β Have I Been Pwned Set to Go Open-Source β
π Read
via "Threatpost".
Fully opening the door to allow people to contribute to β and notably, tinker with β the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt.π Read
via "Threatpost".
Threat Post
Have I Been Pwned Set to Go Open-Source
Fully opening the door to allow people to contribute to β and notably, tinker with β the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt.
π΄ 400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones π΄
π Read
via "Dark Reading: ".
Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.π Read
via "Dark Reading: ".
Dark Reading
400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones
Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones.
β Attackers Horn in on MFA Bypass Options for Account Takeovers β
π Read
via "Threatpost".
Legacy applications don't support modern authentication -- and cybercriminals know this.π Read
via "Threatpost".
Threat Post
Attackers Hone in on MFA Bypass Options for Account Takeovers
Legacy applications don't support modern authentication β and cybercriminals know this.
π΄ Hacking the PLC via Its Engineering Software π΄
π Read
via "Dark Reading: ".
Researcher will demonstrate at DEF CON an emerging threat to industrial control networks.π Read
via "Dark Reading: ".
Darkreading
Hacking the PLC via Its Engineering Software
Researcher will demonstrate at DEF CON an emerging threat to industrial control networks.
π΄ Reddit Attack Defaces Dozens of Channels π΄
π Read
via "Dark Reading: ".
The attack has defaced the channels with images and content supporting Donald Trump.π Read
via "Dark Reading: ".
Dark Reading
Reddit Attack Defaces Dozens of Channels
The attack has defaced the channels with images and content supporting Donald Trump.
ATENTIONβΌ New - CVE-2020-13376
π Read
via "National Vulnerability Database".
SecurEnvoy SecurMail 9.3.503 allows attackers to upload executable files and achieve OS command execution via a crafted SecurEnvoyReply cookie.π Read
via "National Vulnerability Database".
β Qualcomm Bugs Open 40 Percent of Android Handsets to Attack β
π Read
via "Threatpost".
Researchers identified serious flaws in Qualcommβs Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets.π Read
via "Threatpost".
Threat Post
Qualcomm Bugs Open 40 Percent of Android Handsets to Attack
Researchers identified serious flaws in Qualcommβs Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets.
ATENTIONβΌ New - CVE-2019-7005
π Read
via "National Vulnerability Database".
A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2.π Read
via "National Vulnerability Database".
π΄ Digital Clones Could Cause Problems for Identity Systems π΄
π Read
via "Dark Reading: ".
Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating the systems.π Read
via "Dark Reading: ".
Dark Reading
Digital Clones Could Cause Problems for Identity Systems
Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating the systems.
ATENTIONβΌ New - CVE-2019-19704
π Read
via "National Vulnerability Database".
In JetBrains Upsource before 2020.1, information disclosure is possible because of an incorrect user matching algorithm.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12781
π Read
via "National Vulnerability Database".
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12780
π Read
via "National Vulnerability Database".
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12779
π Read
via "National Vulnerability Database".
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12778
π Read
via "National Vulnerability Database".
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12777
π Read
via "National Vulnerability Database".
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.π Read
via "National Vulnerability Database".
β Monday review β catch up with the latest articles β
π Read
via "Naked Security".
The latest articles and the latest Naked Security Live video - all in one place. Enjoy.π Read
via "Naked Security".
Naked Security
Monday review β catch up with the latest articles
The latest articles and the latest Naked Security Live video β all in one place. Enjoy.
π΄ COVID-19: Latest Security News & Commentary π΄
π Read
via "Dark Reading: ".
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.π Read
via "Dark Reading: ".
Dark Reading
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
β TeamViewer Flaw in Windows App Allows Password-Cracking β
π Read
via "Threatpost".
Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.π Read
via "Threatpost".
Threat Post
TeamViewer Flaw in Windows App Allows Password-Cracking
Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.
ATENTIONβΌ New - CVE-2020-13295
π Read
via "National Vulnerability Database".
For GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-13294
π Read
via "National Vulnerability Database".
In GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application.π Read
via "National Vulnerability Database".