ATENTIONβΌ New - CVE-2019-10221
π Read
via "National Vulnerability Database".
A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10179
π Read
via "National Vulnerability Database".
A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.π Read
via "National Vulnerability Database".
π How to create a Kubernetes security policy π
π Read
via "Security on TechRepublic".
If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.π Read
via "Security on TechRepublic".
TechRepublic
How to create a Kubernetes security policy
If you're looking to take your Kubernetes security to the next level, you'll want to start working with pod security policies. Here's a quick introduction to this feature.
π΄ Proof of Concept Released for kr00k Wi-Fi Vulnerability π΄
π Read
via "Dark Reading: ".
The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.π Read
via "Dark Reading: ".
Darkreading
Proof of Concept Released for kr00k Wi-Fi Vulnerability
The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.
β Trolls ZoomBomb work-from-home videocall with filth β
π Read
via "Naked Security".
Trolls have been joining videoconferencing calls to expose meeting participants to disturbing videos.π Read
via "Naked Security".
Naked Security
Trolls ZoomBomb work-from-home videocall with filth
Trolls have been joining videoconferencing calls to expose meeting participants to disturbing videos.
β S2 Ep31: Remote working, malwareless ransomware and EARN IT β Naked Security Podcast β
π Read
via "Naked Security".
Listen to the latest episode now!π Read
via "Naked Security".
Naked Security
S2 Ep31: Remote working, malwareless ransomware and EARN IT β Naked Security Podcast
Listen to the latest episode now!
π How to deal with network security and bandwidth issues during the coronavirus pandemic π
π Read
via "Security on TechRepublic".
Experts discuss what precautions companies need to be taking right now that a record number of people are working outside of offices.π Read
via "Security on TechRepublic".
TechRepublic
How to deal with network security and bandwidth issues during the coronavirus pandemic
Experts discuss what precautions companies need to be taking right now that a record number of people are working outside of offices.
β News Wrap, Coronavirus Edition: WFH Security Woes, Pwn2Own β
π Read
via "Threatpost".
Threatpost editors discuss this week's top news stories from COVID-19 themed malware attacks to Pwn2Own updates.π Read
via "Threatpost".
Threat Post
News Wrap, Coronavirus Edition: WFH Security Woes, Pwn2Own
Threatpost editors discuss this week's top news stories from COVID-19 themed malware attacks to Pwn2Own updates.
π΄ Dark Reading Cybersecurity Crossword Puzzle π΄
π Read
via "Dark Reading: ".
Here's a little something to snuggle up with if you're on lockdown.π Read
via "Dark Reading: ".
Darkreading
Dark Reading Cybersecurity Crossword Puzzle
Here's a little something to snuggle up with if you're on lockdown.
β Defying Covid-19βs Pall: Pwn2Own Goes Virtual β
π Read
via "Threatpost".
Hacking contest goes virtual with participants remotely winning $295k in prizes for taking down Adobe Reader, Safari and Ubuntu.π Read
via "Threatpost".
Threat Post
Defying Covid-19βs Pall: Pwn2Own Goes Virtual
Hacking contest goes virtual with participants remotely winning $295k in prizes for taking down Adobe Reader, Safari and Ubuntu.
β Revamped HawkEye Keylogger Swoops in on Coronavirus Fears β
π Read
via "Threatpost".
Emails claiming to be directly from WHOβs Dr. Tedros Adhanom Ghebreyesus offer "drug advice" -- and malware infections.π Read
via "Threatpost".
Threat Post
Revamped HawkEye Keylogger Swoops in on Coronavirus Fears
Emails claiming to be directly from WHOβs Dr. Tedros Adhanom Ghebreyesus offer "drug advice" β and malware infections.
π΄ 200M Records of US Citizens Leaked in Unprotected Database π΄
π Read
via "Dark Reading: ".
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.π Read
via "Dark Reading: ".
Dark Reading
200M Records of US Citizens Leaked in Unprotected Database
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.
ATENTIONβΌ New - CVE-2019-11574
π Read
via "National Vulnerability Database".
An issue was discovered in Simple Machines Forum (SMF) before release 2.0.17. There is SSRF related to Subs-Package.php and Subs.php because user-supplied data is used directly in curl calls.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2013-7487
π Read
via "National Vulnerability Database".
On Swann DVR04B, DVR08B, DVR-16CIF, and DVR16B devices, raysharpdvr application has a vulnerable call to Γ’β¬œsystemΓ’β¬οΏ½, which allows remote attackers to execute arbitrary code via TCP port 9000.π Read
via "National Vulnerability Database".
π GNU Privacy Guard 2.2.20 π
π Go!
via "Security Tool Files β Packet Storm".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
GNU Privacy Guard 2.2.20 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Monday review β the hot 23 stories of the week β
π Read
via "Naked Security".
From the EARN IT Act to the Martinelli hoax - and everything in between. Itβs your weekly security roundup.π Read
via "Naked Security".
Naked Security
Monday review β the hot 23 stories of the week
From the EARN IT Act to the Martinelli hoax β and everything in between. Itβs your weekly security roundup.
β Firefox is dropping FTP support β
π Read
via "Naked Security".
Heads up, Firefox users who rely on FTP: the browser is eliminating support for this venerable protocol.π Read
via "Naked Security".
Naked Security
Firefox is dropping FTP support
Heads up, Firefox users who rely on FTP: the browser is eliminating support for this venerable protocol.
β Stolen data of company that refused REvil ransom payment now on sale β
π Read
via "Naked Security".
A comment from one buyer of data purportedly from Brooks International: "It even has credit card number & a password. lol !!"π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Tour guide/Chinese spy gets four years for SD card dead drops β
π Read
via "Naked Security".
The dead drops were very James Bond: once, the data mule taped the SD card to the underside of a desk in a hotel.π Read
via "Naked Security".
Naked Security
Tour guide/Chinese spy gets four years for SD card dead drops
The dead drops were very James Bond: once, the data mule taped the SD card to the underside of a desk in a hotel.
β Cisco issues urgent fixes for SD-WAN router flaws β
π Read
via "Naked Security".
Cisco has patched a clutch of high-priority vulnerabilities in its SD-WAN routes and their management software.π Read
via "Naked Security".
Naked Security
Cisco issues urgent fixes for SD-WAN router flaws
Cisco has patched a clutch of high-priority vulnerabilities in its SD-WAN routes and their management software.