πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2019-7244

An issue was discovered in kerneld.sys in AIDA64 before 5.99. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x80112084 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-7240

An issue was discovered in WinRing0x64.sys in Moo0 System Monitor 1.83. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x9C402088 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-5105

An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService 3.5.13.20. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20633

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.

πŸ“– Read

via "National Vulnerability Database".
⚠ Monday review – the hot 22 stories of the week ⚠

From the return of the Martinelli WhatsApp hoax to the takedown of hacker forum Deer.io - and everything in between. It's roundup time.

πŸ“– Read

via "Naked Security".
⚠ Google sent ~40K warnings to targets of state-backed attackers in 2019 ⚠

Google has seen a rising number of attackers impersonating news outlets and journalists to spread fake news among other reporters.

πŸ“– Read

via "Naked Security".
⚠ Should governments track your location to fight COVID-19? ⚠

Google Maps data could help governments track patients that a newly-diagnosed COVID-19 sufferer has been in contact with.

πŸ“– Read

via "Naked Security".
⚠ Chrome may bring back β€˜www’ with option to show full URLs ⚠

Google's doing so grudgingly: it still thinks that showing too much will confuse users trying to assess a site's security.

πŸ“– Read

via "Naked Security".
⚠ Apple’s iOS 13.4 hit by VPN bypass vulnerability ⚠

It’s less than a week since iOS 13.4 appeared and already researchers have discovered a bug that puts at risk the privacy of VPN connections.

πŸ“– Read

via "Naked Security".
πŸ•΄ Securing Your Remote Workforce: A Coronavirus Guide for Businesses πŸ•΄

Often the hardest part in creating an effective awareness program is deciding what NOT to teach.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-10560

An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the SiteKey to insert into a crafted URL for components/OssnComments/ossn_com.php and/or libraries/ossn.lib.upgrade.php.

πŸ“– Read

via "National Vulnerability Database".
⚠ How to stay on top of coronavirus scams – and all the others too ⚠

The bad news is that you have to watch out for a plethora of new coronavirus cyberscams, as well as all the old stuff, too...

πŸ“– Read

via "Naked Security".
πŸ›  Recon Informer πŸ› 

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ” How to protect your organization and remote workers against ransomware πŸ”

Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How to use an iPhone or Android device as the security key for your Google account πŸ”

Your smartphone can act as your security key to authenticate your Google credentials on the web. Learn how to set that up on an Android device or an iPhone.

πŸ“– Read

via "Security on TechRepublic".
❌ Zeus Sphinx Banking Trojan Arises Amid COVID-19 ❌

The malware is back after three years, looking to cash in on interest in government relief efforts around coronavirus.

πŸ“– Read

via "Threatpost".
πŸ” Top 5 remote access threats πŸ”

When working from home, it's important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-7755

In webERP 4.15, the Import Bank Transactions function fails to sanitize the content of imported MT940 bank statement files, resulting in the execution of arbitrary SQL queries, aka SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Top 5 remote access threats πŸ”

When working from home, it's important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Security policies explain step-by-step solutions for strengthening IT defenses πŸ”

These TechRepublic Premium resources offer a comprehensive solution from responding to a data breach to explaining company-wide security responsibilities.

πŸ“– Read

via "Security on TechRepublic".