ATENTIONβΌ New - CVE-2017-18797
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects R6400 before 1.0.1.24, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18796
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by command injection. This affects R6400 before 1.0.1.24, R6700 before 1.0.1.26, R6900 before 1.0.1.28, R7000 before 1.0.9.10, R7000P before 1.0.1.16, R6900P before 1.0.1.16, and R7800 before 1.0.2.36.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18795
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by command injection. This affects D6220 before 1.0.0.28 and D6100 before 1.0.0.50_0.0.50.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18794
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by command injection. This affects R6300v2 before 1.0.4.8_10.0.77, R6400 before 1.0.1.24, R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, R8500 before 1.0.2.100, and D6100 before 1.0.0.50_0.0.50.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18793
π Read
via "National Vulnerability Database".
NETGEAR R7800 devices before 1.0.2.36 are affected by command injection.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18792
π Read
via "National Vulnerability Database".
NETGEAR D6100 devices before 1.0.0.50_0.0.50 are affected by command injection.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18791
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by CSRF. This affects R6050/JR6150 before 1.0.1.7, PR2000 before 1.0.0.17, R6220 before 1.1.0.50, WNDR3700v5 before 1.1.0.48, JNR1010v2 before 1.1.0.40, JWNR2010v5 before 1.1.0.40, WNR1000v4 before 1.1.0.40, WNR2020 before 1.1.0.40, WNR2050 before 1.1.0.40, WNR614 before 1.1.0.40, WNR618 before 1.1.0.40, and D7000 before 1.0.1.50.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-18790
π Read
via "National Vulnerability Database".
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100.π Read
via "National Vulnerability Database".
π΄ Researchers Use Microsoft Terminal Services Client in New Attack Method π΄
π Read
via "Dark Reading: ".
The technique would enable attackers to run malicious code via Remote Desktop Protocol using DLL side-loading to bypass security controls.π Read
via "Dark Reading: ".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π΄ Automated Bots Are Increasingly Scraping Data & Attempting Logins π΄
π Read
via "Dark Reading: ".
The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.π Read
via "Dark Reading: ".
Dark Reading
Automated Bots Are Increasingly Scraping Data & Attempting Logins
The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.
β Banking.BR Android Trojan Emerges in Credential-Stealing Attacks β
π Read
via "Threatpost".
A new Android trojan targets banking customers with overlay attacks to steal their bank credentials and ultimately take over their accounts.π Read
via "Threatpost".
Threat Post
Banking.BR Android Trojan Emerges in Credential-Stealing Attacks
A new Android trojan targets banking customers with overlay attacks to steal their bank credentials and ultimately take over their accounts.
π COVID-19 contact tracing: The tricky balance between privacy and relief efforts π
π Read
via "Security on TechRepublic".
As more governments consider the use of contact tracing apps to prevent the spread of coronavirus, researchers say privacy will have to be at the forefront of efforts in order for civilians to use it.π Read
via "Security on TechRepublic".
TechRepublic
COVID-19 contact tracing: The tricky balance between privacy and relief efforts
As more governments consider the use of contact tracing apps to prevent the spread of coronavirus, researchers say privacy will have to be at the forefront of efforts in order for civilians to use it.
β Gaming company targeted by Chinese Winnti hackers β
π Read
via "Naked Security".
Far from pausing operations during the COVID-19 pandemic, Chinaβs notorious Winnti hacking group has been busy launching new attacks on targets, researchers say.π Read
via "Naked Security".
Naked Security
Gaming company targeted by Chinese Winnti hackers
Far from pausing operations during the COVID-19 pandemic, Chinaβs notorious Winnti hacking group has been busy launching new attacks on targets, researchers say.
β 309 million Facebook usersβ phone numbers (and more) found online β
π Read
via "Naked Security".
First, 267m records were exposed & sold for 0.0002 cents each on the Dark Web. It was taken down but got reposted with yet more records.π Read
via "Naked Security".
Naked Security
309 million Facebook usersβ phone numbers found online
First, 267m records were exposed & sold for 0.0002 cents each on the Dark Web. It was taken down but got reposted with yet more records.
π Zoom is introducing this new feature in its bid to banish Zoom bombing π
π Read
via "Security on TechRepublic".
A new button allowing meeting participants to report users is Zoom's latest attempt to bring its security features up to scratch.π Read
via "Security on TechRepublic".
TechRepublic
Zoom is introducing this new feature in its bid to banish Zoom bombing
A new button allowing meeting participants to report users is Zoom's latest attempt to bring its security features up to scratch.
β Porn scammers making $100,000 a month from sextortion emails β
π Read
via "Naked Security".
SophosLabs worked through five monthsβ worth of βporn scamβ emails and followed the money. Learn what they found...π Read
via "Naked Security".
Naked Security
Porn scammers making $100,000 a month from sextortion emails
SophosLabs worked through five monthsβ worth of βporn scamβ emails and followed the money. Learn what they foundβ¦
π΄ Domain Registrars Under Pressure to Combat COVID-19-Related Scams π΄
π Read
via "Dark Reading: ".
A huge increase in malicious website registrations has prompted concern from US lawmakers.π Read
via "Dark Reading: ".
Dark Reading
Domain Registrars Under Pressure to Combat COVID-19-Related Scams
A huge increase in malicious website registrations has prompted concern from US lawmakers.
β Small Businesses Tapping COVID-19 Loans Hit with Data Exposure β
π Read
via "Threatpost".
The SBA said sensitive information about applicants may have been revealed to others applying for disaster loan program funds.π Read
via "Threatpost".
Threat Post
Small Businesses Tapping COVID-19 Loans Hit with Data Exposure
The SBA said sensitive information about applicants may have been revealed to others applying for disaster loan program funds.
π How to better protect your organization against email threats π
π Read
via "Security on TechRepublic".
As most generic spam now gets blocked, attackers have turned to more targeted, personalized phishing emails to reel in their victims, according to security firm Trustwave.π Read
via "Security on TechRepublic".
TechRepublic
How to better protect your organization against email threats
As most generic spam now gets blocked, attackers have turned to more targeted, personalized phishing emails to reel in their victims, according to security firm Trustwave.
π΄ 8 Steps to Enhance Government Agencies' Security Posture π΄
π Read
via "Dark Reading: ".
Given the heterogeneous architectures of critical state and local systems, it's imperative we learn from the security exposures of other critical infrastructure and pledge to be betterπ Read
via "Dark Reading: ".
Dark Reading
8 Steps to Enhance Government Agencies' Security Posture
Given the heterogeneous architectures of critical state and local systems, it's imperative we learn from the security exposures of other critical infrastructure and pledge to be better