🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Digital Clones Could Cause Problems for Identity Systems 🕴

Three fundamental technologies -- chatbots, audio fakes, and deepfake videos -- have improved to the point that creating digital, real-time clones of people is merely a matter of integrating the systems.

📖 Read

via "Dark Reading: ".
ATENTION New - CVE-2019-19704

In JetBrains Upsource before 2020.1, information disclosure is possible because of an incorrect user matching algorithm.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-12781

Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-12780

A security misconfiguration exists in Combodo iTop, which can expose sensitive information.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-12779

Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-12778

Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-12777

A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.

📖 Read

via "National Vulnerability Database".
Monday review – catch up with the latest articles

The latest articles and the latest Naked Security Live video - all in one place. Enjoy.

📖 Read

via "Naked Security".
🕴 COVID-19: Latest Security News & Commentary 🕴

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

📖 Read

via "Dark Reading: ".
TeamViewer Flaw in Windows App Allows Password-Cracking

Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victims' passwords.

📖 Read

via "Threatpost".
ATENTION New - CVE-2020-13295

For GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-13294

In GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-13293

In GitLab before 13.0.12, 13.1.6 and 13.2.3 using a branch with a hexadecimal name could override an existing hash.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-13292

In GitLab before 13.0.12, 13.1.6 and 13.2.3, it is possible to bypass E-mail verification which is required for OAuth Flow.

📖 Read

via "National Vulnerability Database".
DDoS Attacks Cresting Amid Pandemic

Attacks were way up year-over-year in the second quarter as people continue to work from home.

📖 Read

via "Threatpost".
🕴 Q2 DDoS Attacks Triple Year Over Year: Report 🕴

Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.

📖 Read

via "Dark Reading: ".
🔏 Researcher Pleads Guilty to Scientific Trade Secret Theft 🔏

The researcher worked for the hospital for 10 years but acknowledged last month that and her husband stole its data and used it to launch two companies, one in China, one in the US.

📖 Read

via "Subscriber Blog RSS Feed ".
🔐 How phishing attacks have exploited the US Small Business Administration 🔐

Such attacks have tried to capitalize on the loans provided by the SBA in the wake of the coronavirus pandemic.

📖 Read

via "Security on TechRepublic".
Google Chrome Browser Bug Exposes Billions of Users to Data Theft

The vulnerability allows attackers to bypass Content Security Policy (CSP) protections and steal data from website visitors.

📖 Read

via "Threatpost".
🕴 Lock-Pickers Face an Uncertain Future Online 🕴

Teaching the hardware hacker the skill of picking locks is evolving because of the pandemic's lockdown.

📖 Read

via "Dark Reading: ".