π΄ Microsoft Issues Out-of-Band Patches for RCE Flaws π΄
π Read
via "Dark Reading: ".
Vulnerabilities had not been exploited or publicly disclosed before fixes were released, Microsoft reports.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ New MacOS Ransomware Hides in Pirated Program π΄
π Read
via "Dark Reading: ".
A bogus installer for Little Snitch carries a ransomware hitchhiker.π Read
via "Dark Reading: ".
Dark Reading
New MacOS Ransomware Hides in Pirated Program
A bogus installer for Little Snitch carries a ransomware hitchhiker.
β Alina Point-of-Sale Malware Spotted in Ongoing Campaign β
π Read
via "Threatpost".
The malware is using DNS tunneling to exfiltrate payment-card data.π Read
via "Threatpost".
Threat Post
Alina Point-of-Sale Malware Spotted in Ongoing Campaign
The malware is using DNS tunneling to exfiltrate payment-card data.
β Cisco Warns of High-Severity Bug in Small Business Switch Lineup β
π Read
via "Threatpost".
A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.π Read
via "Threatpost".
Threat Post
Cisco Warns of High-Severity Bug in Small Business Switch Lineup
A high-severity flaw allows remote, unauthenticated attackers to potentially gain administrative privileges for Cisco small business switches.
π΄ DHS Shares Data on Top Cyberthreats to Federal Agencies π΄
π Read
via "Dark Reading: ".
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.π Read
via "Dark Reading: ".
Dark Reading
DHS Shares Data on Top Cyberthreats to Federal Agencies
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
π΄ Businesses Invest in Cloud Security Tools Despite Concerns π΄
π Read
via "Dark Reading: ".
A majority of organizations say the acceleration was driven by a need to support more remote employees.π Read
via "Dark Reading: ".
Dark Reading
Businesses Invest in Cloud Security Tools Despite Concerns
A majority of organizations say the acceleration was driven by a need to support more remote employees.
π΄ Chinese Software Company Aisino Uninstalls GoldenSpy Malware π΄
π Read
via "Dark Reading: ".
Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.π Read
via "Dark Reading: ".
Dark Reading
Chinese Software Company Aisino Uninstalls GoldenSpy Malware
Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable.
ATENTIONβΌ New - CVE-2019-15312
π Read
via "National Vulnerability Database".
An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is a Zolo Halo DNS rebinding attack. The device was found to be vulnerable to DNS rebinding. Combined with one of the many /httpapi.asp endpoint command-execution security issues, the DNS rebinding attack could allow an attacker to compromise the victim device from the Internet.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-15311
π Read
via "National Vulnerability Database".
An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-15310
π Read
via "National Vulnerability Database".
An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.π Read
via "National Vulnerability Database".
π΄ Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign π΄
π Read
via "Dark Reading: ".
Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.π Read
via "Dark Reading: ".
Dark Reading
Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign
Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.
ATENTIONβΌ New - CVE-2019-20417
π Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate internal services via an Information Disclosure vulnerability. The vulnerability is only exploitable if WebSudo is disabled in Jira. The affected versions are before version 8.4.2.π Read
via "National Vulnerability Database".
β 133m records for sale as fruits of data breach spree keep raining down β
π Read
via "Naked Security".
Databases can be had for as little as $100, on up to $1,100. Most, if not all, are being sold by the hacking group Shiny Hunters.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π΄ 7 IoT Tips for Home Users π΄
π Read
via "Dark Reading: ".
Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep every one secure.π Read
via "Dark Reading: ".
Dark Reading
7 IoT Tips for Home Users
Whether for business or pleasure, you're on your own once you walk into the house with a new Internet of Things device. Here's how to keep everyone secure.
π Zoom: We've delivered on all of our security and privacy promises, apart from one π
π Read
via "Security on TechRepublic".
CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report.π Read
via "Security on TechRepublic".
TechRepublic
Zoom: We've delivered on all of our security and privacy promises, apart from one
CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report.
π΄ DHS Shares Data on Top Cyber Threats to Federal Agencies π΄
π Read
via "Dark Reading: ".
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.π Read
via "Dark Reading: ".
Dark Reading
DHS Shares Data on Top Cyber Threats to Federal Agencies
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
β FakeSpy Android Malware Spread Via βPostal-Serviceβ Apps β
π Read
via "Threatpost".
New βsmishingβ campaigns from the Roaming Mantis threat group infect Android users with the FakeSpy infostealer.π Read
via "Threatpost".
Threat Post
FakeSpy Android Malware Spread Via βPostal-Serviceβ Apps
New βsmishingβ campaigns from the Roaming Mantis threat group infect Android users with the FakeSpy infostealer.
π΄ Lessons from COVID-19 Cyberattacks: Where Do We Go Next? π΄
π Read
via "Dark Reading: ".
We need to learn from the attacks and attempts that have occurred in order to prepare for the future.π Read
via "Dark Reading: ".
Dark Reading
Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
We need to learn from the attacks and attempts that have occurred in order to prepare for the future.
β MongoDB ransom threats step up from blackmail to full-on wiping β
π Read
via "Naked Security".
Still thinking "the crooks probably won't find me if I make a security blunder"?π Read
via "Naked Security".
Naked Security
MongoDB ransom threats step up from blackmail to full-on wiping
Still thinking βthe crooks probably wonβt find me if I make a security blunderβ?
π EU Data Protection Authority Wants to Promote Digital Justice π
π Read
via "Subscriber Blog RSS Feed ".
The European Data Protection Supervisor (EDPS) announced its plans for 2020-2024 this week and stressed that the EU needs digital solidarity and to make data work for all people across Europeβs borders.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
EU Data Protection Authority Wants to Promote Digital Justice
The European Data Protection Supervisor (EDPS) announced its plans for 2020-2024 this week and stressed that the EU needs digital solidarity and to make data work for all people across Europeβs borders.
π AIEngine 2.0.0 π
π Go!
via "Security Tool Files β Packet Storm".
AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
AIEngine 2.0.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers