ATENTIONβΌ New - CVE-2020-0274
π Read
via "National Vulnerability Database".
In the OMX parser, there is a possible information disclosure due to a returned raw pointer. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-120781925π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0270
π Read
via "National Vulnerability Database".
In tremolo, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-145790628π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0267
π Read
via "National Vulnerability Database".
In WindowManager, there is a possible launch of an unexpected app due to a confused deputy. This could lead to local escalation of privilege due to launching a malicious app instead of the one the user intended, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139128211π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0266
π Read
via "National Vulnerability Database".
In factory reset protection, there is a possible FRP bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-111086459π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0264
π Read
via "National Vulnerability Database".
In libstagefright, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-116718596π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0130
π Read
via "National Vulnerability Database".
In screencap, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege in a system process with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-123230379π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0125
π Read
via "National Vulnerability Database".
In mediadrm, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137282168π Read
via "National Vulnerability Database".
π΄ Don't Fall for It! Defending Against Deepfakes π΄
π Read
via "Dark Reading: ".
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.π Read
via "Dark Reading: ".
Dark Reading
Don't Fall for It! Defending Against Deepfakes
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.
π Friday Five 9/18 π
π Read
via "Subscriber Blog RSS Feed ".
Campaign app bugs, VA data breaches, and IoT legislation - catch on the week's news with the Friday Five!π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five 9/18
Campaign app bugs, VA data breaches, and IoT legislation - catch on the week's news with the Friday Five!
π΄ Mitigating Cyber-Risk While We're (Still) Working from Home π΄
π Read
via "Dark Reading: ".
One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.π Read
via "Dark Reading: ".
Dark Reading
Mitigating Cyber-Risk While We're (Still) Working from Home
One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.
π΄ Deepfake Detection Poses Problematic Technology Race π΄
π Read
via "Dark Reading: ".
Experts hold out little hope for a robust technical solution in the long term.π Read
via "Dark Reading: ".
Dark Reading
Deepfake Detection Poses Problematic Technology Race
Experts hold out little hope for a robust technical solution in the long term.
β A real-life Maze ransomware attack β βIf at first you donβt succeedβ¦β β
π Read
via "Naked Security".
The crooks wanted $15,000,000. They didn't get it. Huzzah!π Read
via "Naked Security".
Naked Security
A real-life Maze ransomware attack β βIf at first you donβt succeedβ¦β
The crooks wanted $15,000,000. They didnβt get it. Huzzah!
ATENTIONβΌ New - CVE-2020-0262
π Read
via "National Vulnerability Database".
In WiFi tethering, there is a possible attacker controlled intent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156353008π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0089
π Read
via "National Vulnerability Database".
In the audio server, there is a missing permission check. This could lead to local escalation of privilege regarding audio settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137015603π Read
via "National Vulnerability Database".
β Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach β
π Read
via "Threatpost".
Maze continues to adopt tactics from rival cybercrime gangs.π Read
via "Threatpost".
Threat Post
Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach
Maze continues to adopt tactics from rival cybercrime gangs.
π TikTok and WeChat to be banned from US app stores starting Sunday π
π Read
via "Security on TechRepublic".
Users in the US would be unable to download the two Chinese-owned apps from local app stores, according to the Department of Commerce.π Read
via "Security on TechRepublic".
TechRepublic
TikTok and WeChat to be banned from US app stores starting Sunday
Users in the US would be unable to download the two Chinese-owned apps from local app stores, according to the Department of Commerce.
β Security Takeaways from the Great Work-from-Home Experiment β
π Read
via "Threatpost".
As the pandemic drags on and remote workforces stay remote, zero-trust and other lessons learned should come to the fore.π Read
via "Threatpost".
Threat Post
Security Takeaways from the Great Work-from-Home Experiment
As the pandemic drags on and remote workforces stay remote, zero-trust and other lessons learned should come to the fore.
ATENTIONβΌ New - CVE-2020-0272
π Read
via "National Vulnerability Database".
In libhwbinder, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-130166487π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0271
π Read
via "National Vulnerability Database".
In the Settings app, there is an insecure default value. This could lead to local escalation of privilege and tapjacking with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144507081π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0269
π Read
via "National Vulnerability Database".
In Android Auto Settings, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-151645626π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0268
π Read
via "National Vulnerability Database".
In NFC, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148294643π Read
via "National Vulnerability Database".