πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2019-18614

On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. This occurs because, in WICED Studio 6.2 and 6.4, BT_ACL_HOST_TO_DEVICE_DEFAULT_SIZE and BT_ACL_DEVICE_TO_HOST_DEFAULT_SIZE are set to 384.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜Ripple20’ Bugs Impact Hundreds of Millions of Connected Devices ❌

The vulnerabilities affect everything from printers to insulin pumps to ICS gear.

πŸ“– Read

via "Threatpost".
❌ Theft of CIA’s β€˜Vault 7’ Secrets Tied to β€˜Woefully Lax” Security ❌

An internal investigation into the 2016 CIA breach condemned the agency's security measures, saying it β€œfocused more on building up cyber tools than keeping them secure."

πŸ“– Read

via "Threatpost".
⚠ Intel announces β€œexploit busting” features in its next processor chips ⚠

More bad news for cybercrooks... we hope.

πŸ“– Read

via "Naked Security".
πŸ•΄ Cisco Brings SecureX into Full Security Lineup to Cut Complexity πŸ•΄

This step is intended to address growing enterprise concerns around security and complexity, both top of mind among CISOs and CIOs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Ransomware from Your Lawyer's Perspective πŸ•΄

Three good reasons why your incident response team's first call after a data breach should be to outside counsel.

πŸ“– Read

via "Dark Reading: ".
πŸ” IT pros see increased workload and security threats amid shift to remote working πŸ”

Malicious emails, risky employee behavior, and a rise in software vulnerabilities are the top threats seen by IT professionals, says Ivanti.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Fabricator Claims Competitor Poached Employees, Then Data πŸ”

One company is alleging a rival shop lured two of its most senior employees away - along with trade secrets, confidential information, and a list of its customers.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Adobe Patches 18 Critical Flaws in Out-Of-Band Update ❌

Critical vulnerabilities were patched in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush and Audition.

πŸ“– Read

via "Threatpost".
πŸ•΄ 83% of Forbes 2000 Companies' Web Domains Are Poorly Protected πŸ•΄

Only a handful have controls against domain-name hijacking, DNS modifications, and other threats, a new CSC study finds.

πŸ“– Read

via "Dark Reading: ".
❌ Qbot Trojan Reappears to Go After U.S. Banking Customers ❌

The 12-year-old malware is still dangerous, sporting advanced evasion techniques.

πŸ“– Read

via "Threatpost".
πŸ•΄ Adobe Releases PDF Protected Mode for Document Cloud πŸ•΄

The preview, open to Windows users, opens PDF files in a sandbox to protect users who open malicious Acrobat documents.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CIA's 'Lax' Security Led to 2017 Compromise of Its Hacking Tools πŸ•΄

Internal CIA report released today shows poor security controls surrounding the intelligence agency's hacking tools.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 'Ripple20' Bugs Plague Enterprise, Industrial & Medical IoT Devices πŸ•΄

Researchers discover 19 vulnerabilities in a TCP/IP software library manufacturers have used in connected devices for 20 years.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Hosting Provider Hit With Largest-Ever DDoS Attack πŸ•΄

Likely looking to make a statement, attackers targeted specific websites hosted by a single provider with a 1.44 terabit-per-second distributed denial-of-service attack, according to Akamai.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-17655

A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.2 and below may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0540

Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0539

Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0538

Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0537

Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0536

Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access.

πŸ“– Read

via "National Vulnerability Database".