windows kernel zero-day vulnerability being used with a known Chrome bug in targeted attacks.

πŸ“– Read

via "Dark Reading".
?
17:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Survey: Cybersecurity Skills Shortage is β€˜Bad,’ But There’s Hope ❌

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave.

πŸ“– Read

via "Threat Post".
?
17:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ $100M Botnet Scheme Lands Cybercriminal 8 Years in Jail ❌

Aleksandr Brovko faces jail time after stealing $100 million worth of personal identifiable information (PII) and financial data over the course of more than 10 years.

πŸ“– Read

via "Threat Post".
?
18:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian National Sentenced to 8 Years in Prison for Role in Botnet Operation πŸ•΄

Cybercrime scheme netted more than $100 million.

πŸ“– Read

via "Dark Reading".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Hackers have only just wet their whistle. Expect more ransomware and data breaches in 2021. 🦿

The COVID-19 pandemic provided a huge opening for bad actors this year, thanks to remote work. Security experts expect more advanced cybersecurity threats in the coming year.

πŸ“– Read

via "Tech Republic".
19:34
πŸ•΄ New Tools Make North Korea's Kimsuky Group More Dangerous πŸ•΄

Threat actor actively targeting US organizations in global intelligence-gathering campaign, government says.

πŸ“– Read

via "Dark Reading".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26939 β€Ό

In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-27982 β€Ό

IceWarp 11.4.5.0 allows XSS via the language parameter.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-7758 β€Ό

This affects all versions of package browserless-chrome. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-9368 β€Ό

The Module Olea Gift On Order module through 5.0.8 for PrestaShop enables an unauthenticated user to read arbitrary files on the server via getfile.php?file=/.. directory traversal.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-8183 β€Ό

A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-6014 β€Ό

Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.

πŸ“– Read

via "National Vulnerability Database".
?
21:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft & Others Catalog Threats to Machine Learning Systems πŸ•΄

Thirteen organizations worked together to create a dictionary of techniques used to attack ML models and warn that such malicious efforts will become more common.

πŸ“– Read

via "Dark Reading".
?
21:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ California's Prop. 24 Splits Privacy Advocates πŸ•΄

Critics worry that the curatives in Prop. 24 are worse than the disease of privacy-rights violations.

πŸ“– Read

via "Dark Reading".
?
22:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-9861 β€Ό

A stack overflow issue existed in Swift for Linux. The issue was addressed with improved input validation for dealing with deeply nested malicious JSON input.

πŸ“– Read

via "National Vulnerability Database".
3 November 2020
?
03:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-16001 β€Ό

Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
03:39
β€Ό CVE-2020-15973 β€Ό

Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.

πŸ“– Read

via "National Vulnerability Database".
03:45
β€Ό CVE-2020-16007 β€Ό

Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.

πŸ“– Read

via "National Vulnerability Database".
03:45
β€Ό CVE-2020-15987 β€Ό

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.

πŸ“– Read

via "National Vulnerability Database".
03:46
β€Ό CVE-2020-16010 β€Ό

Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
03:46
β€Ό CVE-2020-6557 β€Ό

Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
?
09:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Cybersecurity Lessons From 2020 πŸ•΄

The COVID-19 pandemic exposed new weaknesses in enterprise cybersecurity preparedness.

πŸ“– Read

via "Dark Reading".
?
11:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Oracle Rushes Emergency Fix for Critical WebLogic Server Flaw ❌

The remote code-execution flaw (CVE-2020-14750) is low-complexity and requires no user interaction to exploit.

πŸ“– Read

via "Threat Post".
?
12:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 It's an urgent plea this Election Day: Don't click on ransomware disguised as political ads 🦿

Remote work and social media have made it easier for businesses to be impacted by security breaches. Here's why, and how organizations can protect themselves.

πŸ“– Read

via "Tech Republic".
?
12:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Reworking the Taxonomy for Richer Risk Assessments πŸ•΄

By accommodating unique requirements and conditions at different sites, security pros can dig deeper get a clearer sense of organizational risk.

πŸ“– Read

via "Dark Reading".
?
12:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4649 β€Ό

IBM Planning Analytics Local 2.0.9.2 and IBM Planning Analytics Workspace 57 could expose data to non-privleged users by not invalidating TM1Web user sessions. IBM X-Force ID: 186022.

πŸ“– Read

via "National Vulnerability Database".
?
13:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Media Comms Giant Says Ransomware Hit Will Cost Millions ❌

Aussie firm Isentia said "remediation and foregone revenue" could total $8.5 million AUS or more.

πŸ“– Read

via "Threat Post".
?
13:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time πŸ•΄

This year has been the ultimate test of business resilience, and if anything has become clear, it's this: Security pros need to get to work and overhaul their playbooks in preparation for multilayered attacks.

πŸ“– Read

via "Dark Reading".
?
14:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Two Chrome Browser Updates Plugs Holes Actively Targeted by Exploits ❌

Patches for both the Chrome desktop and Android browser address high-severity flaws with known exploits available in the wild.

πŸ“– Read

via "Threat Post".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is SOC 2? πŸ”

SOC 2 is a set of compliance requirements for companies that use cloud-based storage of customer data. Learn about the basics of SOC 2 and best practices in this week's Data Protection 101!

πŸ“– Read

via "Digital Guardian".
?
16:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Oracle Issues Out-of-Band Update for Remote-Access Vulnerability πŸ•΄

The exploit could give an attacker complete control of vulnerable WebLogic servers.

πŸ“– Read

via "Dark Reading".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 34M Records from 17 Companies Up for Sale in Cybercrime Forum ❌

A diverse set of companies, including an adaptive-learning platform in Brazil, an online grocery service in Singapore and a cold-brew coffee-maker company, are caught up in the large data trove.

πŸ“– Read

via "Threat Post".
16:34
πŸ•΄ Neustar Agrees to Buy Verisign's Public DNS Service πŸ•΄

The address space for Verisign Public DNS will be incorporated into Neustar's UltraDNS Public service following the acquisition.

πŸ“– Read

via "Dark Reading".
16:48
❌ APT Groups Finding Success with Mix of Old and New Tools ❌

The APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, largely supercharged by geo-politics, a report finds.

πŸ“– Read

via "Threat Post".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to use the limited photos picker in iOS 14 for added privacy 🦿

Ensure apps can only access the photos and albums that you designate by using the new limited photos picker in iOS 14.

πŸ“– Read

via "Tech Republic".
18:40
β€Ό CVE-2020-1908 β€Ό

Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2020-1909 β€Ό

A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.

πŸ“– Read

via "National Vulnerability Database".
18:48
❌ Oracle Solaris Zero-Day Attack Revealed ❌

A threat actor is compromising telecommunications companies and targeted financial and professional consulting industries using an Oracle flaw.

πŸ“– Read

via "Threat Post".
?
19:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 WinZip Mac 8 Pro: Create backups and encrypt sensitive files 🦿

Mac users can do more than just compress files using WinZip Mac 8 Pro. The program also assists with creating backups and encrypting sensitive files, among other features.

πŸ“– Read

via "Tech Republic".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ APT Groups Get Innovative -- and More Dangerous -- in 3Q πŸ•΄

In "curious" trend, more threat actors diversified their tool sets in third quarter than usual.

πŸ“– Read

via "Dark Reading".
20:40
β€Ό CVE-2020-26211 β€Ό

In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a particular meta tag which could be used to silently redirect users to a alternative location upon visit of a page. Dangerous content may remain in the database but will be removed before being displayed on a page. If you think this could have been exploited the linked advisory provides a SQL query to test. As a workaround without upgrading, page edit permissions could be limited to only those that are trusted until you can upgrade although this will not address existing exploitation of this vulnerability. The issue is fixed in BookStack version 0.30.4.

πŸ“– Read

via "National Vulnerability Database".
?
21:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Securing the 2020 Election: 'We're Not Out of the Woods Yet' πŸ•΄

Election Day brought instances of misinformation, robocalls, and technical glitches, but officials are more worried about coming days and weeks.

πŸ“– Read

via "Dark Reading".
4 November 2020
?
03:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27346 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
11:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Police to Livestream Ring Camera Footage of Mississippi Residents ❌

Pilot program again sparks privacy fears from ACLU as Amazon takes its partnership with law enforcement to the next level.

πŸ“– Read

via "Threat Post".
11:22
⚠ Another Chrome zero-day, this time on Android – check your version! ⚠

Another week, another Chrome zero-day, this time on your phone.

πŸ“– Read

via "Naked Security".
11:22
❌ Code42 Incydr Series: Why Most Companies Can’t Stop Departing Employee Data Theft ❌

According to Code42’s Data Exposure Report, 63% of employees say they brought data with them from their previous employer to their current employer.

πŸ“– Read

via "Threat Post".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CSA Moves to Redefine Cloud-Based Intelligence πŸ•΄

The new paradigm seeks to understand, integrate, and automate data workflows, and better yet, doesn't require significant investment or more personnel.

πŸ“– Read

via "Dark Reading".
?
13:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 10.6m πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ VMware Issues Updated Fix For Critical ESXi Flaw ❌

A previous fix for the critical remote code execution bug was "incomplete," according to VMware.

πŸ“– Read

via "Threat Post".
?
13:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Toymaker Mattel Hit by Ransomware Attack ❌

Financial disclosure filings describe a ransomware attack that delivered a weak punch.

πŸ“– Read

via "Threat Post".
14:06
πŸ•΄ Containers for Data Analysis Are Rife With Vulnerabilities πŸ•΄

Old software components and the inclusion of unnecessary code created a massive attack surface area in containers for scientific analysis, researchers say.

πŸ“– Read

via "Dark Reading".
?
14:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-2314 β€Ό

Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

πŸ“– Read

via "National Vulnerability Database".
?
16:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Prepare for the Unexpected: Costs to Consider in Security Budgets πŸ•΄

Organizations that update business models to include cybersecurity as part of a strategic planning process may be able to better withstand unexpected disruptions.

πŸ“– Read

via "Dark Reading".
16:41
πŸ” Logistics Firm Claims Former Exec Took Secrets to Start New Firm πŸ”

This US logistics company claims a former board member stole company secrets to set up his own competitor.

πŸ“– Read

via "Digital Guardian".
16:44
β€Ό CVE-2020-22274 β€Ό

JomSocial (Joomla Social Network Extention) 4.7.6 allows CSV injection via a customer's profile.

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-22273 β€Ό

Neoflex Video Subscription System Version 2.0 is affected by CSRF which allows the Website's Settings to be changed (such as Payment Settings)

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-22276 β€Ό

WeForms Wordpress Plugin 1.4.7 allows CSV injection via a form's entry.

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-22278 β€Ό

phpMyAdmin through 5.0.2 allows CSV injection via Export Section

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-22275 β€Ό

Easy Registration Forms (ER Forms) Wordpress Plugin 2.0.6 allows an attacker to submit an entry with malicious CSV commands. After that, when the system administrator generates CSV output from the forms information, there is no check on this inputs and the codes are executable.

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-8036 β€Ό

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.

πŸ“– Read

via "National Vulnerability Database".
?
17:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Hexagon Announces Deal to Acquire PAS Global πŸ•΄

The Houston-based PAS Global will operate as part of Hexagon's PPM (formerly Intergraph Process, Power & Marine) division.

πŸ“– Read

via "Dark Reading".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 What's happening today: The election and online spending 🦿

As Americans anxiously await clarity regarding final voting counts and results of yesterday's election, a new report found 26% of US consumers correlate who will win with how much they'll spend.

πŸ“– Read

via "Tech Republic".
?
18:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7128 β€Ό

A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.

πŸ“– Read

via "National Vulnerability Database".
18:42
β€Ό CVE-2020-28049 β€Ό

An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.

πŸ“– Read

via "National Vulnerability Database".
18:53
❌ Google Forms Abused to Phish AT&T Credentials ❌

More than 200 Google Forms impersonate top brands - including Microsoft OneDrive, Office 365, and Wells Fargo - to steal victims' credentials.

πŸ“– Read

via "Threat Post".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ GrowDiaries Exposes Emails, Passwords of 1.4M Cannabis Growers ❌

Cannabis journaling platform GrowDiaries exposed more than 3.4 million user records online, many from countries where pot is illegal.

πŸ“– Read

via "Threat Post".
19:53
❌ Mysterious APT Leaves Curious β€˜KilllSomeOne’ Clue ❌

APT cloaks identity using script-kiddie messages and advanced deployment and targeting techniques.

πŸ“– Read

via "Threat Post".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Disinformation Now the Top Concern Following Hack-Free Election Day πŸ•΄

After an Election Day without foreign interference and cyberattacks, security experts turn their focus to disinformation.

πŸ“– Read

via "Dark Reading".
20:42
β€Ό CVE-2020-27691 β€Ό

The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 allows XSS via URLBlocking Settings, SNMP Settings, and System Log Settings.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-27692 β€Ό

The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains multiple CSRF vulnerabilities within its web management portal. Attackers can, for example, use this to update the TR-069 configuration server settings (responsible for managing devices remotely). This makes it possible to remotely reboot the device or upload malicious firmware.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-26207 β€Ό

DatabaseSchemaViewer before version 2.7.4.3 is vulnerable to arbitrary code execution if a user is tricked into opening a specially crafted `.dbschema` file. The patch was released in v2.7.4.3. As a workaround, ensure `.dbschema` files from untrusted sources are not opened.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-27690 β€Ό

The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains a buffer overflow within its web management portal. When a POST request is sent to /boaform/admin/formDOMAINBLK with a large blkDomain value, the Boa server crashes.

πŸ“– Read

via "National Vulnerability Database".
?
22:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransom Payment No Guarantee Against Doxxing πŸ•΄

Several organizations that paid a ransom to keep attackers from releasing stolen data saw it leaked anyway, according to Coveware.

πŸ“– Read

via "Dark Reading".
?
22:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25201 β€Ό

HashiCorp Consul Enterprise version 1.7.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5.

πŸ“– Read

via "National Vulnerability Database".
5 November 2020
?
03:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27387 β€Ό

An unrestricted file upload issue in HorizontCMS through 1.0.0-beta allows an authenticated remote attacker (with access to the FileManager) to upload and execute arbitrary PHP code by uploading a PHP payload, and then using the FileManager's rename function to provide the payload (which will receive a random name on the server) with the PHP extension, and finally executing the PHP file via an HTTP GET request to /storage/<php_file_name>. NOTE: the vendor has patched this while leaving the version number at 1.0.0-beta.

πŸ“– Read

via "National Vulnerability Database".
?
10:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Malspam Campaign Milks Election Uncertainty ❌

Emails try to lure victims with malicious documents claiming to have information about voting interference.

πŸ“– Read

via "Threat Post".
?
10:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7761 β€Ό

This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.

πŸ“– Read

via "National Vulnerability Database".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep5: Chrome, Flash and malware for sale [Podcast] ⚠

Here's the latest podcast - listen now!

πŸ“– Read

via "Naked Security".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The One Critical Element to Hardening Your Employees' Mobile Security πŸ•΄

COVID-19 has exposed longstanding gaps in enterprise mobile security. Creating a comprehensive mobile security plan and mandating compliance with that plan are essential to closing them.

πŸ“– Read

via "Dark Reading".
?
12:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cisco Zero-Day in AnyConnect Secure Mobility Client Remains Unpatched ❌

Cisco also disclosed high-severity vulnerabilities in its Webex and SD-WAN products.

πŸ“– Read

via "Threat Post".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7763 β€Ό

This affects the package phantom-html-to-pdf before 0.6.1.

πŸ“– Read

via "National Vulnerability Database".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Online Users Feel Safe, But Risky Behavior Abounds πŸ•΄

New research also shows a divide between younger and older users in their security practices, including use of two-factor authentication and how often software updates are performed.

πŸ“– Read

via "Dark Reading".
13:38
🦿 Don't click on ransomware disguised as political ads 🦿

Remote work and social media have made it easier for businesses to be impacted by security breaches. Here's why, and how organizations can protect themselves.

πŸ“– Read

via "Tech Republic".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27402 β€Ό

The HK1 Box S905X3 TV Box contains a vulnerability that allows a local unprivileged user to escalate to root using the /system/xbin/su binary via a serial port (UART) connection or using adb.

πŸ“– Read

via "National Vulnerability Database".
14:49
β€Ό CVE-2020-15949 β€Ό

Immuta v2.8.2 is affected by one instance of insecure permissions that can lead to user account takeover.

πŸ“– Read

via "National Vulnerability Database".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cado Security Gets $1.5 Million Seed πŸ•΄

The seed funding round was led by Ten Eleven Ventures.

πŸ“– Read

via "Dark Reading".
15:41
🦿 How to defend your organization against social engineering attacks 🦿

A security awareness program backed by multi-factor authentication can help protect your critical assets, says NordVPN Teams.

πŸ“– Read

via "Tech Republic".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Digital Transformation Means Security Must Also Transform πŸ•΄

Being successful in this moment requires the ability to evolve in terms of team management, visibility, and crisis management.

πŸ“– Read

via "Dark Reading".
16:41
🦿 How to enable end-to-end encryption for the Nextcloud app 🦿

Learn how you can enable the new Nextcloud end-to-end encryption.

πŸ“– Read

via "Tech Republic".
16:41
🦿 How to manage your personal information for your Google account 🦿

In the name of security, you should make sure the information displayed on your Google account is limited. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
16:41
🦿 How to manage personal information for your Google account 🦿

In the name of security, make sure the information displayed on your Google account is limited. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
16:49
β€Ό CVE-2018-1725 β€Ό

IBM QRadar SIEM 7.3 and 7.4 n a multi tenant configuration could be vulnerable to information disclosure. IBM X-Force ID: 147440.

πŸ“– Read

via "National Vulnerability Database".
16:49
β€Ό CVE-2020-26507 β€Ό

A CSV Injection (also known as Formula Injection) vulnerability in the Marmind web application with version 4.1.141.0 allows malicious users to gain remote control of other computers. By providing formula code in the Ò€&oelig;NotesҀ� functionality in the main screen, an attacker can inject a payload into the Ò€&oelig;DescriptionҀ� field under the Ò€&oelig;Insert To-DoҀ� option. Other users might download this data, for example a CSV file, and execute the malicious commands on their computer by opening the file using a software such as Microsoft Excel. The attacker could gain remote access to the userÒ€ℒs PC.

πŸ“– Read

via "National Vulnerability Database".
16:49
β€Ό CVE-2020-4097 β€Ό

In HCL Notes version 9 previous to release 9.0.1 FixPack 10 Interim Fix 8, version 10 previous to release 10.0.1 FixPack 6 and version 11 previous to 11.0.1 FixPack 1, a vulnerability in the input parameter handling of the Notes Client could potentially be exploited by an attacker resulting in a buffer overflow. This could enable an attacker to crash HCL Notes or execute attacker-controlled code on the client.

πŸ“– Read

via "National Vulnerability Database".
16:49
β€Ό CVE-2020-14240 β€Ό

HCL Notes versions previous to releases 9.0.1 FP10 IF8, 10.0.1 FP6 and 11.0.1 FP1 is susceptible to a Stored Cross-site Scripting (XSS) vulnerability. An attacker could use this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site and/or steal the victim's cookie-based authentication credentials.

πŸ“– Read

via "National Vulnerability Database".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Ransomware Payments, Threats to Exfiltrate Data Are Up πŸ”

Not only is the average ransom payment going up, so are cases in which the attackers threaten to release a company's stolen data.

πŸ“– Read

via "Digital Guardian".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zoom Snooping: How Body Language Can Spill Your Password ❌

Researchers figure out how to read what people are typing during a Zoom call using shoulder movements.

πŸ“– Read

via "Threat Post".
17:57
❌ Gaming Giant Capcom Hit By Ragnar Locker Ransomware: Report ❌

The Resident Evil creator reportedly been hit in a ransomware attack that stole 1TB of sensitive data.

πŸ“– Read

via "Threat Post".
18:08
πŸ•΄ Bug Bounty Hunters' Pro Tips on Chasing Vulns & Money πŸ•΄

From meditation to the right mindset, seasoned vulnerability researchers give their advice on how to maximize bug bounty profits and avoid burnout.

πŸ“– Read

via "Dark Reading".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NSS Labs' Abrupt Shutdown Leaves Many Unanswered Questions πŸ•΄

Former execs and employees share some insights into the testing firm's shutdown. What does it mean for the future of security product testing?

πŸ“– Read

via "Dark Reading".
18:49
β€Ό CVE-2003-1602 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2009-5104 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2020-24439 β€Ό

Acrobat Reader DC for macOS versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a security feature bypass. While the practical security impact is minimal, a defense-in-depth fix has been implemented to further harden the Adobe Reader update process.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2009-5105 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2000-1249 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2020-5941 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1 and 15.1.0-15.1.0.5, using the RESOLV::lookup command within an iRule may cause the Traffic Management Microkernel (TMM) to generate a core file and restart. This issue occurs when data exceeding the maximum limit of a hostname passes to the RESOLV::lookup command.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2009-5069 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2005-4893 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2008-7304 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2007-6749 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2004-2774 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2020-24434 β€Ό

Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2020-5942 β€Ό

In BIG-IP PEM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when processing Capabilities-Exchange-Answer (CEA) packets with certain attributes from the Policy and Charging Rules Function (PCRF) server, the Traffic Management Microkernel (TMM) may generate a core file and restart.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-1999-1595 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2004-2773 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2002-2440 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2020-12145 β€Ό

Silver Peak Unity Orchestrator versions prior to 8.9.11+, 8.10.11+, or 9.0.1+ uses HTTP headers to authenticate REST API calls from localhost. This makes it possible to log in to Orchestrator by introducing an HTTP HOST header set to 127.0.0.1 or localhost. Orchestrator instances that are hosted by customers Γ’β‚¬β€œon-premise or in a public cloud provider Γ’β‚¬β€œare affected by this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2020-24427 β€Ό

Acrobat Reader versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by an input validation vulnerability when decoding a crafted codec that could result in the disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2020-5943 β€Ό

In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password.

πŸ“– Read

via "National Vulnerability Database".
18:50
β€Ό CVE-2020-5944 β€Ό

In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration.

πŸ“– Read

via "National Vulnerability Database".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Seizes 27 More IRGC-Controlled Domain Names πŸ•΄

The action follows last month's seizure of 92 domain names used by Iran's Islamic Revolutionary Guard Corps to spread disinformation.

πŸ“– Read

via "Dark Reading".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 California voters back new data privacy law beefing up CCPA 🦿

The California Privacy Rights Act adds "teeth" to the CCPA, but some advocates say it doesn't go far enough.

πŸ“– Read

via "Tech Republic".
?
20:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2010-5112 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2011-4974 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2010-5116 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2020-13536 β€Ό

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2020-6877 β€Ό

A ZTE product is impacted by an information leak vulnerability. An attacker could use this vulnerability to obtain the authentication password of the handheld terminal and access the device illegally for operation. This affects: ZXA10 eODN V2.3P2T1

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2010-5113 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2011-4976 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2020-25662 β€Ό

A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel's Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2020-7207 β€Ό

A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2012-5555 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2012-6156 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2020-13537 β€Ό

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2011-4977 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2012-5528 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:49
β€Ό CVE-2020-17510 β€Ό

Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.

πŸ“– Read

via "National Vulnerability Database".
20:50
β€Ό CVE-2011-4978 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:50
β€Ό CVE-2020-25837 β€Ό

Sensitive information disclosure vulnerability in Micro Focus Self Service Password Reset (SSPR) product. The vulnerability affects versions 4.4.0.0 to 4.4.0.6 and 4.5.0.1 and 4.5.0.2. In certain configurations the vulnerability could disclose sensitive information.

πŸ“– Read

via "National Vulnerability Database".
20:50
β€Ό CVE-2020-25661 β€Ό

A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
20:50
β€Ό CVE-2010-5115 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:50
β€Ό CVE-2010-5114 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
22:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2017-15142 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2015-1824 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2018-16898 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2016-0744 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2018-16928 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2018-16915 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-15179 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-17376 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-15173 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-15184 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2013-6506 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2013-6505 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-15174 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2018-16899 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2016-0745 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2018-16904 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-15154 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2017-17355 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2018-16932 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:56
β€Ό CVE-2014-7820 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:01
β€Ό CVE-2017-17350 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:01
β€Ό CVE-2018-16900 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:01
β€Ό CVE-2017-15153 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:01
β€Ό CVE-2017-17360 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2015-1825 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2017-15165 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2017-17358 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2017-17332 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2017-17333 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2017-17343 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:04
β€Ό CVE-2018-16897 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
23:07
β€Ό CVE-2017-17374 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
6 November 2020
?
03:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-5648 β€Ό

Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QLBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1455HS-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, and GT1450HS-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5646 β€Ό

NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QLBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1455HS-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, and GT1450HS-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5644 β€Ό

Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QLBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1455HS-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, and GT1450HS-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5643 β€Ό

Improper input validation vulnerability in Cybozu Garoon 5.0.0 to 5.0.2 allows a remote authenticated attacker to delete some data of the bulletin board via unspecified vector.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5649 β€Ό

Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QLBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1455HS-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, and GT1450HS-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-28241 β€Ό

libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5645 β€Ό

Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QLBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1455HS-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, and GT1450HS-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-27347 β€Ό

The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-15708 β€Ό

Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5647 β€Ό

Improper access control vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1450-QLBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, GT1455HS-QTBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier, and GT1450HS-QMBDE CoreOS version Ò€ℒ05.65.00.BDÒ€ℒ and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2020-5667 β€Ό

Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.

πŸ“– Read

via "National Vulnerability Database".
?
10:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-10291 β€Ό

Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0.0.0.0) and listensfor packets over UDP port 5093. No authentication/authorization is required in order to communicate with theserver. The protocol being used is a property protocol by RMS Sentinel which provides the licensing infrastructurefor the network license server. RMS Sentinel license manager service exposes UDP port 5093 which provides sensitivesystem information that could be leveraged for further exploitation without any kind of authentication. Thisinformation includes detailed hardware and OS characteristics.After a decryption process, a textual protocol is found which contains a simple header with the requested command,application-identifier, and some arguments. The protocol leaks information regarding the receiving serverinformation, license information and managing licenses, among others.Through this flaw, attackers can retreive information about a KUKA simulation system, particularly, the version ofthe licensing server, which is connected to the simulator, and which will allow them to launch local simulationswith similar characteristics, further understanding the dynamics of motion virtualization and opening doors toother attacks (see RVDP#711 and RVDP#712 for subsequent vulnerabilities that compromise integrity andavailability).Beyond compromising simulations, Visual Components provides capabilities to interface with industrial machinery.Particularly, their PLC Connectivity feature 'makes it easy' to connect simulations with control systems usingeither the industry standard OPC UA or other supported vendor specific interfaces. This fills the gap of jumpingfrom simulation to real and enables attackers to pivot from the Visual Components simulator to robots or otherIndustrial Control System (ICS) devices, such as PLCs.

πŸ“– Read

via "National Vulnerability Database".
10:50
β€Ό CVE-2020-10292 β€Ό

Visual Components (owned by KUKA) is a robotic simulator that allows simulating factories and robots in order toimprove planning and decision-making processes. Visual Components software requires a special license which can beobtained from a network license server. The network license server binds to all interfaces (0.0.0.0) and listensfor packets over UDP port 5093. No authentication/authorization is required in order to communicate with theserver. The protocol being used is a property protocol by RMS Sentinel which provides the licensing infrastructurefor the network license server. RMS Sentinel license manager service exposes UDP port 5093 which provides sensitivesystem information that could be leveraged for further exploitation without any kind of authentication. Thisinformation includes detailed hardware and OS characteristics.After a decryption process, a textual protocol is found which contains a simple header with the requested command,application-identifier, and some arguments. The protocol is vulnerable to DoS through an arbitrary pointerderreference. This flaw allows an attacker to to pass a specially crafted package that, when processed by theservice, causes an arbitrary pointer from the stack to be dereferenced, causing an uncaught exception thatterminates the service. This can be further contructed in combination with RVDP#710 which exploits an informationdisclosure leak, or with RVDP#711 for an stack-overflow and potential code execution.Beyond denying simulations, Visual Components provides capabilities to interface with industrial machinery andautomate certain processes (e.g. testing, benchmarking, etc.) which depending on the DevOps setup might beintegrated into the industrial flow. Accordingly, a DoS in the simulation might have higher repercusions, dependingon the Industrial Control System (ICS) ICS infrastructure.

πŸ“– Read

via "National Vulnerability Database".
?
11:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Patches Bugs Tied to Previously Identified Zero-Days ❌

The actively exploited vulnerabilities discovered by Project Zero exist across iPhone, iPad and iPod devices.

πŸ“– Read

via "Threat Post".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How COVID-19 Changed the VC Investment Landscape for Cybersecurity Companies πŸ•΄

What trends can startups and investors expect to see going forward?

πŸ“– Read

via "Dark Reading".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26882 β€Ό

In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.

πŸ“– Read

via "National Vulnerability Database".
12:50
β€Ό CVE-2020-27589 β€Ό

Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.

πŸ“– Read

via "National Vulnerability Database".
12:50
β€Ό CVE-2020-4483 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 181857.

πŸ“– Read

via "National Vulnerability Database".
12:50
β€Ό CVE-2020-4484 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could disclose sensitive information to an authenticated user that could be used in further attacks against the system. IBM X-Force ID: 181858.

πŸ“– Read

via "National Vulnerability Database".
12:50
β€Ό CVE-2020-4482 β€Ό

IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow an authenticated user to bypass security. A user with access to a snapshot could apply unauthorized additional statuses via direct rest calls. IBM X-Force ID: 181856.

πŸ“– Read

via "National Vulnerability Database".
12:50
β€Ό CVE-2020-27196 β€Ό

An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
12:50
β€Ό CVE-2020-26883 β€Ό

In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents.

πŸ“– Read

via "National Vulnerability Database".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Black Friday – stay safe before, during and after peak retail season ⚠

Yes, we give Black Friday tips every year - but that's because they're worth doing every year!

πŸ“– Read

via "Naked Security".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to view your SSH keys in Linux, macOS, and Windows 🦿

If you're not sure how to view your SSH certificates, Jack Wallen walks you through the steps on Linux, macOS, and Windows.

πŸ“– Read

via "Tech Republic".
14:15
πŸ” Friday Five 11/6 πŸ”

New privacy laws, botnet schemes, and Bitcoin seizures - catch up on all the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Toon: Masks and Manners πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
14:51
β€Ό CVE-2020-8580 β€Ό

SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS).

πŸ“– Read

via "National Vulnerability Database".
14:51
β€Ό CVE-2020-7198 β€Ό

There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2.

πŸ“– Read

via "National Vulnerability Database".
14:51
β€Ό CVE-2020-5795 β€Ό

UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.

πŸ“– Read

via "National Vulnerability Database".
14:58
❌ Gitpaste-12 Worm Targets Linux Servers, IoT Devices ❌

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.

πŸ“– Read

via "Threat Post".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Oracle-Walmart-TikTok Deal Is Not Enough πŸ•΄

The social media deal raises issues involving data custodianship and trusted tech partnerships.

πŸ“– Read

via "Dark Reading".
?
16:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25170 β€Ό

An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2020-26214 β€Ό

In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2020-26213 β€Ό

In teler before version 0.0.1, if you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills. The issue is patched in teler 0.0.1 and 0.0.1-dev5.1.

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2020-25174 β€Ό

A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user.

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2017-18926 β€Ό

raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2020-25172 β€Ό

A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2020-8577 β€Ό

SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session.

πŸ“– Read

via "National Vulnerability Database".
16:51
β€Ό CVE-2020-5794 β€Ό

A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:58
❌ Feds Seize $1B in Bitcoin from Silk Road ❌

The illegal marketplace was hacked prior to it's takedown -- the IRS has now tracked down those stolen funds, it said.

πŸ“– Read

via "Threat Post".
16:58
❌ Campari Site Suffers Ransomware Hangover ❌

The Ragnar Locker operators released a stolen contract between Wild Turkey and actor Matthew McConaughey, as proof of compromise.

πŸ“– Read

via "Threat Post".
17:10
πŸ•΄ Apple Patches 24 Vulnerabilities Across Product Lines πŸ•΄

The vulnerabilities include three for which exploits have already been seen in the wild.

πŸ“– Read

via "Dark Reading".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Gitpaste-12 Botnet Exploits 12 Known Vulnerabilities πŸ•΄

Researchers discover a new worm and botnet dubbed Gitpaste-12 for its ability to spread via GitHub and Pastebin.

πŸ“– Read

via "Dark Reading".
18:51
β€Ό CVE-2020-26084 β€Ό

A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3551 β€Ό

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3590 β€Ό

A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-27123 β€Ό

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3595 β€Ό

A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root group on the underlying operating system. The vulnerability is due to incorrect permissions being set when the affected command is executed. An attacker could exploit this vulnerability by executing the affected command on an affected system. A successful exploit could allow the attacker to gain root privileges.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3574 β€Ό

A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3588 β€Ό

A vulnerability in virtualization channel messaging in Cisco Webex Meetings Desktop App for Windows could allow a local attacker to execute arbitrary code on a targeted system. This vulnerability occurs when this app is deployed in a virtual desktop environment and using virtual environment optimization. This vulnerability is due to improper validation of messages processed by the Cisco Webex Meetings Desktop App. A local attacker with limited privileges could exploit this vulnerability by sending malicious messages to the affected software by using the virtualization channel interface. A successful exploit could allow the attacker to modify the underlying operating system configuration, which could allow the attacker to execute arbitrary code with the privileges of a targeted user. Note: This vulnerability can be exploited only when Cisco Webex Meetings Desktop App is in a virtual desktop environment on a hosted virtual desktop (HVD) and is configured to use the Cisco Webex Meetings virtual desktop plug-in for thin clients.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3587 β€Ό

A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-27122 β€Ό

A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3594 β€Ό

A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted options to a specific command. A successful exploit could allow the attacker to gain root privileges.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3444 β€Ό

A vulnerability in the packet filtering features of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to bypass L3 and L4 traffic filters. The vulnerability is due to improper traffic filtering conditions on an affected device. An attacker could exploit this vulnerability by crafting a malicious TCP packet with specific characteristics and sending it to a targeted device. A successful exploit could allow the attacker to bypass the L3 and L4 traffic filters and inject an arbitrary packet into the network.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3573 β€Ό

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-26086 β€Ό

A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3284 β€Ό

A vulnerability in the enhanced Preboot eXecution Environment (PXE) boot loader for Cisco IOS XR 64-bit Software could allow an unauthenticated, remote attacker to execute unsigned code during the PXE boot process on an affected device. The PXE boot loader is part of the BIOS and runs over the management interface of hardware platforms that are running Cisco IOS XR Software only. The vulnerability exists because internal commands that are issued when the PXE network boot process is loading a software image are not properly verified. An attacker could exploit this vulnerability by compromising the PXE boot server and replacing a valid software image with a malicious one. Alternatively, the attacker could impersonate the PXE boot server and send a PXE boot reply with a malicious file. A successful exploit could allow the attacker to execute unsigned code on the affected device. Note: To fix this vulnerability, both the Cisco IOS XR Software and the BIOS must be upgraded. The BIOS code is included in Cisco IOS XR Software but might require additional installation steps. For further information, see the Fixed Software section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3603 β€Ό

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3579 β€Ό

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3592 β€Ό

A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system. The vulnerability is due to insufficient authorization checking on an affected system. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to gain privileges beyond what would normally be authorized for their configured user authorization level. This could allow the attacker to modify the configuration of an affected system.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3556 β€Ό

A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute a script. This script would execute with the privileges of the targeted AnyConnect user. In order to successfully exploit this vulnerability, there must be an ongoing AnyConnect session by the targeted user at the time of the attack. To exploit this vulnerability, the attacker would also need valid user credentials on the system upon which the AnyConnect client is being run. Cisco has not released software updates that address this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3591 β€Ό

A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
18:51
β€Ό CVE-2020-3593 β€Ό

A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to a utility that is running on an affected system. A successful exploit could allow the attacker to gain root privileges.

πŸ“– Read

via "National Vulnerability Database".
18:58
❌ WordPress Sites Open to Code Injection Attacks via Welcart e-Commerce Bug ❌

The shopping cart application contains a PHP object-injection bug.

πŸ“– Read

via "Threat Post".
7 November 2020
?
18:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-28339 β€Ό

The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain.

πŸ“– Read

via "National Vulnerability Database".
8 November 2020
?
14:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7764 β€Ό

This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.

πŸ“– Read

via "National Vulnerability Database".
?
18:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-28347 β€Ό

tdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled.

πŸ“– Read

via "National Vulnerability Database".
9 November 2020
?
08:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-15297 β€Ό

Insufficient validation in the Bitdefender Update Server and BEST Relay components of Bitdefender Endpoint Security Tools versions prior to 6.6.20.294 allows an unprivileged attacker to bypass the in-place mitigations and interact with hosts on the network. This issue affects: Bitdefender Update Server versions prior to 6.6.20.294.

πŸ“– Read

via "National Vulnerability Database".
?
12:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-24353 β€Ό

Pega Platform before 8.4.0 has a XSS issue via stream rule parameters used in the request header.

πŸ“– Read

via "National Vulnerability Database".
13:02
❌ Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak ❌

A cloud misconfiguration affecting users of a popular reservation platform threatens travelers with identity theft, scams, credit-card fraud and vacation-stealing.

πŸ“– Read

via "Threat Post".
13:02
❌ Microsoft Exchange Attack Exposes New xHunt Backdoors ❌

An attack on the Microsoft Exchange server of an organization in Kuwait revealed two never-before-seen Powershell backdoors.

πŸ“– Read

via "Threat Post".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Preventing and Mitigating DDoS Attacks: It's Elementary πŸ•΄

Following a spate of cyberattacks nationwide, school IT teams need to act now to ensure their security solution makes the grade.

πŸ“– Read

via "Dark Reading".
?
14:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25655 β€Ό

An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users.

πŸ“– Read

via "National Vulnerability Database".
14:55
β€Ό CVE-2020-8133 β€Ό

A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file.

πŸ“– Read

via "National Vulnerability Database".
14:55
β€Ό CVE-2020-8268 β€Ό

Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.

πŸ“– Read

via "National Vulnerability Database".
14:55
β€Ό CVE-2020-9300 β€Ό

The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.

πŸ“– Read

via "National Vulnerability Database".
14:55
β€Ό CVE-2020-8276 β€Ό

The implementation of Brave Desktop's privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave's server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window.

πŸ“– Read

via "National Vulnerability Database".
14:55
β€Ό CVE-2020-9299 β€Ό

There were XSS vulnerabilities discovered and reported in the Dispatch application, affecting name and description parameters of Incident Priority, Incident Type, Tag Type, and Incident Filter. This vulnerability can be exploited by an authenticated user.

πŸ“– Read

via "National Vulnerability Database".
14:55
β€Ό CVE-2020-8150 β€Ό

A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.

πŸ“– Read

via "National Vulnerability Database".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Windows File Enumeration Intel Gathering Tool 2.2 πŸ› 

NtFileSins.py is a Windows file enumeration intel gathering tool.

πŸ“– Read

via "Packet Storm Security".
16:12
πŸ›  Etherify Radio Signal Analysis Tool πŸ› 

Etherify is an interesting tool that analyzes radio signals transmitted by transmission rates via ethernet.

πŸ“– Read

via "Packet Storm Security".
16:15
πŸ•΄ Insecure APIs a Growing Risk for Organizations πŸ•΄

Security models for application programming interfaces haven't kept pace with requirements of a non-perimeter world, Forrester says.

πŸ“– Read

via "Dark Reading".
?
16:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ultimate Member Plugin for WordPress Allows Site Takeover ❌

Three critical security bugs allow for easy privilege escalation to an administrator role.

πŸ“– Read

via "Threat Post".
16:42
πŸ›  OATH Toolkit 2.6.3 πŸ› 

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

πŸ“– Read

via "Packet Storm Security".
16:55
β€Ό CVE-2020-23136 β€Ό

Microweber v1.1.18 is affected by no session expiry after log-out.

πŸ“– Read

via "National Vulnerability Database".
16:55
β€Ό CVE-2020-23138 β€Ό

An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension.

πŸ“– Read

via "National Vulnerability Database".
16:55
β€Ό CVE-2020-23140 β€Ό

Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active.

πŸ“– Read

via "National Vulnerability Database".
16:55
β€Ό CVE-2020-23139 β€Ό

Microweber 1.1.18 is affected by broken authentication and session management. Local session hijacking may occur, which could result in unauthorized access to system data or functionality, or a complete system compromise.

πŸ“– Read

via "National Vulnerability Database".
16:55
β€Ό CVE-2020-14366 β€Ό

A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw

πŸ“– Read

via "National Vulnerability Database".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyberattack on UVM Health Network Impedes Chemotherapy Appointments ❌

The cyberattack has halted chemotherapy, mammogram and screening appointments, and led to 300 staff being furloughed or reassigned.

πŸ“– Read

via "Threat Post".
?
18:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Trump Site Alleging AZ Election Fraud Exposes Voter Data ❌

Slapdash setup of Trump website collecting reports of Maricopa County in-person vote irregularities exposed 163,000 voter data records to fraud, via SQL injection.

πŸ“– Read

via "Threat Post".
18:14
πŸ•΄ Data Privacy Gets Solid Upgrade With Early Adopters πŸ•΄

The United Kingdom and the regional government of Flanders kick off four pilots of the Solid data-privacy technology from World Wide Web inventor Tim Berners-Lee, which gives users more control of their data.

πŸ“– Read

via "Dark Reading".
18:17
🦿 How to securely donate old Windows 10 PCs 🦿

Many are looking to donate their spare computing devices to people who need them but can't afford to get them on their own. There is a safe and data-secure way to make your donation.

πŸ“– Read

via "Tech Republic".
18:20
πŸ” CPRA Set to Revamp Privacy Laws in California Yet Again πŸ”

Voters in California passed new data privacy legislation, the California Privacy Rights Act - building off the California Consumer Privacy Act - last week.

πŸ“– Read

via "Digital Guardian".
?
18:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27977 β€Ό

CapaSystems CapaInstaller before 6.0.101 does not properly assign, modify, or check privileges for an actor who attempts to edit registry values, allowing an attacker to escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
18:55
β€Ό CVE-2020-26542 β€Ό

An issue was discovered in the MongoDB Simple LDAP plugin through 2020-10-02 for Percona Server. When used to authenticate against Microsoft Active Directory, it suffers from an authentication validation issue whereby a blank password can be used to authenticate with the service successfully.

πŸ“– Read

via "National Vulnerability Database".
?
19:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FTC Announces Consent Agreement With Zoom πŸ•΄

The agreement covers Zoom's misleading statements on security for its audio and video calling.

πŸ“– Read

via "Dark Reading".
19:47
🦿 Top 5 things to do with old gadgets 🦿

If you're wondering what to do with devices you don't use anymore, Tom Merritt offers five suggestions for how to deal with them.

πŸ“– Read

via "Tech Republic".
?
20:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Brazilian Banking Trojan Targets Mobile Users in Multiple Countries πŸ•΄

Ghimob is a full-fledged spy in your pocket, Kaspersky says.

πŸ“– Read

via "Dark Reading".
20:55
β€Ό CVE-2020-14188 β€Ό

The preprocessArgs function in the Atlassian gajira-create GitHub Action before version 2.0.1 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-28364 β€Ό

A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-4651 β€Ό

IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186024.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-28371 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0 before 2020-10-27. The FileOutputStream.write() method in FileOutputStream.java has a boundary check to prevent out-of-bounds memory read/write operations. However, an integer overflow leads to bypassing this check and achieving the out-of-bounds access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-28373 β€Ό

upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-4759 β€Ό

IBM FileNet Content Manager 5.5.4 and 5.5.5 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 188736.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-26168 β€Ό

The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn't verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-14189 β€Ό

The execute function in in the Atlassian gajira-comment GitHub Action before version 2.0.2 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue comment.

πŸ“– Read

via "National Vulnerability Database".
20:55
β€Ό CVE-2020-4650 β€Ό

IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023.

πŸ“– Read

via "National Vulnerability Database".
10 November 2020
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Teams Users Under Attack in β€˜FakeUpdates’ Malware Campaign ❌

Microsoft warns that cybercriminals are using Cobalt Strike to infect entire networks beyond the infection point, according to a report.

πŸ“– Read

via "Threat Post".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Hackers Blend Attack Methods to Bypass MFA πŸ•΄

Protecting mobile apps requires a multilayered approach with a mix of cybersecurity measures to counter various attacks at different layers.

πŸ“– Read

via "Dark Reading".
12:27
β€Ό CVE-2020-0447 β€Ό

There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168251617

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0451 β€Ό

In sbrDecoder_AssignQmfChannels2SbrChannels of sbrdecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9 Android-8.0 Android-8.1Android ID: A-158762825

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0441 β€Ό

In Message and toBundle of Notification.java, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service requiring a device reset to fix with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-158304295

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0448 β€Ό

In getPhoneAccountsForPackage of TelecomServiceImpl.java, there is a possible way to access a tracking identifier due to a missing permission check. This could lead to local information disclosure of the identifier, which could be used to track an account across devices, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-153995334

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0446 β€Ό

There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264528

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0409 β€Ό

In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0449 β€Ό

In btm_sec_disconnected of btm_sec.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution in the Bluetooth server with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-162497143

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0454 β€Ό

In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0443 β€Ό

In LocaleList of LocaleList.java, there is a possible forced reboot due to an uncaught exception. This could lead to local denial of service requiring factory reset to restore with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152410253

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0453 β€Ό

In updateNotification of BeamTransferManager.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-8.0 Android-8.1Android ID: A-159060474

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0439 β€Ό

In generatePackageInfo of PackageManagerService.java, there is a possible permissions bypass due to an incorrect permission check. This could lead to local escalation of privilege that allows instant apps access to permissions not allowed for instant apps, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-140256621

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0452 β€Ό

In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0438 β€Ό

In the AIBinder_Class constructor of ibinder.cpp, there is a possible arbitrary code execution due to uninitialized data. This could lead to local escalation of privilege if a process were using libbinder_ndk in a vulnerable way with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-161812320

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0442 β€Ό

In Message and toBundle of Notification.java, there is a possible UI slowdown or crash due to improper input validation. This could lead to remote denial of service if a malicious contact file is received, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-147358092

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0424 β€Ό

In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0450 β€Ό

In rw_i93_sm_format of rw_i93.cc, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-157650336

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-24384 β€Ό

A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0418 β€Ό

In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0445 β€Ό

There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264527

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-0437 β€Ό

In CellBroadcastReceiver's intent handlers, there is a possible denial of service due to a missing permission check. This could lead to local denial of service of emergency alerts with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-162741784

πŸ“– Read

via "National Vulnerability Database".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Falco 0.26.2 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 DDoS attacks: How to combat the latest tactics 🦿

With DDoS-as-a-Service, criminals with a little know-how can launch denial of service attacks for just a few dollars, says Digital Shadows.

πŸ“– Read

via "Tech Republic".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ghimob Android Banking Trojan Targets 153 Mobile Apps ❌

A banking trojan is targeting mobile app users in Brazil - and researchers warn that its operator has big plans to expand abroad.

πŸ“– Read

via "Threat Post".
?
14:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7766 β€Ό

This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-5388 β€Ό

Dell Inspiron 15 7579 2-in-1 BIOS versions prior to 1.31.0 contain an Improper SMM communication buffer verification vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-4760 β€Ό

IBM Content Navigator 3.0CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188737.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-12485 β€Ό

The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-28267 β€Ό

Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-4704 β€Ό

IBM Content Navigator 3.0CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187189.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-4568 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2020-13927 β€Ό

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

πŸ“– Read

via "National Vulnerability Database".
14:37
❌ Apple to Deliver β€˜Privacy Labels’ for Apps, Revealing Data-Sharing Details ❌

Developers will have to reveal how data is shared with any β€œthird-party partners,” which include analytics tools, advertising networks, third-party SDKs or other external vendors.

πŸ“– Read

via "Threat Post".
14:45
πŸ•΄ The Double-Edged Sword of Cybersecurity Insurance πŸ•΄

With ransomware on the rise, more organizations are opting to purchase cyber insurance -- tipping off criminals about how much to demand for access back to pilfered systems and data.

πŸ“– Read

via "Dark Reading".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Phishing, deepfakes, and ramsomware: How coronavirus-related cyberthreats will persist in 2021 🦿

The pandemic and 5G speed create wider attack capabilities. Phishing emails and other threats will continue to exploit COVID-19 and its side effects, says Check Point Research.

πŸ“– Read

via "Tech Republic".