πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-11950

VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to upload and execute a script (with resultant execution of OS commands). For example, this affects IT9388-HT devices.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11949

testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.

πŸ“– Read

via "National Vulnerability Database".
⚠ Inside a ransomware gang’s attack toolbox ⚠

Ransomware's changed a lot over the years - here's a peek into a criminal gang's current toolbox...

πŸ“– Read

via "Naked Security".
πŸ” Data Trends Report Highlights Risk of Data Loss in Pandemic πŸ”

With nearly everyone these days working from home, how has the COVID-19 crisis impacted the risk of sensitive data loss?

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How one hacktivist became a full-fledged cybercriminal πŸ”

Though hacktivism can sometimes stem from a legitimate cause, one person couldn't resist turning to true cybercrime, according to Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
❌ PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time ❌

Microsoft has warned on a new breed of patient ransomware attacks that lurk in networks for weeks before striking.

πŸ“– Read

via "Threatpost".
πŸ•΄ Data Loss Spikes Under COVID-19 Lockdowns πŸ•΄

Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google, Microsoft Brands Impersonated the Most in Form-Based Attacks πŸ•΄

Attackers are preying on users' inclination to click on familiar-looking websites, but instead trick them into sharing usernames and passwords.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Vulnerability Disclosures Drop in Q1 for First Time in a Decade πŸ•΄

Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to properly secure sysctl on Linux πŸ”

Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13362

In QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-13361

In QEMU 4.2.0, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-20807

In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).

πŸ“– Read

via "National Vulnerability Database".
❌ Google Location Tracking Lambasted in Arizona Lawsuit ❌

The lawsuit, filed against Google by Arizona's Attorney General, alleges that the tech giant uses β€œdeceptive and unfair conduct” to obtain users’ location data.

πŸ“– Read

via "Threatpost".
πŸ•΄ 3 SMB Cybersecurity Myths Debunked πŸ•΄

Small and midsize businesses are better at cyber resilience than you might think.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NSA Warns Russia's 'Sandworm' Group Is Targeting Email Servers πŸ•΄

The Russian military group has been exploiting a flaw in the Exim mail transfer agent since last August, the NSA reports.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable two-factor authentication for Bitwarden πŸ”

If you use Bitwarden as your password manager of choice, you owe it to yourself to enable two-factor authentication.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-13245

Certain NETGEAR devices are affected by Missing SSL Certificate Validation. This affects R7000 1.0.9.6_1.2.19 through 1.0.11.100_10.2.10, and possibly R6120, R7800, R6220, R8000, R6350, R9000, R6400, RAX120, R6400v2, RBR20, R6800, XR300, R6850, XR500, and R7000P.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11079

node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.

πŸ“– Read

via "National Vulnerability Database".
❌ Hackers Compromise Cisco Servers Via SaltStack Flaws ❌

Attackers compromised six Cisco VIRL-PE servers that are affected by critical SaltStack vulnerabilities.

πŸ“– Read

via "Threatpost".
πŸ•΄ Valak Malware Retasked to Steal Data from US, German Firms πŸ•΄

Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.

πŸ“– Read

via "Dark Reading: ".