πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-15114

In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting itself until there are no more available file descriptors to accept connections on the gateway.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11937

In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem ❌

An inside look at how nation-states use social media to influence, confuse and divide -- and why cybersecurity researchers should be involved.

πŸ“– Read

via "Threatpost".
πŸ•΄ Getting to the Root: How Researchers Identify Zero-Days in the Wild πŸ•΄

Google Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.

πŸ“– Read

via "Dark Reading: ".
❌ Augmenting AWS Security Controls ❌

Appropriate use of native security controls in AWS and other CSPs is fundamental to managing cloud risk and avoiding costly breaches.

πŸ“– Read

via "Threatpost".
⚠ Business Email Compromise – fighting back with machine learning ⚠

Machine learning models are immune to blandishments, threats, flattery and so - so why not set them against social engineers?

πŸ“– Read

via "Naked Security".
❌ Hackers Dump 20GB of Intel’s Confidential Data Online ❌

Chipmaker investigates a leak of intellectual property from its partner and customer resource center.

πŸ“– Read

via "Threatpost".
πŸ•΄ IoT Security During COVID-19: What We've Learned & Where We're Going πŸ•΄

Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.

πŸ“– Read

via "Dark Reading: ".
πŸ” Report: Two new encryption standards will soon sweep away security controls πŸ”

Security professionals must act before TLS 1.3 and DNS-over-HTTPS (DoH) are implemented or they won't be able to analyze network traffic and detect cyberthreats, warns Forrester Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ BEC Campaigns Target Financial Execs via Office 365 πŸ•΄

A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Researcher Finds New Office Macro Attacks for MacOS πŸ•΄

Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to limit file upload size on NGINX to mitigate DoS attack πŸ”

If you have an NGINX site that must allow users to upload files, try this configuration to help prevent possible Denial-of-Service attacks.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Friday Five: 8/7 Edition πŸ”

Telstra suffers a DoS attack, the hackers behind last month's Twitter breach are arrested, and an NSA advisory warns mobile users about the dangers of location data - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
ATENTIONβ€Ό New - CVE-2020-11993

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11985

IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11984

Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-11852

DKIM key management page vulnerability on Micro Focus Secure Messaging Gateway (SMG). Affecting all SMG Appliance running releases prior to July 2020. The vulnerability could allow a logged in user with rights to generate DKIM key information to inject system commands into the call to the DKIM system command.

πŸ“– Read

via "National Vulnerability Database".
❌ Have I Been Pwned Set to Go Open-Source ❌

Fully opening the door to allow people to contribute to – and notably, tinker with – the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt.

πŸ“– Read

via "Threatpost".
πŸ•΄ 400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones πŸ•΄

Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.

πŸ“– Read

via "Dark Reading: ".
❌ Attackers Horn in on MFA Bypass Options for Account Takeovers ❌

Legacy applications don't support modern authentication -- and cybercriminals know this.

πŸ“– Read

via "Threatpost".
πŸ•΄ Hacking the PLC via Its Engineering Software πŸ•΄

Researcher will demonstrate at DEF CON an emerging threat to industrial control networks.

πŸ“– Read

via "Dark Reading: ".