โผ CVE-2020-13346 โผ
๐ Read
via "National Vulnerability Database".
Membership changes are not reflected in ToDo subscriptions in GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, allowing guest users to access confidential issues through API.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-14355 โผ
๐ Read
via "National Vulnerability Database".
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.๐ Read
via "National Vulnerability Database".
๐ Packet Fence 10.2.0 ๐
๐ Read
via "Packet Storm Security".
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.๐ Read
via "Packet Storm Security".
Packetstormsecurity
Packet Fence 10.2.0 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ FINRA Warns Financial Services Firms of New Phishing Campaign ๐
๐ Read
via "Digital Guardian".
FINRA, a self-regulatory organization that oversees brokers and broker-dealers, is warning about a new phishing attack that looks like its coming from the organization.๐ Read
via "Digital Guardian".
Digital Guardian
FINRA Warns Financial Services Firms of New Phishing Campaign
FINRA, a self-regulatory organization that oversees brokers and broker-dealers, is warning about a new phishing attack that looks like its coming from the organization.
โ BAHAMUT Spies-for-Hire Linked to Extensive Nation-State Activity โ
๐ Read
via "Threat Post".
Researchers uncovered a sophisticated, incredibly well-resourced APT that has its fingers in wide-ranging espionage and disinformation campaigns.๐ Read
via "Threat Post".
Threat Post
BAHAMUT Spies-for-Hire Linked to Extensive Nation-State Activity
Researchers uncovered a sophisticated, incredibly well-resourced APT that has its fingers in wide-ranging espionage and disinformation campaigns.
๐ด The New War Room: Cybersecurity in the Modern Era ๐ด
๐ Read
via "Dark Reading".
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.๐ Read
via "Dark Reading".
Dark Reading
The New War Room: Cybersecurity in the Modern Era
The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.
โผ CVE-2019-16160 โผ
๐ Read
via "National Vulnerability Database".
An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-26870 โผ
๐ Read
via "National Vulnerability Database".
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.๐ Read
via "National Vulnerability Database".
โ Google Rolls Out Fixes for High-Severity Android System Flaws โ
๐ Read
via "Threat Post".
The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-0215 and CVE-2020-0416).๐ Read
via "Threat Post".
Threat Post
Google Rolls Out Fixes for High-Severity Android System Flaws
The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-0215 and CVE-2020-0416).
๐ด CISA Warns of Renewed Emotet Activity ๐ด
๐ Read
via "Dark Reading".
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.๐ Read
via "Dark Reading".
Dark Reading
CISA Warns of Renewed Emotet Activity
The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.
โ Feds Sound Alarm Over Emotet Attacks on State, Local Govs โ
๐ Read
via "Threat Post".
CISA warned already-strained public-sector entities about disturbing spikes in Emotet phishing attacks aimed at municipalities.๐ Read
via "Threat Post".
Threat Post
Feds Sound Alarm Over Emotet Attacks on State, Local Govs
CISA warned already-strained public-sector entities about disturbing spikes in Emotet phishing attacks aimed at municipalities.
๐ฆฟ 3 ways criminals use artificial intelligence in cybersecurity attacks ๐ฆฟ
๐ Read
via "Tech Republic".
Bad actors use machine learning to break passwords more quickly and build malware that knows how to hide, experts warn.๐ Read
via "Tech Republic".
TechRepublic
3 ways criminals use artificial intelligence in cybersecurity attacks
Bad actors use machine learning to break passwords more quickly and build malware that knows how to hide, experts warn.
๐ฆฟ 5 strategies for CISOs during a time of rapid business transformation ๐ฆฟ
๐ Read
via "Tech Republic".
A survey of business leaders by PwC finds the pandemic is causing rapid changes in the roles CISOs play, and offers five tips for ensuring that security remains stable as we enter a new normal.๐ Read
via "Tech Republic".
TechRepublic
5 strategies for CISOs during a time of rapid business transformation
A survey of business leaders by PwC finds the pandemic is causing rapid changes in the roles CISOs play, and offers five tips for ensuring that security remains stable as we enter a new normal.
๐ด Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats ๐ด
๐ Read
via "Dark Reading".
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.๐ Read
via "Dark Reading".
Dark Reading
Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats
Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.
โผ CVE-2020-26880 โผ
๐ Read
via "National Vulnerability Database".
Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-15176 โผ
๐ Read
via "National Vulnerability Database".
In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2๐ Read
via "National Vulnerability Database".
โผ CVE-2020-15217 โผ
๐ Read
via "National Vulnerability Database".
In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-15175 โผ
๐ Read
via "National Vulnerability Database".
In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in รขโฌœ/files/รขโฌ๏ฟฝ. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.๐ Read
via "National Vulnerability Database".
๐ด 3 Ways Companies are Working on Security by Design ๐ด
๐ Read
via "Dark Reading".
Execs from top financial organizations and other companies share insights on building a security culture.๐ Read
via "Dark Reading".
๐ด Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs ๐ด
๐ Read
via "Dark Reading".
Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.๐ Read
via "Dark Reading".
Dark Reading
Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs
Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.
๐ฆฟ Cybersecurity Awareness Month: How to protect your kids from identity theft ๐ฆฟ
๐ Read
via "Tech Republic".
Freezing your child's credit is one way to stop cybercriminals from destroying their credit. But you have to be careful to keep the key to thaw it later.๐ Read
via "Tech Republic".
TechRepublic
Cybersecurity Awareness Month: How to protect your kids from identity theft
Freezing your child's credit is one way to stop cybercriminals from destroying their credit. But you have to be careful to keep the key to thaw it later.