ATENTIONβΌ New - CVE-2016-11042
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. There is a SIM Lock bypass. The Samsung ID is SVE-2016-5381 (June 2016).π Read
via "National Vulnerability Database".
π Cyberattacks on the rise since the start of the coronavirus outbreak π
π Read
via "Security on TechRepublic".
Phishing is the leading threat exploiting COVID-19, followed by malicious websites, according to a survey of IT professionals from Check Point.π Read
via "Security on TechRepublic".
TechRepublic
Cyberattacks on the rise since the start of the coronavirus outbreak
Phishing is the leading threat exploiting COVID-19, followed by malicious websites, according to a survey of IT professionals from Check Point.
ATENTIONβΌ New - CVE-2016-11041
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with KK(4.4) software. Attackers can bypass the lockscreen by sending an AT command over USB. The Samsung ID is SVE-2015-5301 (June 2016).π Read
via "National Vulnerability Database".
π How to install and configure WireGuard VPN on Linux π
π Read
via "Security on TechRepublic".
WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.π Read
via "Security on TechRepublic".
TechRepublic
How to install and configure WireGuard VPN on Linux
WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.
ATENTIONβΌ New - CVE-2017-18692
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) and N(7.0) (MSM8939, MSM8996, MSM8998, Exynos7580, Exynos8890, or Exynos8895 chipsets) software. There is a race condition, with a resultant buffer overflow, in the sec_ts touchscreen sysfs interface. The Samsung ID is SVE-2016-7501 (January 2017).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11040
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) (with USB OTG MyFile2014_L_ESS support) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2015-5068 (June 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11039
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) (AP + CP MDM9x35, or Qualcomm Onechip) software. There is a NULL pointer dereference issue in the IPC socket code. The Samsung ID is SVE-2016-5980 (July 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11038
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with software through 2016-04-05 (incorporating the Samsung Professional Audio SDK). The Jack audio service doesn't implement access control for shared memory, leading to arbitrary code execution or privilege escalation. The Samsung ID is SVE-2016-5953 (July 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11037
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6604. Reason: This candidate is a reservation duplicate of CVE-2016-6604. Notes: All CVE users should reference CVE-2016-6604 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11036
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2016-6008 (August 2016).π Read
via "National Vulnerability Database".
π΄ 71% of Security Pros See Threats Jump Since COVID-19 Outbreak π΄
π Read
via "Dark Reading: ".
Phishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks.π Read
via "Dark Reading: ".
Dark Reading
71% of Security Pros See Threats Jump Since COVID-19 Outbreak
Phishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks.
β FIN6 and TrickBot Combine Forces in βAnchorβ Attacks β
π Read
via "Threatpost".
FIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware.π Read
via "Threatpost".
Threat Post
FIN6 and TrickBot Combine Forces in βAnchorβ Attacks
FIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware.
β xHelper: The Russian Nesting Doll of Android Malware β
π Read
via "Threatpost".
Ultimately delivering the Triada payload, xHelper goes to great lengths to become virtually indestructible once installed on a smartphone.π Read
via "Threatpost".
Threat Post
xHelper: The Russian Nesting Doll of Android Malware
Ultimately delivering the Triada payload, xHelper goes to great lengths to become virtually indestructible once installed on a smartphone.
ATENTIONβΌ New - CVE-2016-11035
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with software through 2016-05-27 (Exynos AP chipsets). A local graphics user can cause a Kernel Crash via the fb0(DECON) frame buffer interface. The Samsung ID is SVE-2016-7011 (October 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11034
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. The decode function in Qjpeg in Qt 5.7 allows attackers to trigger a system crash via a malformed image. The Samsung ID is SVE-2016-6560 (October 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11033
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) software. There is a heap-based buffer overflow in tlc_server. The Samsung IDs are SVE-2016-7220 and SVE-2016-7225 (November 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11032
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) software. An attacker can disable all Sound functionality by broadcasting an unprotected intent. The Samsung IDs are SVE-2016-7179 and SVE-2016-7182 (November 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11031
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) software. AntService allows a system_server crash and reboot. The Samsung ID is SVE-2016-7044 (November 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11030
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) (with Hrm sensor support) software. The sysfs of the MAX86902 sensor driver does not prevent concurrent access, leading to a race condition and resultant heap-based buffer overflow. The Samsung ID is SVE-2016-7341 (December 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11029
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1), M(6.0), and N(7.0) software. Attackers can read the password of the Mobile Hotspot in the log because of an unprotected intent. The Samsung ID is SVE-2016-7301 (December 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11028
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with software through 2016-09-13 (Exynos AP chipsets). There is a stack-based buffer overflow in the OTP TrustZone trustlet. The Samsung IDs are SVE-2016-7173 and SVE-2016-7174 (December 2016).π Read
via "National Vulnerability Database".