πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2020-0264

In libstagefright, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-116718596

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0130

In screencap, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege in a system process with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-123230379

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0125

In mediadrm, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137282168

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Don't Fall for It! Defending Against Deepfakes πŸ•΄

Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five 9/18 πŸ”

Campaign app bugs, VA data breaches, and IoT legislation - catch on the week's news with the Friday Five!

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Mitigating Cyber-Risk While We're (Still) Working from Home πŸ•΄

One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deepfake Detection Poses Problematic Technology Race πŸ•΄

Experts hold out little hope for a robust technical solution in the long term.

πŸ“– Read

via "Dark Reading: ".
⚠ A real-life Maze ransomware attack – β€œIf at first you don’t succeed…” ⚠

The crooks wanted $15,000,000. They didn't get it. Huzzah!

πŸ“– Read

via "Naked Security".
ATENTIONβ€Ό New - CVE-2020-0262

In WiFi tethering, there is a possible attacker controlled intent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156353008

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0089

In the audio server, there is a missing permission check. This could lead to local escalation of privilege regarding audio settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137015603

πŸ“– Read

via "National Vulnerability Database".
❌ Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach ❌

Maze continues to adopt tactics from rival cybercrime gangs.

πŸ“– Read

via "Threatpost".
πŸ” TikTok and WeChat to be banned from US app stores starting Sunday πŸ”

Users in the US would be unable to download the two Chinese-owned apps from local app stores, according to the Department of Commerce.

πŸ“– Read

via "Security on TechRepublic".
❌ Security Takeaways from the Great Work-from-Home Experiment ❌

As the pandemic drags on and remote workforces stay remote, zero-trust and other lessons learned should come to the fore.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2020-0272

In libhwbinder, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-130166487

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0271

In the Settings app, there is an insecure default value. This could lead to local escalation of privilege and tapjacking with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144507081

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0269

In Android Auto Settings, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-151645626

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0268

In NFC, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-148294643

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0265

In Telephony, there are possible leaks of sensitive data due to missing permission checks. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150155839

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2020-0263

In the Accessibility service, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154913130

πŸ“– Read

via "National Vulnerability Database".
❌ SecOps Teams Wrestle with Manual Processes, HR Gaps ❌

Enterprise security teams are "drowning in alerts."

πŸ“– Read

via "Threatpost".
πŸ” How to encrypt files on your Linux servers with gocryptfs πŸ”

Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.

πŸ“– Read

via "Security on TechRepublic".