ATENTIONβΌ New - CVE-2020-12821
π Read
via "National Vulnerability Database".
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12736
π Read
via "National Vulnerability Database".
Code42 environments with on-premises server versions 7.0.4 and earlier allow for possible remote code execution. When an administrator creates a local (non-SSO) user via a Code42-generated email, the administrator has the option to modify content for the email invitation. If the administrator entered template language code in the subject line, that code could be interpreted by the email generation services, potentially resulting in server-side code injection.π Read
via "National Vulnerability Database".
β Kinda sorta weakened version of EARN IT Act creeps closer β
π Read
via "Naked Security".
Critics say the amended bill that's headed for a full Senate hearing still threatens encryption, albeit less blatantly.π Read
via "Naked Security".
Naked Security
Kinda sorta weakened version of EARN IT Act creeps closer
Critics say the amended bill thatβs headed for a full Senate hearing still threatens encryption, albeit less blatantly.
π How managed service providers can pose a risk to their customers π
π Read
via "Security on TechRepublic".
The US Secret Service has warned organizations about a rise in hacks of MSPs and offers advice on how to beef up security.π Read
via "Security on TechRepublic".
TechRepublic
US Secret Service warns about increased cyberattacks against MSPs
The US Secret Service has warned organizations about a rise in hacks of MSPs and offers advice on how to beef up security.
β 15 Billion Credentials Currently Up for Grabs on Hacker Forums β
π Read
via "Threatpost".
Unprecedented amounts of data for accessing bank accounts and streaming services are being flogged on the dark web.π Read
via "Threatpost".
Threat Post
15 Billion Credentials Currently Up for Grabs on Hacker Forums
Unprecedented amounts of data for accessing bank accounts and streaming services are being flogged on the dark web.
β Mozilla turns off βFirefox Sendβ following malware abuse reports β
π Read
via "Naked Security".
Sadly, the easier and safer you make your file sharing service, the more attractive it becomes to the crooks.π Read
via "Naked Security".
Naked Security
Mozilla turns off βFirefox Sendβ following malware abuse reports
Sadly, the easier and safer you make your file sharing service, the more attractive it becomes to the crooks.
π΄ A Most Personal Threat: Implantable Devices in Secure Spaces π΄
π Read
via "Dark Reading: ".
Do implantable medical devices pose a threat to secure communication facilities? A Virginia Tech researcher says they do, and the problem is growing.π Read
via "Dark Reading: ".
Dark Reading
A Most Personal Threat: Implantable Devices in Secure Spaces
Do implantable medical devices pose a threat to secure communication facilities? A Virginia Tech researcher says they do, and the problem is growing.
π΄ Why Cybersecurity's Silence Matters to Black Lives π΄
π Read
via "Dark Reading: ".
The industry is missing an opportunity to educate the public about bad actors who capitalize off of protest, voting rights education and police brutality petitions through social engineering and phishing attacks.π Read
via "Dark Reading: ".
Dark Reading
Why Cybersecurity's Silence Matters to Black Lives
The industry is missing an opportunity to educate the public about bad actors who capitalize off of protest, voting rights education and police brutality petitions through social engineering and phishing attacks.
β Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks β
π Read
via "Threatpost".
The phishing campaign targeted Office 365 accounts in 62 countries, using business-related reports and the coronavirus pandemic as lures.π Read
via "Threatpost".
Threat Post
Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks
The phishing campaign targeted Office 365 accounts in 62 countries, using business-related reports and the coronavirus pandemic as lures.
π How to encrypt an external drive or card in macOS π
π Read
via "Security on TechRepublic".
Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.π Read
via "Security on TechRepublic".
TechRepublic
How to encrypt an external drive or card in macOS | TechRepublic
Looking to encrypt removable storage on macOS, but can't figure out how? Jack Wallen shows you the way to make this work.
π BYOD: A trend rife with security concerns π
π Read
via "Security on TechRepublic".
Researchers explored the implications of allowing employees to bring their own devices for sensitive work tasks.π Read
via "Security on TechRepublic".
TechRepublic
BYOD: A trend rife with security concerns
Researchers explored the implications of allowing employees to bring their own devices for sensitive work tasks.
ATENTIONβΌ New - CVE-2020-14476
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-11849
π Read
via "National Vulnerability Database".
Elevation of privilege and/or unauthorized access vulnerability in Micro Focus Identity Manager. Affecting versions prior to 4.7.3 and 4.8.1 hot fix 1. The vulnerability could allow information exposure that can result in an elevation of privilege or an unauthorized access.π Read
via "National Vulnerability Database".
β Notorious Hacker βFxmspβ Outed After Widespread Access-Dealing β
π Read
via "Threatpost".
The Kazakh native made headlines last year for hacking McAfee, Symantec and Trend Micro; but the Feds say he's also behind a widespread backdoor operation spanning six continents.π Read
via "Threatpost".
Threat Post
Notorious Hacker βFxmspβ Outed After Widespread Access-Dealing
The Kazakh native made headlines last year for hacking McAfee, Symantec and Trend Micro; but the Feds say he's also behind a widespread backdoor operation spanning six continents.
π΄ Fresh Options for Fighting Fraud in Financial Services π΄
π Read
via "Dark Reading: ".
Fraud prevention requires a consumer-centric, data sharing approach.π Read
via "Dark Reading: ".
Dark Reading
Fresh Options for Fighting Fraud in Financial Services
Fraud prevention requires a consumer-centric, data sharing approach.
ATENTIONβΌ New - CVE-2020-11994
π Read
via "National Vulnerability Database".
Server-Side Template Injection and arbitrary file disclosure on Camel templating componentsπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-19417
π Read
via "National Vulnerability Database".
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-19416
π Read
via "National Vulnerability Database".
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-19415
π Read
via "National Vulnerability Database".
The SIP module of some Huawei products have a denial of service (DoS) vulnerability. A remote attacker could exploit these three vulnerabilities by sending the specially crafted messages to the affected device. Due to the insufficient verification of the packets, successful exploit could allow the attacker to cause buffer overflow and dead loop, leading to DoS condition. Affected products can be found in https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-sip-en.π Read
via "National Vulnerability Database".
π΄ How Advanced Attackers Take Aim at Office 365 π΄
π Read
via "Dark Reading: ".
Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.π Read
via "Dark Reading: ".
Dark Reading
How Advanced Attackers Take Aim at Office 365
Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.
π΄ US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs π΄
π Read
via "Dark Reading: ".
The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.π Read
via "Dark Reading: ".
Dark Reading
US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs
The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.