πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Zerologon – hacking Windows servers with a bunch of zeros ⚠

Cryptography is hard. And cryptographic blunders can be hard to spot. This one was there for years...

πŸ“– Read

via "Naked Security".
πŸ•΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request πŸ•΄

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.

πŸ“– Read

via "Dark Reading: ".
πŸ” How ransomware operators are joining forces to carry out attacks πŸ”

Attackers buy stolen data from other criminals, while the Maze group publishes data captured by other gangs, says Positive Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  nfstream 6.1.2 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".
❌ California Elementary Kids Kicked Off Online Learning by Ransomware ❌

The attack on the Newhall District in Valencia is part of a wave of ransomware attacks on the education sector, which shows no sign of dissipating.

πŸ“– Read

via "Threatpost".
πŸ•΄ How IT Security Organizations are Attacking the Cybersecurity Problem πŸ•΄

The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Struggling to Secure Remote IT? 3 Lessons from the Office πŸ•΄

The great remote work experiment has exacerbated existing challenges and exposed new gaps, but there are things to be learned from office challenges.

πŸ“– Read

via "Dark Reading: ".
❌ APT41 Operatives Indicted as Sophisticated Hacking Activity Continues ❌

Five alleged members of the China-linked advanced threat group and two associates have been indicted by a Federal grand jury, on dozens of charges.

πŸ“– Read

via "Threatpost".
❌ Google Play Bans Stalkerware and β€˜Misrepresentation’ ❌

The official app store is taking on spy- and surveillance-ware, along with apps that could be used to mount political-influence campaigns.

πŸ“– Read

via "Threatpost".
πŸ•΄ Black Hat Europe πŸ•΄

Virtual Event

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Time for CEOs to Stop Enabling China's Blatant IP Theft πŸ•΄

Protecting intellectual property in the name of US economic and national security should be part of every company's fiduciary duty.

πŸ“– Read

via "Dark Reading: ".
πŸ” DOJ Charges Two Iranians in Cyber Intrusion Campaign πŸ”

For years, the hackers infiltrated systems and targeted intellectual property and national security data.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” CISOs top traits revealed in report: Improvement needed πŸ”

A new Gartner report found only 12% of chief information security officers (CISOs) met the criteria for being considered highly effective.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2020-0392

In getLayerDebugInfo of SurfaceFlinger.cpp, there is a possible code execution due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-150226608

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0391

In applyPolicy of PackageManagerService.java, there is possible arbitrary command execution as System due to an unenforced protected-broadcast. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-158570769

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0390

In the app zygote SE Policy, there is a possible permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-157598026

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0389

In createSaveNotification of RecordingService.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-156959408

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0388

In createEmergencyLocationUserNotification of GnssVisibilityControl.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-156123285

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0386

In onCreate of RequestPermissionActivity.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege allowing an attacker to set Bluetooth discoverability with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155650356

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0385

In Parse_insh of eas_mdls.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote information disclosure in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-150160041

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0384

In Parse_art of eas_mdls.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote information disclosure in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150159906

πŸ“– Read

via "National Vulnerability Database".