πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-10606

In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10602

In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data Archive.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10600

In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Archive Subsystem when the subsystem is working under memory pressure. This can result in blocking queries to PI Data Archive.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10614

In OSIsoft PI System multiple products and versions, an authenticated remote attacker with write access to PI Vision databases could inject code into a display. Unauthorized information disclosure, deletion, or modification is possible if a victim views the infected display.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10604

In OSIsoft PI System multiple products and versions, a remote, unauthenticated attacker could crash PI Network Manager service through specially crafted requests. This can result in blocking connections and queries to PI Data Archive.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 7 Summer Travel Security Tips πŸ•΄

With staying safe during the pandemic high priority, it's easy to let your guard down about the security of the devices you take along your travels.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Block/Allow: The Changing Face of Hacker Linguistics πŸ•΄

Terms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.

πŸ“– Read

via "Dark Reading: ".
⚠ ProLock ransomware – new report reveals the evolution of a threat ⚠

Ransomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they'd never pay up.

πŸ“– Read

via "Naked Security".
πŸ•΄ Pandemic Credential Stuffing: Cybersecurity's Ultimate Inside Job πŸ•΄

How stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.

πŸ“– Read

via "Dark Reading: ".
πŸ” Which workers are your biggest security nightmare? It might not be the people you expect πŸ”

Businesses need to approach cybersecurity in a way that resonates with employees, namely by putting them at the centre.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-11110

Grafana through 6.7.1 allows stored XSS.

πŸ“– Read

via "National Vulnerability Database".
❌ Encryption Under β€˜Full-Frontal Nuclear Assault’ By U.S. Bills ❌

The U.S. government and tech companies continue to butt heads over the idea of encryption and what that means for law enforcement.

πŸ“– Read

via "Threatpost".
⚠ Monday review – our recent stories revisited ⚠

Our most recent articles and videos, all in one place.

πŸ“– Read

via "Naked Security".
❌ Attackers Exploiting High-Severity Network Security Flaw, Cisco Warns ❌

Attackers are exploiting a high-severity vulnerability in Cisco's network security software products, which is used by Fortune 500 companies.

πŸ“– Read

via "Threatpost".
πŸ” What is AWS Security? πŸ”

Amazon Web Services (AWS) is a leading cloud service provider, equipped with various security features. In this post, we’ll discuss the security components that make AWS a secure cloud platform.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ›  Sifter 8.7 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
πŸ›  Scapy Packet Manipulation Tool 2.4.4rc2 πŸ› 

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
ATENTIONβ€Ό New - CVE-2020-1425

A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1457.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-10609

Grundfos CIM 500 v06.16.00 stores plaintext credentials, which may allow sensitive information to be read or allow modification to system settings by someone with access to the device.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Revamps Windows Insider Preview Bug Bounty Program ❌

Researchers can earn up to $100,000 for finding vulnerabilities in Microsoft's revamped Windows Insider Preview bug bounty program.

πŸ“– Read

via "Threatpost".
πŸ•΄ Ratings for Open Source Projects Aim to Make Software More Secure πŸ•΄

Two companies have teamed up to rate open source projects, but can adopting repository ratings help developers make better decisions regarding open source?

πŸ“– Read

via "Dark Reading: ".