π΄ Virginia's Largest School System Hit With Ransomware π΄
π Read
via "Dark Reading: ".
Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.π Read
via "Dark Reading: ".
Dark Reading
Virginia's Largest School System Hit With Ransomware
Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.
ATENTIONβΌ New - CVE-2018-20432
π Read
via "National Vulnerability Database".
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.π Read
via "National Vulnerability Database".
β TikTok Fixes Flaws That Opened Android App to Compromise β
π Read
via "Threatpost".
The flaws are disclosed as Oracle reportedly partners with TikTok as concerns in the U.S. over spying continue.π Read
via "Threatpost".
Threat Post
TikTok Fixes Flaws That Opened Android App to Compromise
The flaws are disclosed as Oracle reportedly partners with TikTok as concerns in the U.S. over spying continue.
ATENTIONβΌ New - CVE-2019-0233
π Read
via "National Vulnerability Database".
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-0230
π Read
via "National Vulnerability Database".
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.π Read
via "National Vulnerability Database".
β Cloud Leak Exposes 320M Dating-Site Records β
π Read
via "Threatpost".
A misconfigured, Mailfire-owned Elasticsearch server impacted 70 dating and e-commerce sites, exposing PII and details such as romantic preferences.π Read
via "Threatpost".
Threat Post
Cloud Leak Exposes 320M Dating-Site Records
A misconfigured, Mailfire-owned Elasticsearch server impacted 70 dating and e-commerce sites, exposing PII and details such as romantic preferences.
π CISA Breaks Down Recent Chinese Nation State Cyber Activity π
π Read
via "Subscriber Blog RSS Feed ".
A new advisory from CISA outlines recent tactics, techniques, and procedures (TTPs) used by Chinese nation state hackers to target US agencies; it also includes ATT&CK Framework TTPs.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
CISA Breaks Down Recent Chinese Nation State Cyber Activity
A new advisory from CISA outlines recent hacking tactics, techniques, and procedures (TTPs) used by Chinese nation state threat actors to target US agencies; it also includes includes ATT&CK Framework TTPs.
ATENTIONβΌ New - CVE-2019-14756
π Read
via "National Vulnerability Database".
An issue was discovered in KaiOS 1.0, 2.5, and 2.5.12.5. The pre-installed Email application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a specially crafted email to the victim that will inject HTML into the email application's UI as soon as the email is opened. At a bare minimum, this allows an attacker to take control over the Email application's UI (e.g., display a malicious prompt to the user asking them to re-enter their email credentials) and also allows an attacker to abuse any of the privileges available to the mobile application.π Read
via "National Vulnerability Database".
π΄ Security Through an Economics Lens: A Guide for CISOs π΄
π Read
via "Dark Reading: ".
An expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.π Read
via "Dark Reading: ".
Dark Reading
Security Through an Economics Lens: A Guide for CISOs
An expert in economics and cybersecurity applies opportunity cost and other concepts of the dismal science to infosec roles.
π΄ E-Commerce Sites Hit With New Attack on Magento π΄
π Read
via "Dark Reading: ".
The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.π Read
via "Dark Reading: ".
Dark Reading
E-Commerce Sites Hit With New Attack on Magento
The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.
β Feds Warn Nation-State Hackers are Actively Exploiting Unpatched Microsoft Exchange, F5, VPN Bugs β
π Read
via "Threatpost".
Monday's CISA advisory is a staunch reminder for federal government and private sector entities to apply patches for flaws in F5 BIG-IP devices, Citrix VPNs, Pulse Secure VPNs and Microsoft Exchange servers.π Read
via "Threatpost".
Threat Post
Feds Warn Nation-State Hackers are Actively Exploiting Unpatched Microsoft Exchange, F5, VPN Bugs
Monday's CISA advisory is a staunch reminder for federal government and private sector entities to apply patches for flaws in F5 BIG-IP devices, Citrix VPNs, Pulse Secure VPNs and Microsoft Exchange servers.
π΄ Large Cloud Providers Much Less Likely Than Enterprises to Get Breached π΄
π Read
via "Dark Reading: ".
Pen-test results also show a majority of organizations have few protections against attackers already on the network.π Read
via "Dark Reading: ".
Dark Reading
Large Cloud Providers Much Less Likely Than Enterprises to Get Breached
Pen-test results also show a majority of organizations have few protections against attackers already on the network.
π΄ Researchers, Companies Slam Mobile Voting Firm Voatz for 'Bad Faith' Attacks π΄
π Read
via "Dark Reading: ".
In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices.π Read
via "Dark Reading: ".
Dark Reading
Researchers, Companies Slam Mobile Voting Firm Voatz for 'Bad Faith' Attacks
In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices.
ATENTIONβΌ New - CVE-2019-14761
π Read
via "National Vulnerability Database".
An issue was discovered in KaiOS 2.5. The pre-installed Note application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Note application. At a bare minimum, this allows an attacker to take control over the Note application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14760
π Read
via "National Vulnerability Database".
An issue was discovered in KaiOS 2.5. The pre-installed Recorder application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Recorder application. At a bare minimum, this allows an attacker to take control over the Recorder application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14759
π Read
via "National Vulnerability Database".
An issue was discovered in KaiOS 1.0, 2.5, and 2.5.1. The pre-installed Radio application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Radio application. At a bare minimum, this allows an attacker to take control over the Radio application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14758
π Read
via "National Vulnerability Database".
An issue was discovered in KaiOS 2.5 and 2.5.1. The pre-installed File Manager application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a file via email to the victim that will inject HTML into the File Manager application (assuming the victim chooses to download the email attachment). At a bare minimum, this allows an attacker to take control over the File Manager application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-14757
π Read
via "National Vulnerability Database".
An issue was discovered in KaiOS 2.5 and 2.5.1. The pre-installed Contacts application is vulnerable to HTML and JavaScript injection attacks. An attacker can send a vCard file to the victim that will inject HTML into the Contacts application (assuming the victim chooses to import the file). At a bare minimum, this allows an attacker to take control over the Contacts application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application.π Read
via "National Vulnerability Database".
β MFA Bypass Bugs Opened Microsoft 365 to Attack β
π Read
via "Threatpost".
Vulnerabilities βthat have existed for yearsβ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.π Read
via "Threatpost".
Threat Post
MFA Bypass Bugs Opened Microsoft 365 to Attack
Vulnerabilities βthat have existed for yearsβ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.
π΄ A Real-World Tool for Organizing, Integrating Your Other Tools π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
A Real-World Tool for Organizing, Integrating Your Other Tools
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
π΄ Simplify Your Privacy Approach to Overcome CCPA Challenges π΄
π Read
via "Dark Reading: ".
By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations.π Read
via "Dark Reading: ".
Dark Reading
Simplify Your Privacy Approach to Overcome CCPA Challenges
By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations.