π¦Ώ Vulnerable supply chains introduce increasingly interconnected attack surfaces π¦Ώ
π Read
via "Tech Republic".
Accenture Security lists five other "extreme but plausible threat scenarios in financial services" in a new report.π Read
via "Tech Republic".
TechRepublic
Vulnerable supply chains introduce increasingly interconnected attack surfaces
Accenture Security lists five other "extreme but plausible threat scenarios in financial services" in a new report.
βΌ CVE-2020-5422 βΌ
π Read
via "National Vulnerability Database".
BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).π Read
via "National Vulnerability Database".
π Bing.com Hostname / IP Enumerator 1.0.4 π
π Read
via "Packet Storm Security".
This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.π Read
via "Packet Storm Security".
Packetstormsecurity
Bing.com Hostname / IP Enumerator 1.0.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Account Takeover Fraud Losses Total Billions Across Online Retailers β
π Read
via "Threat Post".
Account takeover fraud (ATO) attacks are on the rise, up nearly 300 percent since last year.π Read
via "Threat Post".
Threat Post
Account Takeover Fraud Losses Total Billions Across Online Retailers
Account takeover fraud (ATO) attacks are on the rise, up nearly 300 percent since last year.
β Voter Registration βErrorβ Phish Hits During U.S. Election Frenzy β
π Read
via "Threat Post".
Phishing emails tell recipients that their voter's registration applications are incomplete - but instead steal their social security numbers, license data and more.π Read
via "Threat Post".
Threat Post
Voter Registration βErrorβ Phish Hits During U.S. Election Frenzy
Phishing emails tell recipients that their voter's registration applications are incomplete - but instead steal their social security numbers, license data and more.
βΌ CVE-2020-24568 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the lancompenent component, allowing logged-in attackers to discover arbitrary information.π Read
via "National Vulnerability Database".
βΌ CVE-2020-24627 βΌ
π Read
via "National Vulnerability Database".
A remote stored xss vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3.π Read
via "National Vulnerability Database".
βΌ CVE-2020-5979 βΌ
π Read
via "National Vulnerability Database".
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges.π Read
via "National Vulnerability Database".
π΄ Biometric Data Collection Demands Scrutiny of Privacy Law π΄
π Read
via "Dark Reading".
An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.π Read
via "Dark Reading".
Dark Reading
Biometric Data Collection Demands Scrutiny of Privacy Law
An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.
β Egregor Ransomware Threatens βMass-Mediaβ Release of Corporate Data β
π Read
via "Threat Post".
The newly discovered ransomware is hitting companies worldwide, including the GEFCO global logistics company.π Read
via "Threat Post".
Threat Post
Egregor Ransomware Threatens βMass-Mediaβ Release of Corporate Data
The newly discovered ransomware is hitting companies worldwide, including the GEFCO global logistics company.
π΄ Researchers Adapt AI With Aim to Identify Anonymous Authors π΄
π Read
via "Dark Reading".
At Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.π Read
via "Dark Reading".
Dark Reading
Researchers Adapt AI With Aim to Identify Anonymous Authors
At Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.
βΌ CVE-2020-5984 βΌ
π Read
via "National Vulnerability Database".
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15231 βΌ
π Read
via "National Vulnerability Database".
In mapfish-print before version 3.24, a user can use the JSONP support to do a Cross-site scripting.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26526 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Damstra Smart Asset 2020.7. It is possible to enumerate valid usernames on the login page. The application sends a different server response when the username is invalid than when the username is valid ("Unable to find an APIDomain" versus "Wrong email or password").π Read
via "National Vulnerability Database".
βΌ CVE-2020-25776 βΌ
π Read
via "National Vulnerability Database".
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2017-18924 βΌ
π Read
via "National Vulnerability Database".
** DISPUTED ** oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also therefore wouldn't describe this as a "vulnerability" with the library per se.'π Read
via "National Vulnerability Database".
π΄ test chunk server π΄
π Read
via "Dark Reading".
Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.π Read
via "Dark Reading".
Dark Reading
Dark Reading | Security | Protect The Business - Enable Access
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
β Serious Security: Phishing without links β when phishers bring along their own web pages β
π Read
via "Naked Security".
How do you "check the URL before you click" if the web page you're visiting is already on your own computer?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2020-7709 βΌ
π Read
via "National Vulnerability Database".
This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.π Read
via "National Vulnerability Database".
π Nmap Port Scanner 7.90 π
π Read
via "Packet Storm Security".
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.π Read
via "Packet Storm Security".
Packetstormsecurity
Nmap Port Scanner 7.90 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π GRR 3.4.2.3 π
π Read
via "Packet Storm Security".
GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.π Read
via "Packet Storm Security".
Packetstormsecurity
GRR 3.4.2.3 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers