πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Identite Comes Out of Stealth πŸ•΄

Startup emerges with three-factor, no-password authentication.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Project Aims to Unmask Disinformation Bots πŸ•΄

BotSight, a machine learning research project, rates Twitter users based on the likelihood that there is a human behind the keyboard. Could such technology blunt the impact of disinformation campaigns?

πŸ“– Read

via "Dark Reading: ".
πŸ” Phishing campaign exploits Symantec URL Protection to cover its tracks πŸ”

The email also claims to have been scanned by Symantec email security, according to security provider Armorblox.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Microsoft Patch for Reverse RDP Flaw Leaves Room for Other Attacks πŸ•΄

Fix released in February is Microsoft's second pass at fully addressing issue that Check Point first disclosed at Black Hat USA last summer.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ As Businesses Rush to the Cloud, Security Teams Struggle to Keep Up πŸ•΄

Most organizations have a gap between current and planned cloud usage and the maturity of their cloud security programs.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-0097

In various methods of PackageManagerService.java, there is a possible permission bypass due to a missing condition for system apps. This could lead to local escalation of privilege with User privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-145981139

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0096

In startActivities of ActivityStartController.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9Android ID: A-145669109

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0094

In setImageHeight and setImageWidth of ExifUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-148223871

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0093

In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0092

In setHideSensitive of NotificationStackScrollLayout.java, there is a possible disclosure of sensitive notification content due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145135488

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0091

In mnld, an incorrect configuration in driver_cfg of mnld for meta factory mode.Product: AndroidVersions: Android SoCAndroid ID: A-149808700

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0090

An improper authorization in the receiver component of Email.Product: AndroidVersions: Android SoCAndroid ID: A-149813048

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0065

An improper authorization in the receiver component of the Android Suite Daemon.Product: AndroidVersions: Android SoCAndroid ID: A-149813448

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0064

An improper authorization while processing the provisioning data.Product: AndroidVersions: Android SoCAndroid ID: A-149866855

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0024

In onCreate of SettingsBaseActivity.java, there is a possible unauthorized setting modification due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-137015265

πŸ“– Read

via "National Vulnerability Database".
⚠ Microsoft joins encrypted DNS club with Windows 10 option ⚠

Microsoft is the latest browser vendor to join the encrypted DNS club by supporting DNS over HTTPS in Windows 10.

πŸ“– Read

via "Naked Security".
⚠ Top 10 most exploited vulnerabilities list released by FBI, DHS CISA ⚠

The agencies say it's vital to prioritize patching. Otherwise, we're making it easy for attackers who don't have to work at finding 0 days.

πŸ“– Read

via "Naked Security".
⚠ How scammers abuse Google Search’s open redirect feature ⚠

Google Search uses open redirects by design, which is handy if you're a scammer trying to hide an iffy-looking URL.

πŸ“– Read

via "Naked Security".
❌ Paying Ransomware Crooks Doubles Clean-up Costs, Report ❌

Paying ransom to cybercriminals costs companies hit with ransomware attacks more than recovering data on their own, according to a new research.

πŸ“– Read

via "Threatpost".
⚠ S2 Ep 39: Thunderspy, government encryption, and reply all mistakes – Naked Security Podcast ⚠

In this episode Mark discusses government encryption, Duck tells us why turning your computer off is a cool idea and Greg regales us with his reply all woes. Host Anna Brading is joined by Sophos experts Mark Stockley, Paul Ducklin, Greg Iddon and Producer Alice Duckett. Listen now! LISTEN NOW Click-and-drag on the soundwaves below […]

πŸ“– Read

via "Naked Security".
πŸ•΄ 4 Challenges with Existing VPNs πŸ•΄

A VPN is a step in the right direction, but it's not the be-all and end-all when it comes to security and falls short in many ways.

πŸ“– Read

via "Dark Reading: ".