๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ•ด 6 Truths About Disinformation Campaigns ๐Ÿ•ด

Disinformation goes far beyond just influencing election outcomes. Here's what security pros need to know.

๐Ÿ“– Read

via "Dark Reading: ".
ATENTIONโ€ผ New - CVE-2019-10064

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ” Don't be like Bezos: How to keep your phone from being hacked ๐Ÿ”

Anyone can be a target of a Jeff Bezos-level data hack. Here's how to keep your phone protected.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How organizations are misusing firewalls (and what IT teams should do about it) ๐Ÿ”

Firewall management doesn't mean set it and forget it. Learn tips for effective firewall configuration to protect your organization from security risks and threats.

๐Ÿ“– Read

via "Security on TechRepublic".
โŒ Bruce Schneier Proposes โ€˜Hacking Societyโ€™ for a Better Tomorrow โŒ

The security industry has the perfect skillset and adversarial defense outlook to deal with some of the emerging societal issues in today's world, said security technologist Bruce Schneier.

๐Ÿ“– Read

via "Threatpost".
๐Ÿ” 5 top 5G trends for 2020 ๐Ÿ”

This year will be a big investment year for 5G for many manufacturers and network operators. Find out what the experts predict will happen next.

๐Ÿ“– Read

via "Security on TechRepublic".
ATENTIONโ€ผ New - CVE-2019-15609

The kill-port-process package version < 2.2.0 is vulnerable to a Command Injection vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ” Infosys CISO: Being good at technology is no longer enough ๐Ÿ”

Vishal Salvi says investing time and developing influence are the keys to making the shift to a secure-by-design mindset.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ” How to install and use the open source OTPClient 2FA tool on Linux ๐Ÿ”

If your desktop of choice is Linux, you don't have to be without a 2FA tool, thanks to OTPClient.

๐Ÿ“– Read

via "Security on TechRepublic".
๐Ÿ•ด New Trickbot Delivery Method Focuses on Windows 10 ๐Ÿ•ด

Researchers discover attackers abusing the latest version of the remote desktop ActiveX control class introduced for Windows 10.

๐Ÿ“– Read

via "Dark Reading: ".
๐Ÿ” Coronavirus: How hackers are exploiting the epidemic to steal your information ๐Ÿ”

Karen Roby interviewed a cybersecurity expert about a different threat than COVID-19 brings.

๐Ÿ“– Read

via "Security on TechRepublic".
ATENTIONโ€ผ New - CVE-2019-10805

valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2019-10804

serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2019-10803

push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2019-10802

giting version prior to 0.0.8 allows execution of arbritary commands. The first argument "repo" of function "pull()" is executed by the package without any validation.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2019-10801

enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2018-21035

In Qt through 5.14.1, the WebSocket implementation accepts up to 2GB for frames and 2GB for messages. Smaller limits cannot be configured. This makes it easier for attackers to cause a denial of service (memory consumption).

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ” Coronavirus: How hackers are exploiting the epidemic to steal your information ๐Ÿ”

Karen Roby interviewed an expert about a different threat than COVID-19 brings.

๐Ÿ“– Read

via "Security on TechRepublic".
ATENTIONโ€ผ New - CVE-2015-5361

Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensions option (which is disabled by default) is to provide similar functionality when the SRX secures the FTP/FTPS client. As the control channel is encrypted, the FTP ALG cannot inspect the port specific information and will open a wider TCP data channel (gate) from client IP to server IP on all destination TCP ports. In FTP/FTPS client environments to an enterprise network or the Internet, this is the desired behavior as it allows firewall policy to be written to FTP/FTPS servers on well-known control ports without using a policy with destination IP ANY and destination port ANY. Issue The ftps-extensions option is not intended or recommended where the SRX secures the FTPS server, as the wide data channel session (gate) will allow the FTPS client temporary access to all TCP ports on the FTPS server. The data session is associated to the control channel and will be closed when the control channel session closes. Depending on the configuration of the FTPS server, supporting load-balancer, and SRX inactivity-timeout values, the server/load-balancer and SRX may keep the control channel open for an extended period of time, allowing an FTPS client access for an equal duration.รขโ‚ฌ&lsaquo; Note that the ftps-extensions option is not enabled by default.

๐Ÿ“– Read

via "National Vulnerability Database".
ATENTIONโ€ผ New - CVE-2015-3006

On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".