πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ DDoS Attacks Doubled in Q2 Compared with Prior Quarter πŸ•΄

Most attacks were small, but the big ones got bigger than ever, Cloudflare says.

πŸ“– Read

via "Dark Reading: ".
πŸ” COVID-19 highlights need for business and security leaders to work together to prevent cyberattacks πŸ”

New Tenable study says 94% of organizations experienced a business-impacting cyberattack or compromise within the past 12 months; 46% weathered five or more attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Why Confidential Computing Is a Game Changer πŸ•΄

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2020-13151

Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020 πŸ•΄

The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020 πŸ•΄

Budgets rise as IT complexity continued to challenge companies, with identity and access management technology an increasingly common focus.

πŸ“– Read

via "Dark Reading: ".
❌ NSA Warns Smartphones Leak Location Data ❌

The agency known for its own questionable surveillance activity advised how mobile users can limit others’ ability to track where they are.

πŸ“– Read

via "Threatpost".
❌ Microsoft Teams Patch Bypass Allows RCE ❌

An attacker can hide amidst legitimate traffic in the application's update function.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2020-14347

A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-14344

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-13921

**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-13819

Extreme EAC Appliance 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.

πŸ“– Read

via "National Vulnerability Database".
❌ High-Severity Android RCE Flaw Fixed in August Security Update ❌

Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.

πŸ“– Read

via "Threatpost".
πŸ•΄ Microsoft Teams Vulnerable to Patch Workaround, Researchers Report πŸ•΄

Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ CISA Offers Tool for Career Navigation πŸ•΄

The new Cyber Career Pathways Tool helps individuals understand the roles in cybersecurity and how to prepare for them.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 3 Tips for Securing Open Source Software πŸ•΄

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Attack of the Clone: Next-Gen Social Engineering πŸ•΄

NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Building Cybersecurity Strategies in Sub-Saharan Africa πŸ•΄

Evelyn Kilel and Laura Tich of Shehacks Ke discuss how they are working to build cybersecurity strategies that suit the needs and capabilities of developing nations.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Russian Election Interference: What's Next? πŸ•΄

Nate Beach-Westmoreland gives a look back at the past 10 years of Russian election interference and disinformation campaigns. What can we learn from the past and what should we expect as the 2020 US presidential election approaches?

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Voatz Delivers Multi-Layered Security to Protect Electronic Voting πŸ•΄

SPONSORED CONTENT: While electronic voting has been plagued by fears of tampering or fraud, Voatz is looking to make the process more transparent and auditable, according to company founder Nimit Sawhney. He offers learning points from three recent pilots that highlight how governments can improve the integrity and better protect the voting process and its data.

πŸ“– Read

via "Dark Reading: ".