🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 17 Essential Stats About the State of Consumer Privacy 🕴

These illuminating numbers offer a glimpse into current consumer attitudes and enterprise readiness for protecting their customers' personal data.

📖 Read

via "Dark Reading: ".
🔐 Linux users are finally getting this popular password manager 🔐

After ten years of asking and the longest forum post in the company's history, 1Password is heading to Linux.

📖 Read

via "Security on TechRepublic".
Researcher Publishes Bypass for Patch for vBulletin 0-Day Flaw

Three separate proof-of-concepts on Bash, Python and Ruby posted to outsmart fix issued last year to remedy pre-auth RCE bug.

📖 Read

via "Threatpost".
🔐 Phishing emails tempting people with fake coronavirus vaccines 🔐

As researchers race to develop a COVID-19 vaccine, phishing campaigns have landed on a topic ripe for exploitation, says Check Point Research.

📖 Read

via "Security on TechRepublic".
🕴 How to Help Spoil the Cybercrime Economy 🕴

Cybercrime increasingly is turning into a commodity. Stolen PII data and hijacked cloud accounts especially propel the spread, research shows.

📖 Read

via "Dark Reading: ".
🔐 How cybersecurity has changed since the coronavirus outbreak began, and what it means for businesses 🔐

Moving employees to a work-from-home model means your security infrastructure has to change quickly. Some recent breaches highlight the importance of cybersecurity.

📖 Read

via "Security on TechRepublic".
🔐 How cybersecurity has changed since the coronavirus outbreak began, and what it means for businesses 🔐

Moving employees to a work-from-home model means your security infrastructure has to change quickly. Some recent breaches highlight the importance of cybersecurity.

📖 Read

via "Security on TechRepublic".
🔐 How to patch CentOS against BootHole 🔐

If you have CentOS servers in your data center, you'll want to make sure to patch them against BootHole. Jack Wallen shows you how.

📖 Read

via "Security on TechRepublic".
ATENTION New - CVE-2020-14325

Red Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10783

Red Hat CloudForms 4.7 and 5 is affected by a role-based privilege escalation flaw. An attacker with EVM-Operator group can perform actions restricted only to EVM-Super-administrator group, leads to, exporting or importing administrator files.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10779

Red Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check. Therefore, if an attacker knows the right criteria, it is possible to access some sensitive data within the CloudForms.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10778

In Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute from the fields since there is no server-side validation. This business logic flaw violate the expected behavior.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10777

A cross-site scripting flaw was found in Report Menu feature of Red Hat CloudForms 4.7 and 5. An attacker could use this flaw to execute a stored XSS attack on an application administrator using CloudForms.

📖 Read

via "National Vulnerability Database".
Samsung Quietly Fixed Critical Galaxy Flaws Allowing Spying, Data Wiping

Four critical-severity flaws were recently disclosed in the Find My Mobile feature of Samsung Galaxy smartphones, which if exploited could allow attackers to force a factory reset on the phones or spy on users.

📖 Read

via "Threatpost".
🕴 Zero-Trust Security 101 🕴

What are the fundamental spirit and tenets of zero-trust architecture, boiled down, without the marketing speak?

📖 Read

via "Dark Reading: ".
🔐 Cybersecurity and remote support are top goals for CIOs in 2020 🔐

Most IT leaders say their priorities have shifted since the coronavirus pandemic surfaced around the start of the year, says Hitachi ID.

📖 Read

via "Security on TechRepublic".
Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

The fundamental causes for the skill gap are myriad, starting with a lack of training and career-development opportunities.

📖 Read

via "Threatpost".
ATENTION New - CVE-2020-14324

A high severity vulnerability was found in all active versions of Red Hat CloudForms before 5.11.7.0. The out of band OS command injection vulnerability can be exploited by authenticated attacker while setuping conversion host through Infrastructure Migration Solution. This flaw allows attacker to execute arbitrary commands on CloudForms server.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-14313

An information disclosure vulnerability was found in Red Hat Quay in versions before 3.3.1. This flaw allows an attacker who can create a build trigger in a repository, to disclose the names of robot accounts and the existence of private repositories within any namespace.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-14296

Red Hat CloudForms 4.7 and 5 was vulnerable to Server-Side Request Forgery (SSRF) flaw. With the access to add Ansible Tower provider, an attacker could scan and attack systems from the internal network which are not normally accessible.

📖 Read

via "National Vulnerability Database".
ATENTION New - CVE-2020-10780

Red Hat CloudForms 4.7 and 5 is affected by CSV Injection flaw, a crafted payload stays dormant till a victim export as CSV and opens the file with Excel. Once the victim opens the file, the formula executes, triggering any number of possible events. While this is strictly not an flaw that affects the application directly, attackers could use the loosely validated parameters to trigger several attack possibilities.

📖 Read

via "National Vulnerability Database".