βΌ CVE-2020-8109 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been discovered in the ace.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. This can result in denial-of-service. This issue affects: Bitdefender Engines version 7.84892 and prior versions.π Read
via "National Vulnerability Database".
π WhatWeb Scanner 0.5.3 π
π Read
via "Packet Storm Security".
WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.π Read
via "Packet Storm Security".
Packetstormsecurity
WhatWeb Scanner 0.5.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π1
β Spammers Smuggle LokiBot Via URL Obfuscation Tactic β
π Read
via "Threat Post".
Researchers say that the campaign sidesteps end user detection and security solutions.π Read
via "Threat Post".
Threat Post
Spammers Smuggle LokiBot Via URL Obfuscation Tactic
Researchers say that the campaign sidesteps end user detection and security solutions.
π΄ Russian National Sentenced to 7+ Years for Hacking US Tech Firms π΄
π Read
via "Dark Reading".
Yevgeniy Nikulin received an 88-month sentence for breaking into LinkedIn, Dropbox, and the now-defunct social platform Formspring.π Read
via "Dark Reading".
Dark Reading
Russian National Sentenced to 7+ Years for Hacking US Tech Firms
Yevgeniy Nikulin received an 88-month sentence for breaking into LinkedIn, Dropbox, and the now-defunct social platform Formspring.
βΌ CVE-2020-24860 βΌ
π Read
via "National Vulnerability Database".
CMS Made Simple 2.2.14 allows an authenticated user with access to the Content Manager to edit content and put persistent XSS payload in the affected text fields. The user can get cookies from every authenticated user who visits the website.π Read
via "National Vulnerability Database".
π What is Data Loss Prevention (DLP)? A Definition of Data Loss Prevention π
π Read
via "Digital Guardian".
Learn more about data loss prevention software in Data Protection 101, our series covering the fundamentals of data security.π Read
via "Digital Guardian".
Digitalguardian
What is Data Loss Prevention (DLP)? Definition, Types & Tips
Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users. Learn more about data loss prevention software in Data Protection 101, our series covering the fundamentalsβ¦
β NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk β
π Read
via "Threat Post".
Federal prosecutors charged two men with crimes that carry up to 20 years in prison.π Read
via "Threat Post".
Threat Post
NFL, NBA Players Hacked in Would-Be Cyber-Slam-Dunk
Federal prosecutors charged two men with crimes that carry up to 20 years in prison.
π΄ 'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness π΄
π Read
via "Dark Reading".
To protect your organization from all emerging file-borne threats, the security and leadership teams must align to develop a streamlined approach to file security.π Read
via "Dark Reading".
Dark Reading
'It Won't Happen to Me': Employee Apathy Prevails Despite Greater Cybersecurity Awareness
To protect your organization from all emerging file-borne threats, the security and leadership teams must align to develop a streamlined approach to file security.
β Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs β
π Read
via "Threat Post".
Cybercriminals set up three different CAPTCHAs that Office 365 targets must click through before the final phishing page.π Read
via "Threat Post".
Threat Post
Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs
Cybercriminals set up three different CAPTCHAs that Office 365 targets must click through before the final phishing page.
βΌ CVE-2020-16844 βΌ
π Read
via "National Vulnerability Database".
In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.π Read
via "National Vulnerability Database".
π¦Ώ How to add clients to the Graylog system log manager π¦Ώ
π Read
via "Tech Republic".
Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.π Read
via "Tech Republic".
TechRepublic
How to add clients to the Graylog system log manager | TechRepublic
Graylog makes it easy to send syslog information from clients to the hosting server. Jack Wallen shows you how.
π΄ Imperva Agrees to Buy jSonar π΄
π Read
via "Dark Reading".
The deal is expected to close in mid-October.π Read
via "Dark Reading".
Dark Reading
Imperva Agrees to Buy jSonar
The deal is expected to close in mid-October.
π΄ CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros π΄
π Read
via "Dark Reading".
From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.π Read
via "Dark Reading".
Dark Reading
CFAA 101: A Computer Fraud & Abuse Act Primer for InfoSec Pros
From WarGames, to Aaron Swartz, to bug bounties, to Van Buren, here's what cybersecurity researchers should know about the US's primary anti-hacking law before it gets its day in the Supreme Court.
π΄ US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers π΄
π Read
via "Dark Reading".
An alarming new advisory issued today by the federal government could upend ransomware response.π Read
via "Dark Reading".
Dark Reading
US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers
An alarming new advisory issued today by the federal government could upend ransomware response.
βΌ CVE-2020-15673 βΌ
π Read
via "National Vulnerability Database".
Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15533 βΌ
π Read
via "National Vulnerability Database".
In Zoho ManageEngine Application Manager 14.7 Build 14730 (before 14684, and between 14689 and 14750), the AlarmEscalation module is vulnerable to unauthenticated SQL Injection attack.π Read
via "National Vulnerability Database".
β QR Codes: A Sneaky Security Threat β
π Read
via "Threat Post".
What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.π Read
via "Threat Post".
Threat Post
QR Codes: A Sneaky Security Threat
What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.
π΄ New HP Bug Bounty Program Targets Vulns in Printer Cartridges π΄
π Read
via "Dark Reading".
White-hat hackers will receive $10,000 for each security bug they discover plus a base fee, under this invitation-only initiative.π Read
via "Dark Reading".
Dark Reading
New HP Bug Bounty Program Targets Vulns in Printer Cartridges
White-hat hackers will receive $10,000 for each security bug they discover plus a base fee, under this invitation-only initiative.
π΄ Singapore Asks Big Cybersecurity Questions to Improve National Defense π΄
π Read
via "Dark Reading".
An executive from Singapore's Cyber Security Agency examines the role of security in a nation increasingly dependent on technology.π Read
via "Dark Reading".
Dark Reading
Singapore Asks Big Cybersecurity Questions to Improve National Defense
An executive from Singapore's Cyber Security Agency examines the role of security in a nation increasingly dependent on technology.
π¦Ώ Cybersecurity best practices: An open letter to end users π¦Ώ
π Read
via "Tech Republic".
In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure.π Read
via "Tech Republic".
TechRepublic
Cybersecurity best practices: An open letter to end users
In an effort to make IT pros' jobs easier, Jack Wallen offers cybersecurity tips to end users--in particular, what not to do to keep company networks, equipment, and data secure.
βΌ CVE-2020-5787 βΌ
π Read
via "National Vulnerability Database".
Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated attacker to delete arbitrary files on disk via the admin/services/packages/remove action.π Read
via "National Vulnerability Database".