ATENTION‼ New - CVE-2020-0240
📖 Read
via "National Vulnerability Database".
In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2020-0239
📖 Read
via "National Vulnerability Database".
In getDocumentMetadata of DocumentsContract.java, there is a possible disclosure of location metadata from a file due to a permissions bypass. This could lead to local information disclosure from a file (eg. a photo) containing location metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-151095863📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2020-0238
📖 Read
via "National Vulnerability Database".
In updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-150946634📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2020-0108
📖 Read
via "National Vulnerability Database".
In postNotification of ServiceRecord.java, there is a possible bypass of foreground process restrictions due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-140108616📖 Read
via "National Vulnerability Database".
🕴 Researchers Trick Facial-Recognition Systems 🕴
📖 Read
via "Dark Reading: ".
Goal was to see if computer-generated images that look like one person would get classified as another person.📖 Read
via "Dark Reading: ".
Dark Reading
Researchers Trick Facial-Recognition Systems
Goal was to see if computer-generated images that look like one person would get classified as another person.
ATENTION‼ New - CVE-2019-17339
📖 Read
via "National Vulnerability Database".
The VirtualRouter component of TIBCO Software Inc.'s TIBCO Silver Fabric contains a vulnerability that theoretically allows an attacker to inject scripts via URLs. The attacker could theoretically social engineer an authenticated user into submitting the URL, thus executing the script on the affected system with the privileges of the user. Affected releases are TIBCO Software Inc.'s TIBCO Silver Fabric: versions 6.0.0 and below.📖 Read
via "National Vulnerability Database".
❌ Agent Tesla Spyware Adds Fresh Tricks to Its Arsenal ❌
📖 Read
via "Threatpost".
The RAT is surging in 2020, becoming more prevalent than even the infamous TrickBot or Emotet malware.📖 Read
via "Threatpost".
Threat Post
Agent Tesla Spyware Adds Fresh Tricks to Its Arsenal
The RAT is surging in 2020, becoming more prevalent than even the infamous TrickBot or Emotet malware.
🔐 Security in the 'new normal': Passwordless is the way forward 🔐
📖 Read
via "Security on TechRepublic".
Moving on from passwords to strong authentication and adaptive access policies is key to improving security without hurting productivity, especially given the increase in remote working.📖 Read
via "Security on TechRepublic".
TechRepublic
Security in the 'new normal': Passwordless is the way forward
Moving on from passwords to strong authentication and adaptive access policies is key to improving security without hurting productivity, especially given the increase in remote working.
🔐 Microsoft fixes Windows and Internet Explorer zero-day flaws in latest Patch Tuesday 🔐
📖 Read
via "Security on TechRepublic".
The latest series of Patch Tuesday security updates for Windows 10 includes patches for 17 bugs marked 'Critical' and 97 listed as 'Important'.📖 Read
via "Security on TechRepublic".
❌ TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic ❌
📖 Read
via "Threatpost".
App concealed the practice of gathering device unique identifiers using an added layer of encryption.📖 Read
via "Threatpost".
Threat Post
TikTok Surreptitiously Collected Android User Data Using Google-Prohibited Tactic
App concealed the practice of gathering device unique identifiers using an added layer of encryption.
🕴 Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption 🕴
📖 Read
via "Dark Reading: ".
Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.📖 Read
via "Dark Reading: ".
Dark Reading
Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption
Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.
🕴 Threats vs. Thrift: Running Effective AppSec During a Global Crisis 🕴
📖 Read
via "Dark Reading: ".
By looking at security testing capacity, staff expertise, and risks throughout the software supply chain, application security teams can improve their overall effectiveness.📖 Read
via "Dark Reading: ".
Dark Reading
Threats vs. Thrift: Running Effective AppSec During a Global Crisis
By looking at security testing capacity, staff expertise, and risks throughout the software supply chain, application security teams can improve their overall effectiveness.
❌ Citrix Warns of Critical Flaws in XenMobile Server ❌
📖 Read
via "Threatpost".
Citrix said that it anticipates malicious actors "will move quickly to exploit" two critical flaws in its mobile device management software.📖 Read
via "Threatpost".
Threat Post
Citrix Warns of Critical Flaws in XenMobile Server
Citrix said that it anticipates malicious actors "will move quickly to exploit" two critical flaws in its mobile device management software.
🕴 Name That Toon: 'Rise' and Shine 🕴
📖 Read
via "Dark Reading: ".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.📖 Read
via "Dark Reading: ".
Dark Reading
Name That Toon: 'Rise' and Shine
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
🕴 SANS Security Training Firm Hit with Data Breach 🕴
📖 Read
via "Dark Reading: ".
A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.📖 Read
via "Dark Reading: ".
Darkreading
SANS Security Training Firm Hit with Data Breach
A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.
🔐 SANS cybersecurity training firm suffers data breach due to phishing attack 🔐
📖 Read
via "Security on TechRepublic".
The breach compromised 28,000 records, exposing such data as names, phone numbers, physical addresses, and email addresses.📖 Read
via "Security on TechRepublic".
TechRepublic
SANS cybersecurity training firm suffers data breach due to phishing attack
The breach compromised 28,000 records, exposing such data as names, phone numbers, physical addresses, and email addresses.
🕴 Using 'Data for Good' to Control the Pandemic 🕴
📖 Read
via "Dark Reading: ".
The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.📖 Read
via "Dark Reading: ".
Dark Reading
Using 'Data for Good' to Control the Pandemic
The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.
🔏 Zoom Hit With Lawsuit Over Encryption Claims 🔏
📖 Read
via "Subscriber Blog RSS Feed ".
A consumer advocacy group filed a lawsuit against the web conferencing software company alleging it misrepresented the level of security it uses to protect communications.📖 Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Zoom Hit With Lawsuit Over Encryption Claims
A consumer advocacy group filed a lawsuit against the web conferencing software company alleging it misrepresented the level of security it uses to protect communications.
🔐 Cybersecurity and remote support are top goals for CIOs in 2020 🔐
📖 Read
via "Security on TechRepublic".
Most IT leaders say their priorities have shifted since the coronavirus pandemic surfaced around the start of the year, says Hitachi ID.📖 Read
via "Security on TechRepublic".
TechRepublic
Cybersecurity and remote support are top goals for CIOs in 2020
Most IT leaders say their priorities have shifted since the coronavirus pandemic surfaced around the start of the year, says Hitachi ID.
🕴 FireEye Announces New Bug-Bounty Program 🕴
📖 Read
via "Dark Reading: ".
The program, administered by Bugcrowd, will pay bounties of up to $2,500 per vulnerability.📖 Read
via "Dark Reading: ".
Dark Reading
FireEye Announces New Bug-Bounty Program
The program, administered by Bugcrowd, will pay bounties of up to $2,500 per vulnerability.
🔐 Abandoned apps like TikTok pose a security risk in a BYOD world 🔐
📖 Read
via "Security on TechRepublic".
Social media apps put corporate networks at risk and provide raw material for deep fakes.📖 Read
via "Security on TechRepublic".
TechRepublic
Abandoned apps like TikTok pose a security risk in a BYOD world
Social media apps put corporate networks at risk and provide raw material for deep fakes.