ATENTIONβΌ New - CVE-2019-14130
π Read
via "National Vulnerability Database".
Memory corruption can occurs in trusted application if offset size from HLOS is more than actual mapped buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14124
π Read
via "National Vulnerability Database".
Memory failure in content protection module due to not having pointer within the scope in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14123
π Read
via "National Vulnerability Database".
Possible buffer overflow and over read possible due to missing bounds checks for fixed limits if we consider widevine HLOS client as non-trustable in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14101
π Read
via "National Vulnerability Database".
Out of bounds read can happen in diag event set mask command handler when user provided length in the command request is less than expected length in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14100
π Read
via "National Vulnerability Database".
Register write via debugfs is disabled by default to prevent register writing via debugfs. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9207C, MDM9607, Nicobar, QCS405, SA6155P, SC8180X, SDX55, SM8150π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14099
π Read
via "National Vulnerability Database".
Device misbehavior may be observed when incorrect offset, length or number of buffers is passed by user space in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8953, Nicobar, QCM2150, QCS405, QCS605, QM215, Saipan, SC8180X, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14093
π Read
via "National Vulnerability Database".
Array out of bound access can occur in display module due to lack of bound check on input parcel received in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, QCM2150, QCS405, QCS605, QM215, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM632, SDM636, SDM660, SDX20π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14037
π Read
via "National Vulnerability Database".
Close and bind operations done on a socket can lead to a Use-After-Free condition. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8996, MSM8996AU, QCN7605, QCN7606, QCS605, SC8180X, SDA660, SDA845, SDM439, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM8150, SXR1130π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-10580
π Read
via "National Vulnerability Database".
When kernel thread unregistered listener, Use after free issue happened as the listener client`s private data has been already freed in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9607, MSM8909W, Nicobar, QCM2150, QCS405, QCS605, Saipan, SC8180X, SDM429W, SDX55, SM8150, SM8250, SXR2130π Read
via "National Vulnerability Database".
β Critical, High-Severity Cisco Flaws Fixed in Data Center Network Manager β
π Read
via "Threatpost".
The flaw could allow a remote, unauthenticated attacker to bypass authentication on vulnerable devices.π Read
via "Threatpost".
Threat Post
Critical, High-Severity Cisco Flaws Fixed in Data Center Network Manager
The flaw could allow a remote, unauthenticated attacker to bypass authentication on vulnerable devices.
π How to find and fix vulnerable default credentials on your network π
π Read
via "Security on TechRepublic".
Network appliances and devices that still have their default credentials present a risk to your organization, says SecurityHQ.π Read
via "Security on TechRepublic".
TechRepublic
How to find and fix vulnerable default credentials on your network
Network appliances and devices that still have their default credentials present a risk to your organization, says SecurityHQ.
β Servers at risk from βBootHoleβ bug β what you need to know β
π Read
via "Naked Security".
We explain the "BootHole" vulnerablity - as usual, in plain English and without hype. Find if you're affected and what to do.π Read
via "Naked Security".
Naked Security
Servers at risk from βBootHoleβ bug β what you need to know
We explain the βBootHoleβ vulnerability β as usual, in plain English and without hype. Find if youβre affected and what to do.
π΄ Black Hat Virtually: An Important Time to Come Together as a Community π΄
π Read
via "Dark Reading: ".
The significance of this year's event hasn't changed a whit. It's an opportunity to share what we've learned, and plan how to protect each other and the public for the remainder of the pandemic and beyond.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Virtually: An Important Time to Come Together as a Community
The significance of this year's event hasn't changed a whit. It's an opportunity to share what we've learned, and plan how to protect each other and the public for the remainder of the pandemic and beyond.
π How to set up passwordless SSH authentication for Ubuntu Server π
π Read
via "Security on TechRepublic".
Learn how to enable passwordless SSH authentication on both Linux and macOS.π Read
via "Security on TechRepublic".
TechRepublic
How to set up passwordless SSH authentication for Ubuntu Server
Learn how to enable passwordless SSH authentication on both Linux and macOS.
β Doki Backdoor Infiltrates Docker Servers in the Cloud β
π Read
via "Threatpost".
The malware is a new payload that uses Dogecoin wallets for its C2, and spreads via the Ngrok botnet.π Read
via "Threatpost".
Threat Post
Doki Backdoor Infiltrates Docker Servers in the Cloud
The malware is a new payload that uses Dogecoin wallets for its C2, and spreads via the Ngrok botnet.
π΄ Citizens Are Increasingly Worried About How Companies Use Their Data π΄
π Read
via "Dark Reading: ".
With data privacy important to almost every American, more than two-thirds of those surveyed say they don't trust companies to ethically sell their data.π Read
via "Dark Reading: ".
Dark Reading
Citizens Are Increasingly Worried About How Companies Use Their Data
With data privacy important to almost every American, more than two-thirds of those surveyed say they don't trust companies to ethically sell their data.
π FBI Warns of Hackers Exploiting Built-In Network Protocols π
π Read
via "Subscriber Blog RSS Feed ".
The FBI warned organizations last week that attackers are increasingly using built-in network protocols to launch destructive distributed denial of service attacks.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
FBI Warns of Hackers Exploiting Built-In Network Protocols
The FBI warned organizations last week that attackers are increasingly using built-in network protocols to launch destructive distributed denial of service attacks.
π΄ Google Adds Security Updates to Chrome Autofill π΄
π Read
via "Dark Reading: ".
Chrome users can retrieve payment card numbers via biometric authentication and use a new "touch-to-fill: feature to log in to accounts.π Read
via "Dark Reading: ".
Dark Reading
Google Adds Security Updates to Chrome Autofill
Chrome users can retrieve payment card numbers via biometric authentication and use a new touch-to-fill: feature to log in to accounts.
π΄ 5 Tips for Optimizing Your Company's Cyber-Crisis Preparedness π΄
π Read
via "Dark Reading: ".
Cyber-incident response often addresses short-term needs, but we need to broaden the view of crisis management to be more forward-thinking.π Read
via "Dark Reading: ".
Dark Reading
5 Tips for Optimizing Your Company's Cyber-Crisis Preparedness
Cyber-incident response often addresses short-term needs, but we need to broaden the view of crisis management to be more forward-thinking.
π΄ Poll: Endpoint Extravaganza π΄
π Read
via "Dark Reading: ".
What shape do you expect remote endpoints to be in when they start winging their way back to the office?π Read
via "Dark Reading: ".
Dark Reading
Poll: Endpoint Extravaganza
What shape do you expect remote endpoints to be in when they start winging their way back to the office?
π How to add fingerprint authentication to your Windows 10 computer π
π Read
via "Security on TechRepublic".
You can easily add a fingerprint reader to your computer if one isn't already built in.π Read
via "Security on TechRepublic".
TechRepublic
How to add fingerprint authentication to your Windows 10 computer
You can easily add a fingerprint reader to your computer if one isn't already built in.