🛡 Cybersecurity & Privacy 🛡 - News
25.9K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Applying the 80-20 Rule to Cybersecurity 🕴

How security teams can achieve 80% of the benefit for 20% of the work.

📖 Read

via "Dark Reading: ".
🔐 Remote workers aren't taking security seriously. Now that has to change 🔐

IT teams help can mitigate the risks of shadow IT by being more flexible and adapting to the needs of remote workers, according to a new study.

📖 Read

via "Security on TechRepublic".
Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

Admins should patch their Citrix ADC and Gateway installs immediately.

📖 Read

via "Threatpost".
🔐 65% of organizations saw at least 3 OT system intrusions within the past year 🔐

As OT tech becomes more advanced, so do the cybersecurity concerns surrounding it, Fortinet found.

📖 Read

via "Security on TechRepublic".
🔐 Bitdefender unveils Human Risk Analytics to protect against human error 🔐

Part of the company's GravityZone product, the new feature analyzes user mistakes and errors to help track and mitigate them.

📖 Read

via "Security on TechRepublic".
🛠 GRR 3.4.2.0 🛠

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
ATENTION New - CVE-2020-15037

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Reports-Devices.php page st[] parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-15036

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Linked.php dv parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10745

A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10730

A NULL pointer dereference, or possible use-after-free flaw was found in the in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-4324

"HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy."

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2019-4323

"HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame."

📖 Read

via "National Vulnerability Database".
Cerberus Banking Trojan Unleashed on Google Play

The Cerberus malware can steal banking credentials, bypass security measures and access text messages.

📖 Read

via "Threatpost".
🔐 How to enable two-factor authentication for Bitwarden 🔐

If you use Bitwarden as your password manager of choice, you owe it to yourself to enable two-factor authentication.

📖 Read

via "Security on TechRepublic".
🔐 Credit card skimmers target e-commerce websites running Microsoft IIS and ASP.NET 🔐

Attackers are looking for credit card numbers on Microsoft IIS servers running an older and vulnerable version of ASP.NET, says Malwarebytes.

📖 Read

via "Security on TechRepublic".
🕴 Framing the Security Story: The Simplest Threats Are the Most Dangerous 🕴

Don't be distracted by flashy advanced attacks and ignore the more mundane ones.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2020-15032

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Incidents.php id parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-15031

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Assets-Management.php chg parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-15030

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Routes.php rtr parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-15029

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Assets-Management.php sn parameter.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-15028

NeDi 1.9C is vulnerable to a cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Topology-Map.php xo parameter.

📖 Read

via "National Vulnerability Database".