β Mozi Botnet Accounts for Majority of IoT Traffic β
π Read
via "Threatpost".
Moziβs spike comes amid a huge increase in overall IoT botnet activity.π Read
via "Threatpost".
Threat Post
Mozi Botnet Accounts for Majority of IoT Traffic
The Mozi botnet, a peer-2-peer (P2P) malware known previously for taking over Netgear, D-Link and Huawei routers, has swollen in size to account for 90 percent of traffic flowing to and from all internet of things (IoT) devices, according to researchers.β¦
π΄ Iranian Hackers Indicted for Stealing Aerospace & Satellite Tracking Data π΄
π Read
via "Dark Reading: ".
Also, the US Treasury sanctioned Iranian attack group APT39 following a years-long malware campaign.π Read
via "Dark Reading: ".
Dark Reading
Iranian Hackers Indicted for Stealing Aerospace & Satellite Tracking Data
Also, the US Treasury sanctioned Iranian attack group APT39 following a years-long malware campaign.
π΄ Indictments Unlikely to Deter China's APT41 Activity π΄
π Read
via "Dark Reading: ".
So far, at least, the threat group has not let public scrutiny slow it down, security researchers say.π Read
via "Dark Reading: ".
Dark Reading
Indictments Unlikely to Deter China's APT41 Activity
So far, at least, the threat group has not let public scrutiny slow it down, security researchers say.
ATENTIONβΌ New - CVE-2020-0289
π Read
via "National Vulnerability Database".
In PackageManager, there is a missing permission check. This could lead to local information disclosure across users with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153996872π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0288
π Read
via "National Vulnerability Database".
In PackageManager, there is a missing permission check. This could lead to local information disclosure across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153995991π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0287
π Read
via "National Vulnerability Database".
In libmkvextractor, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-141860394π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0279
π Read
via "National Vulnerability Database".
In the AAC parser, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-131430997π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0277
π Read
via "National Vulnerability Database".
In NetworkPolicyManagerService, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing a malicious app to modify the device's data plan with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148627993π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0275
π Read
via "National Vulnerability Database".
In MediaProvider, there is a possible way to access ContentResolver and MediaStore entries the app shouldn't have access to due to a permissions bypass. This could lead to local escalation of privilege, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150507736π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0274
π Read
via "National Vulnerability Database".
In the OMX parser, there is a possible information disclosure due to a returned raw pointer. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-120781925π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0270
π Read
via "National Vulnerability Database".
In tremolo, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-145790628π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0267
π Read
via "National Vulnerability Database".
In WindowManager, there is a possible launch of an unexpected app due to a confused deputy. This could lead to local escalation of privilege due to launching a malicious app instead of the one the user intended, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139128211π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0266
π Read
via "National Vulnerability Database".
In factory reset protection, there is a possible FRP bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-111086459π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0264
π Read
via "National Vulnerability Database".
In libstagefright, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-116718596π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0130
π Read
via "National Vulnerability Database".
In screencap, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege in a system process with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-123230379π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0125
π Read
via "National Vulnerability Database".
In mediadrm, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137282168π Read
via "National Vulnerability Database".
π΄ Don't Fall for It! Defending Against Deepfakes π΄
π Read
via "Dark Reading: ".
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.π Read
via "Dark Reading: ".
Dark Reading
Don't Fall for It! Defending Against Deepfakes
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.
π Friday Five 9/18 π
π Read
via "Subscriber Blog RSS Feed ".
Campaign app bugs, VA data breaches, and IoT legislation - catch on the week's news with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five 9/18
Campaign app bugs, VA data breaches, and IoT legislation - catch on the week's news with the Friday Five!
π΄ Mitigating Cyber-Risk While We're (Still) Working from Home π΄
π Read
via "Dark Reading: ".
One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.π Read
via "Dark Reading: ".
Dark Reading
Mitigating Cyber-Risk While We're (Still) Working from Home
One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.
π΄ Deepfake Detection Poses Problematic Technology Race π΄
π Read
via "Dark Reading: ".
Experts hold out little hope for a robust technical solution in the long term.π Read
via "Dark Reading: ".
Dark Reading
Deepfake Detection Poses Problematic Technology Race
Experts hold out little hope for a robust technical solution in the long term.
β A real-life Maze ransomware attack β βIf at first you donβt succeedβ¦β β
π Read
via "Naked Security".
The crooks wanted $15,000,000. They didn't get it. Huzzah!π Read
via "Naked Security".
Naked Security
A real-life Maze ransomware attack β βIf at first you donβt succeedβ¦β
The crooks wanted $15,000,000. They didnβt get it. Huzzah!