πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Zoom Zero-Day Allows RCE, Patch on the Way ❌

Researchers said that the issue is only exploitable on Windows 7 and earlier.

πŸ“– Read

via "Threatpost".
πŸ•΄ When WAFs Go Wrong πŸ•΄

Web application firewalls are increasingly disappointing enterprises today. Here's why.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-17638

In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.).

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Warns on OAuth Attacks Against Cloud App Users ❌

Application-based attacks that use the passwordless "log in with..." feature common to cloud services are on the rise.

πŸ“– Read

via "Threatpost".
πŸ•΄ 'Joker' Android Malware Pulls Another Trick to Land on Google's Play Store πŸ•΄

Authors of the malware, which signs up mobile users for premium services, are repeatedly finding ways to bypass app review checks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Omdia Research Launches Page On Dark Reading πŸ•΄

Data and insight from a leading cybersecurity research and analysis team will broaden the information available to security professionals and technology vendors.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Up Close with Evilnum, the APT Group Behind the Malware πŸ•΄

The group behind Evilnum malware, which continues to target financial institutions, appears to be testing new techniques.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Huge DDoS Attack Launched Against Cloudflare in Late June πŸ•΄

The 754 million packets-per-second peak was part of a four-day attack involving more than 316,000 sending addresses.

πŸ“– Read

via "Dark Reading: ".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.3.6 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ Using Adversarial Machine Learning, Researchers Look to Foil Facial Recognition πŸ•΄

For privacy-seeking users, good news: Computer scientists are finding more ways to thwart facial and image recognition. But there's also bad news: Gains will likely be short-lived.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat USA Debuts Cyber-Physical Systems Briefings Track πŸ•΄

Discover how to defend systems where computers monitor, manage, and control a physical process.

πŸ“– Read

via "Dark Reading: ".
❌ Report: Most Popular Home Routers Have β€˜Critical’ Flaws ❌

Common devices from Netgear, Linksys, D-Link and others contain serious security vulnerabilities that even updates don’t fix.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Security Tips as the July 15 Tax-Day Extension Draws Near πŸ•΄

We're continuing to see cybercriminals take advantage of COVID-19, and the extension of Tax Day will be the next technique used in their sophisticated method of attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Software-defined perimeters may be the solution to remote work security concerns πŸ”

The massive remote work shift due to COVID-19 has increased interest in SDPs, with 70% of respondents polled for a new report saying they're now considering adopting one in the coming year.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  Sifter 8 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ•΄ As Offices Reopen, Hardware from Home Threatens Security πŸ•΄

Devices out of sight for the past several months could spell trouble when employees bring them back to work.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Zoom Patches Zero-Day Vulnerability in Windows 7 πŸ•΄

The flaw also affects older versions of the operating system, even if they're fully patched.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2013-1703

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2013-0802

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2012-6492

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2012. Notes: none.

πŸ“– Read

via "National Vulnerability Database".