π΄ h2c Smuggling: A New 'Devastating' Kind of HTTP Request π΄
π Read
via "Dark Reading: ".
The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.π Read
via "Dark Reading: ".
Dark Reading
h2c Smuggling: A New 'Devastating' Kind of HTTP Request
The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.
π How ransomware operators are joining forces to carry out attacks π
π Read
via "Security on TechRepublic".
Attackers buy stolen data from other criminals, while the Maze group publishes data captured by other gangs, says Positive Technologies.π Read
via "Security on TechRepublic".
TechRepublic
How ransomware operators are joining forces to carry out attacks
Attackers buy stolen data from other criminals, while the Maze group publishes data captured by other gangs, says Positive Technologies.
π nfstream 6.1.2 π
π Go!
via "Security Tool Files β Packet Storm".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
nfstream 6.1.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β California Elementary Kids Kicked Off Online Learning by Ransomware β
π Read
via "Threatpost".
The attack on the Newhall District in Valencia is part of a wave of ransomware attacks on the education sector, which shows no sign of dissipating.π Read
via "Threatpost".
Threat Post
California Elementary Kids Kicked Off Online Learning by Ransomware
The attack on the Newhall District in Valencia is part of a wave of ransomware attacks on the education sector, which shows no sign of dissipating.
π΄ How IT Security Organizations are Attacking the Cybersecurity Problem π΄
π Read
via "Dark Reading: ".
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.π Read
via "Dark Reading: ".
π΄ Struggling to Secure Remote IT? 3 Lessons from the Office π΄
π Read
via "Dark Reading: ".
The great remote work experiment has exacerbated existing challenges and exposed new gaps, but there are things to be learned from office challenges.π Read
via "Dark Reading: ".
β APT41 Operatives Indicted as Sophisticated Hacking Activity Continues β
π Read
via "Threatpost".
Five alleged members of the China-linked advanced threat group and two associates have been indicted by a Federal grand jury, on dozens of charges.π Read
via "Threatpost".
Threat Post
APT41 Operatives Indicted as Sophisticated Hacking Activity Continues
Five alleged members of the China-linked advanced threat group and two associates have been indicted by a Federal grand jury, on dozens of charges.
β Google Play Bans Stalkerware and βMisrepresentationβ β
π Read
via "Threatpost".
The official app store is taking on spy- and surveillance-ware, along with apps that could be used to mount political-influence campaigns.π Read
via "Threatpost".
Threat Post
Google Play Bans Stalkerware and βMisrepresentationβ
The official app store is taking on spy- and surveillance-ware, along with apps that could be used to mount political-influence campaigns.
π΄ Time for CEOs to Stop Enabling China's Blatant IP Theft π΄
π Read
via "Dark Reading: ".
Protecting intellectual property in the name of US economic and national security should be part of every company's fiduciary duty.π Read
via "Dark Reading: ".
Dark Reading
Time for CEOs to Stop Enabling China's Blatant IP Theft
Protecting intellectual property in the name of US economic and national security should be part of every company's fiduciary duty.
π DOJ Charges Two Iranians in Cyber Intrusion Campaign π
π Read
via "Subscriber Blog RSS Feed ".
For years, the hackers infiltrated systems and targeted intellectual property and national security data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
DOJ Charges Two Iranians in Cyber Intrusion Campaign
For years, the hackers infiltrated systems and targeted intellectual property and national security data.
π CISOs top traits revealed in report: Improvement needed π
π Read
via "Security on TechRepublic".
A new Gartner report found only 12% of chief information security officers (CISOs) met the criteria for being considered highly effective.π Read
via "Security on TechRepublic".
TechRepublic
CISOs top traits revealed in report: Improvement needed
A new Gartner report found only 12% of chief information security officers (CISOs) met the criteria for being considered highly effective.
ATENTIONβΌ New - CVE-2020-0392
π Read
via "National Vulnerability Database".
In getLayerDebugInfo of SurfaceFlinger.cpp, there is a possible code execution due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-150226608π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0391
π Read
via "National Vulnerability Database".
In applyPolicy of PackageManagerService.java, there is possible arbitrary command execution as System due to an unenforced protected-broadcast. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-158570769π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0390
π Read
via "National Vulnerability Database".
In the app zygote SE Policy, there is a possible permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-157598026π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0389
π Read
via "National Vulnerability Database".
In createSaveNotification of RecordingService.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-156959408π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0388
π Read
via "National Vulnerability Database".
In createEmergencyLocationUserNotification of GnssVisibilityControl.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-156123285π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0386
π Read
via "National Vulnerability Database".
In onCreate of RequestPermissionActivity.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege allowing an attacker to set Bluetooth discoverability with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155650356π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0385
π Read
via "National Vulnerability Database".
In Parse_insh of eas_mdls.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote information disclosure in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-150160041π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0384
π Read
via "National Vulnerability Database".
In Parse_art of eas_mdls.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote information disclosure in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150159906π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0383
π Read
via "National Vulnerability Database".
In Parse_ins of eas_mdls.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure in the media extractor process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-150160279π Read
via "National Vulnerability Database".