🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
ATENTION New - CVE-2020-13295

For GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-13294

In GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-13293

In GitLab before 13.0.12, 13.1.6 and 13.2.3 using a branch with a hexadecimal name could override an existing hash.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-13292

In GitLab before 13.0.12, 13.1.6 and 13.2.3, it is possible to bypass E-mail verification which is required for OAuth Flow.

📖 Read

via "National Vulnerability Database".
DDoS Attacks Cresting Amid Pandemic

Attacks were way up year-over-year in the second quarter as people continue to work from home.

📖 Read

via "Threatpost".
🕴 Q2 DDoS Attacks Triple Year Over Year: Report 🕴

Distributed denial-of-service attacks have stayed consistently high throughout 2020, a shift from normal attack trends that researchers attribute to COVID-19.

📖 Read

via "Dark Reading: ".
🔏 Researcher Pleads Guilty to Scientific Trade Secret Theft 🔏

The researcher worked for the hospital for 10 years but acknowledged last month that and her husband stole its data and used it to launch two companies, one in China, one in the US.

📖 Read

via "Subscriber Blog RSS Feed ".
🔐 How phishing attacks have exploited the US Small Business Administration 🔐

Such attacks have tried to capitalize on the loans provided by the SBA in the wake of the coronavirus pandemic.

📖 Read

via "Security on TechRepublic".
Google Chrome Browser Bug Exposes Billions of Users to Data Theft

The vulnerability allows attackers to bypass Content Security Policy (CSP) protections and steal data from website visitors.

📖 Read

via "Threatpost".
🕴 Lock-Pickers Face an Uncertain Future Online 🕴

Teaching the hardware hacker the skill of picking locks is evolving because of the pandemic's lockdown.

📖 Read

via "Dark Reading: ".
🕴 Can I Use the Same Security Tools on My IT and OT? 🕴

You can quit worrying about IT tools in the OT environment.

📖 Read

via "Dark Reading: ".
Google Fixes Mysterious Audio Recording Blip in Smart Speakers

Google Home devices reportedly recorded noises even without the "Hey Google" prompt due to the inadvertent rollout of a home security system feature.

📖 Read

via "Threatpost".
🕴 Better Business Bureau Warns of New Visa Scam 🕴

Visa limitations due to the novel coronavirus have given rise to a wave of scams aimed at visa-seekers.

📖 Read

via "Dark Reading: ".
🕴 Hacking It as a CISO: Advice for Security Leadership 🕴

A security leader shares tips for adopting a CISO mindset, creating risk management strategies, and "selling infosec" to IT and executives.

📖 Read

via "Dark Reading: ".
🕴 Gamifying Password Training Shows Security Benefits 🕴

When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find.

📖 Read

via "Dark Reading: ".
🛠 Sifter 9.3 🛠

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🛠 Zeek 3.2.0 🛠

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

📖 Go!

via "Security Tool Files ≈ Packet Storm".
🕴 17 Essential Stats About the State of Consumer Privacy 🕴

These illuminating numbers offer a glimpse into current consumer attitudes and enterprise readiness for protecting their customers' personal data.

📖 Read

via "Dark Reading: ".
🔐 Linux users are finally getting this popular password manager 🔐

After ten years of asking and the longest forum post in the company's history, 1Password is heading to Linux.

📖 Read

via "Security on TechRepublic".
Researcher Publishes Bypass for Patch for vBulletin 0-Day Flaw

Three separate proof-of-concepts on Bash, Python and Ruby posted to outsmart fix issued last year to remedy pre-auth RCE bug.

📖 Read

via "Threatpost".
🔐 Phishing emails tempting people with fake coronavirus vaccines 🔐

As researchers race to develop a COVID-19 vaccine, phishing campaigns have landed on a topic ripe for exploitation, says Check Point Research.

📖 Read

via "Security on TechRepublic".