β COVID-19 Clinical Trials Slowed After Ransomware Attack β
π Read
via "Threat Post".
The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the incident.π Read
via "Threat Post".
Threat Post
COVID-19 Clinical Trials Slowed After Ransomware Attack
The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest it could be a nation-state actor behind the incident.
π What is ITAR Compliance? 2020 ITAR Regulations, Fines, Certifications & More π
π Read
via "Digital Guardian".
Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.π Read
via "Digital Guardian".
Digitalguardian
What is ITAR Compliance? (Regulations, Fines, & More)
Companies must register with the DDTC and know what is required of them to be ITAR compliant and then certify that they possess that knowledge.
π΄ Malware for Ad Fraud Gets More Sophisticated π΄
π Read
via "Dark Reading".
Facebook says SilentFade campaign disabled notifications that could have warned users that their accounts had been compromised.π Read
via "Dark Reading".
Dark Reading
Malware for Ad Fraud Gets More Sophisticated
Facebook says SilentFade campaign disabled notifications that could have warned users that their accounts had been compromised.
β Naked Security Podcast β weβre back for Series 3! β
π Read
via "Naked Security".
Join us weekly for the Naked Security Podcast - back for Series 3 and available wherever good podcasts are found!π Read
via "Naked Security".
Naked Security
Naked Security Podcast β weβre back for Series 3!
Join us weekly for the Naked Security Podcast β back for Series 3 and available wherever good podcasts are found!
β Microsoft Zerologon Flaw Under Attack By Iranian Nation-State Actors β
π Read
via "Threat Post".
Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks.π Read
via "Threat Post".
Threat Post
Microsoft Zerologon Flaw Under Attack By Iranian Nation-State Actors
Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks.
βΌ CVE-2020-25742 βΌ
π Read
via "National Vulnerability Database".
pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25803 βΌ
π Read
via "National Vulnerability Database".
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.π Read
via "National Vulnerability Database".
π¦Ώ Wi-Fi security: FBI warns of risks of using wireless hotel networks π¦Ώ
π Read
via "Tech Republic".
Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.π Read
via "Tech Republic".
TechRepublic
Wi-Fi security: FBI warns of risks of using wireless hotel networks
Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.
π Lynis Auditing Tool 3.0.1 π
π Read
via "Packet Storm Security".
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.π Read
via "Packet Storm Security".
Packetstormsecurity
Lynis Auditing Tool 3.0.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Boom! Mobile Customer Data Lost to Fullz House/Magecart Attack β
π Read
via "Threat Post".
The Magecart spinoff group targeted the wireless service provider in an odd choice of victim.π Read
via "Threat Post".
Threat Post
Boom! Mobile Customer Data Lost to Fullz House/Magecart Attack
The Magecart spinoff group targeted the wireless service provider in an odd choice of victim.
π¦Ώ How to boost the effectiveness of your cybersecurity operations π¦Ώ
π Read
via "Tech Republic".
Data breaches occur despite tight security. Arctic Wolf explains how to increase your security effectiveness.π Read
via "Tech Republic".
π΄ 10 Years Since Stuxnet: Is Your Operational Technology Safe? π΄
π Read
via "Dark Reading".
The destructive worm may have debuted a decade ago, but Stuxnet is still making its presence known. Here are steps you can take to stay safer from similar attacks.π Read
via "Dark Reading".
Dark Reading
10 Years Since Stuxnet: Is Your Operational Technology Safe?
The destructive worm may have debuted a decade ago, but Stuxnet is still making its presence known. Here are steps you can take to stay safer from similar attacks.
βΌ CVE-2020-26582 βΌ
π Read
via "National Vulnerability Database".
D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).π Read
via "National Vulnerability Database".
βΌ CVE-2019-4725 βΌ
π Read
via "National Vulnerability Database".
IBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131.π Read
via "National Vulnerability Database".
π΄ Google Brings Password Protection to iOS, Android in Chrome 86 π΄
π Read
via "Dark Reading".
Chrome 86 will alert users when stored passwords are compromised, and block or warn of insecure downloads, among other security updates.π Read
via "Dark Reading".
Dark Reading
Google Brings Password Protection to iOS, Android in Chrome 86
Chrome 86 will alert users when stored passwords are compromised, and block or warn of insecure downloads, among other security updates.
β Male Chastity Device Comes with Massive Security Flaws β
π Read
via "Threat Post".
Smart sex toy vulnerable to hacks, researchers say -- which could expose usersβ most sensitive bits (of data) to cybercriminals.π Read
via "Threat Post".
Threat Post
Male Chastity Device Comes with Massive Security Flaws
Smart sex toy vulnerable to hacks, researchers say β which could expose usersβ most sensitive bits (of data) to cybercriminals.
βΌ CVE-2020-26598 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, and 9.0 software. The Network Management component could allow an unauthorized actor to kill a TCP connection. The LG ID is LVE-SMP-200023 (October 2020).π Read
via "National Vulnerability Database".
βΌ CVE-2020-15239 βΌ
π Read
via "National Vulnerability Database".
In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0.π Read
via "National Vulnerability Database".
π΄ New Research Finds Bugs in Every Anti-Malware Product Tested π΄
π Read
via "Dark Reading".
Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.π Read
via "Dark Reading".
Dark Reading
New Research Finds Bugs in Every Anti-Malware Product Tested
Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.
π΄ Zerologon Vulnerability Used in APT Attacks π΄
π Read
via "Dark Reading".
MERCURY, the Iranian advanced persistent threat group, is using Zerologon in a new series of attacks detected by Microsoft.π Read
via "Dark Reading".
Darkreading
Zerologon Vulnerability Used in APT Attacks
MERCURY, the Iranian advanced persistent threat group, is using Zerologon in a new series of attacks detected by Microsoft.
βΌ CVE-2020-14183 βΌ
π Read
via "National Vulnerability Database".
Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1.π Read
via "National Vulnerability Database".