🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
Microsoft Exchange Servers Still Open to Actively Exploited Flaw

Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable.

📖 Read

via "Threat Post".
CVE-2020-15731

An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.

📖 Read

via "National Vulnerability Database".
CVE-2019-17098

Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior versions on Android. August Connect Firmware version 2.2.12 and prior versions.

📖 Read

via "National Vulnerability Database".
🦿 The state of security and the evolving role of CISOs in a pandemic 🦿

Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020.

📖 Read

via "Tech Republic".
Facebook Small Business Grants Spark Identity-Theft Scam

The cybercrooks spread the COVID-19 relief scam via Telegram and WhatsApp, and ultimately harvest account credentials and even pics of IDs.

📖 Read

via "Threat Post".
CVE-2020-4629

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.

📖 Read

via "National Vulnerability Database".
🦿 Account takeover fraud rates skyrocketed 282% over last year 🦿

ATO is the weapon of choice for fraudsters leading up to the holiday shopping season, new data from Sift shows, and consumers place account security burden on businesses.

📖 Read

via "Tech Republic".
🕴 COVID-19 Creates Opening for OT Security Reform 🕴

Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.

📖 Read

via "Dark Reading".
🕴 Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures 🕴

Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands.

📖 Read

via "Dark Reading".
CVE-2020-12506

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362 version FW03 and prior versions. WAGO 750-363 version FW03 and prior versions. WAGO 750-823 version FW03 and prior versions. WAGO 750-832/xxx-xxx version FW03 and prior versions. WAGO 750-862 version FW03 and prior versions. WAGO 750-891 version FW03 and prior versions. WAGO 750-890/xxx-xxx version FW03 and prior versions.

📖 Read

via "National Vulnerability Database".
CVE-2020-12505

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852 version FW07 and prior versions. WAGO 750-880/xxx-xxx version FW07 and prior versions. WAGO 750-881 version FW07 and prior versions. WAGO 750-831/xxx-xxx version FW07 and prior versions. WAGO 750-882 version FW07 and prior versions. WAGO 750-885/xxx-xxx version FW07 and prior versions. WAGO 750-889 version FW07 and prior versions.

📖 Read

via "National Vulnerability Database".
🔏 Insider Stole Yacht IP via USB, Company Alleges 🔏

The latest industrial espionage case involves theft at a yacht manufacturer by a now ex-employee.

📖 Read

via "Digital Guardian".
Android Spyware Variant Snoops on WhatsApp, Telegram Messages

The Android malware comes from threat group APT-C-23, also known as Two-Tailed Scorpion and Desert Scorpion.

📖 Read

via "Threat Post".
🕴 A Guide to the NIST Cybersecurity Framework 🕴

With cybersecurity threats growing exponentially, it has never been more important to put together an efficient cyber-risk management policy, and NIST's framework can help.

📖 Read

via "Dark Reading".
CVE-2019-20921

bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.

📖 Read

via "National Vulnerability Database".
CVE-2020-21523

A Server-Side Freemarker template injection vulnerability in halo CMS v1.1.3 In the Edit Theme File function. The ftl file can be edited. This is the Freemarker template file. This file can cause arbitrary code execution when it is rendered in the background. exp: <#assign test="freemarker.template.utility.Execute"?new()> ${test("touch /tmp/freemarkerPwned")}

📖 Read

via "National Vulnerability Database".
CVE-2020-21527

There is an Arbitrary file deletion vulnerability in halo v1.1.3. A backup function in the background allows a user, when deleting their backup files, to delete any files on the system through directory traversal.

📖 Read

via "National Vulnerability Database".
CVE-2020-21244

An issue was discovered in FrontAccounting 2.4.7. There is a Directory Traversal vulnerability that can empty folder via admin/inst_lang.php.

📖 Read

via "National Vulnerability Database".
CVE-2020-25763

Seat Reservation System version 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading PHP files.

📖 Read

via "National Vulnerability Database".
CVE-2020-26157

Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled during syncing. This leads to remote code execution because of Node integration.

📖 Read

via "National Vulnerability Database".
🕴 What Legal Language Should I Look Out for When Selecting Cyber Insurance? 🕴

At times, vague coverage can actually work for you.

📖 Read

via "Dark Reading".