πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-26166 β€Ό

The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task.

πŸ“– Read

via "National Vulnerability Database".
❌ Video-Game Piracy Group β€˜Team Xecuter’ Leaders in Custody ❌

The two alleged leaders of Team Xecuter targeted popular consoles like the Nintendo Switch, the Sony PlayStation Classic and Microsoft Xbox.

πŸ“– Read

via "Threat Post".
❌ Tenda Router Zero-Days Emerge in Spyware Botnet Campaign ❌

A variant of the Mirai botnet, called Ttint, has added espionage capabilities to complement its denial-of-service functions.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-25635 β€Ό

A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8228 β€Ό

A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.

πŸ“– Read

via "National Vulnerability Database".
⚠ Naked Security Live – Stay on top of phishing scams ⚠

Naked Security Live - here's the recorded version of our latest video. Enjoy.

πŸ“– Read

via "Naked Security".
❌ Rare Bootkit Malware Targets North Korea-Linked Diplomats ❌

The MosaicRegressor espionage framework is newly discovered and appears to be the work of Chinese-speaking actors.

πŸ“– Read

via "Threat Post".
πŸ” Telework Tips to Help Organizations Grappling with WFH Life πŸ”

The Cybersecurity & Infrastructure Security Agency has released a collection of tips and best practices to help companies and employees better secure the new extended network perimeter.

πŸ“– Read

via "Digital Guardian".
❌ Malware Families Turn to Legit Pastebin-Like Service ❌

AgentTesla, LimeRAT, W3Cryptolocker and Redline Stealer are now using Paste.nrecom in spear-phishing attacks.

πŸ“– Read

via "Threat Post".
πŸ•΄ 'Virtual Cyber Carnival' Kicks off Cybersecurity Awareness Month πŸ•΄

A new initiative will run throughout the month of October, invites the general public to play cybersecurity games (and win fabulous prizes).

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-24231 β€Ό

Symmetric DS <3.12.0 uses mx4j to provide access to JMX over HTTP. mx4j, by default, has no auth and is available on all interfaces. An attacker can interact with JMX: get system info, and invoke MBean methods. It is possible to install additional MBeans from a remote host using MLet that leads to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15235 β€Ό

In RACTF before commit f3dc89b, unauthenticated users are able to get the value of sensitive config keys that would normally be hidden to everyone except admins. All versions after commit f3dc89b9f6ab1544a289b3efc06699b13d63e0bd(3/10/20) are patched.

πŸ“– Read

via "National Vulnerability Database".
🦿 Top 5 things to know about Confidential Computing 🦿

The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.

πŸ“– Read

via "Tech Republic".
❌ Black-T Malware Emerges From Cryptojacker Group TeamTNT ❌

Researchers have discovered the latest cryptojacking malware gambit from TeamTNT, called Black-T. The variant builds on the group’s typical approach, with a few new β€” and sophisticated β€” extras. TeamTNT is known for its targeting of Amazon Web Services (AWS) credentials, to break into the cloud and use it to mine for the Monero cryptocurrency. […]

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-16226 β€Ό

Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15237 β€Ό

In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.

πŸ“– Read

via "National Vulnerability Database".
❌ Post Grid WordPress Plugin Flaws Allow Site Takeovers ❌

Team Showcase, a sister plugin, is also vulnerable to the XSS and PHP object-injection bugs -- together they have 66,000 installs.

πŸ“– Read

via "Threat Post".
πŸ•΄ Android Camera Bug Under the Microscope πŸ•΄

Critical Android vulnerability CVE-2019-2234 could enable attackers to take control of a victim's camera and take photos, record videos, and learn location.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Meet 'Egregor,' a New Ransomware Family to Watch πŸ•΄

Egregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment.

πŸ“– Read

via "Dark Reading".
πŸ•΄ John McAfee Indicted on Tax Charges πŸ•΄

The indictment alleging tax evasion and failure to file returns was unsealed after his arrest in Spain.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26572 β€Ό

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

πŸ“– Read

via "National Vulnerability Database".