πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Abandoned apps like TikTok pose a security risk in a BYOD world πŸ”

Social media apps put corporate networks at risk and provide raw material for deep fakes.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-0555

Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0554

Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0553

Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0513

Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0512

Uncaught exception in the system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0510

Out of bounds read in some Intel(R) Graphics Drivers before versions 15.45.31.5127 and 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-14630

Reliance on untrusted inputs in a security decision in some Intel(R) Thunderbolt(TM) controllers may allow unauthenticated user to potentially enable information disclosure via physical access.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-14620

Insufficient control flow management for some Intel(R) Wireless Bluetooth(R) products may allow an unprivileged user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
❌ Amazon Alexa β€˜One-Click’ Attack Can Divulge Personal Data ❌

Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices.

πŸ“– Read

via "Threatpost".
❌ High-Severity TinyMCE Cross-Site Scripting Flaw Fixed ❌

The cross-site scripting flaw could enable arbitrary code execution, information disclosure - and even account takeover.

πŸ“– Read

via "Threatpost".
❌ ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls ❌

Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls.

πŸ“– Read

via "Threatpost".
πŸ•΄ Emotet Return Brings New Tactics & Evasion Techniques πŸ•΄

Security researchers tracking Emotet report its reemergence brings new tricks, including new evasion techniques to bypass security tools.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Adaptive Shield Emerges From Stealth πŸ•΄

Israeli startup joins growing number of vendors offering platform for detecting and mitigating common configuration errors in cloud environments.

πŸ“– Read

via "Dark Reading: ".
πŸ” Amazon Alexa flaws could have revealed home address and other personal data πŸ”

The flaws could also have helped attackers obtain usernames, phone numbers, voice history, and installed skills, says Check Point Research.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ With iOS's Privacy Nutrition Label, Apple Upstages Regulators πŸ•΄

New iOS privacy features require developers to disclose what data they're collecting, how they're using it, and with whom they share it.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Security Jobs With a Future -- And Ones on the Way Out πŸ•΄

Some titles are hot, while others are not, amid rapidly shifting business priorities.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2019-4582

IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 167288.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-16374

Pega Platform 8.2.1 allows LDAP injection because a username can contain a * character and can be of unlimited length. An attacker can specify four characters of a username, followed by the * character, to bypass access control.

πŸ“– Read

via "National Vulnerability Database".
❌ New Global Threat Landscape Report Reveals β€˜Unprecedented’ Cyberattacks ❌

Fortinet's recently released Global Threat Landscape Report shows how the perimeter is extending to the home in the first half of 2020 - and what that means for cybercrime.

πŸ“– Read

via "Threatpost".
πŸ•΄ Black Hat USA 2020 Shines Spotlight on the Mental Challenges of Cybersecurity πŸ•΄

Infosec practitioners face a variety of mental struggles in areas such as awareness training, problem solving, or general mental health. Several sessions at Black Hat USA 2020 highlighted these challenges and how to overcome them.

πŸ“– Read

via "Dark Reading: ".