πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ COVID-19 Clinical Trials Slowed After Ransomware Attack ❌

The attack on eResearchTechnology potentially slowed down coronavirus research worldwide, and researchers suggest a nation-state actor could be behind the incident.

πŸ“– Read

via "Threat Post".
πŸ” What is ITAR Compliance? 2020 ITAR Regulations, Fines, Certifications & More πŸ”

Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Malware for Ad Fraud Gets More Sophisticated πŸ•΄

Facebook says SilentFade campaign disabled notifications that could have warned users that their accounts had been compromised.

πŸ“– Read

via "Dark Reading".
⚠ Naked Security Podcast – we’re back for Series 3! ⚠

Join us weekly for the Naked Security Podcast - back for Series 3 and available wherever good podcasts are found!

πŸ“– Read

via "Naked Security".
❌ Microsoft Zerologon Flaw Under Attack By Iranian Nation-State Actors ❌

Microsoft warns that the MERCURY APT has been actively exploiting CVE-2020-1472 in campaigns for the past two weeks.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-25742 β€Ό

pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25803 β€Ό

Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.

πŸ“– Read

via "National Vulnerability Database".
🦿 Wi-Fi security: FBI warns of risks of using wireless hotel networks 🦿

Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.

πŸ“– Read

via "Tech Republic".
πŸ›  Lynis Auditing Tool 3.0.1 πŸ› 

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

πŸ“– Read

via "Packet Storm Security".
❌ Boom! Mobile Customer Data Lost to Fullz House/Magecart Attack ❌

The Magecart spinoff group targeted the wireless service provider in an odd choice of victim.

πŸ“– Read

via "Threat Post".
🦿 How to boost the effectiveness of your cybersecurity operations 🦿

Data breaches occur despite tight security. Arctic Wolf explains how to increase your security effectiveness.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 10 Years Since Stuxnet: Is Your Operational Technology Safe? πŸ•΄

The destructive worm may have debuted a decade ago, but Stuxnet is still making its presence known. Here are steps you can take to stay safer from similar attacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26582 β€Ό

D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-4725 β€Ό

IBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Brings Password Protection to iOS, Android in Chrome 86 πŸ•΄

Chrome 86 will alert users when stored passwords are compromised, and block or warn of insecure downloads, among other security updates.

πŸ“– Read

via "Dark Reading".
❌ Male Chastity Device Comes with Massive Security Flaws ❌

Smart sex toy vulnerable to hacks, researchers say -- which could expose users’ most sensitive bits (of data) to cybercriminals.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-26598 β€Ό

An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, and 9.0 software. The Network Management component could allow an unauthorized actor to kill a TCP connection. The LG ID is LVE-SMP-200023 (October 2020).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15239 β€Ό

In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New Research Finds Bugs in Every Anti-Malware Product Tested πŸ•΄

Products from every vendor had issues that allowed attackers to elevate privileges on a system -- if they already were on it.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Zerologon Vulnerability Used in APT Attacks πŸ•΄

MERCURY, the Iranian advanced persistent threat group, is using Zerologon in a new series of attacks detected by Microsoft.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-14183 β€Ό

Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1.

πŸ“– Read

via "National Vulnerability Database".