๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿ” FINRA Warns Financial Services Firms of New Phishing Campaign ๐Ÿ”

FINRA, a self-regulatory organization that oversees brokers and broker-dealers, is warning about a new phishing attack that looks like its coming from the organization.

๐Ÿ“– Read

via "Digital Guardian".
โŒ BAHAMUT Spies-for-Hire Linked to Extensive Nation-State Activity โŒ

Researchers uncovered a sophisticated, incredibly well-resourced APT that has its fingers in wide-ranging espionage and disinformation campaigns.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด The New War Room: Cybersecurity in the Modern Era ๐Ÿ•ด

The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2019-16160 โ€ผ

An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-26870 โ€ผ

Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Google Rolls Out Fixes for High-Severity Android System Flaws โŒ

The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-0215 and CVE-2020-0416).

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด CISA Warns of Renewed Emotet Activity ๐Ÿ•ด

The Emotet malware dropper is seeing an upsurge in new activity in the second half of 2020.

๐Ÿ“– Read

via "Dark Reading".
โŒ Feds Sound Alarm Over Emotet Attacks on State, Local Govs โŒ

CISA warned already-strained public-sector entities about disturbing spikes in Emotet phishing attacks aimed at municipalities.

๐Ÿ“– Read

via "Threat Post".
๐Ÿฆฟ 3 ways criminals use artificial intelligence in cybersecurity attacks ๐Ÿฆฟ

Bad actors use machine learning to break passwords more quickly and build malware that knows how to hide, experts warn.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿฆฟ 5 strategies for CISOs during a time of rapid business transformation ๐Ÿฆฟ

A survey of business leaders by PwC finds the pandemic is causing rapid changes in the roles CISOs play, and offers five tips for ensuring that security remains stable as we enter a new normal.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿ•ด Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats ๐Ÿ•ด

Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2020-26880 โ€ผ

Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-15176 โ€ผ

In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-15217 โ€ผ

In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-15175 โ€ผ

In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in รขโ‚ฌœ/files/รขโ‚ฌ๏ฟฝ. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด 3 Ways Companies are Working on Security by Design ๐Ÿ•ด

Execs from top financial organizations and other companies share insights on building a security culture.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Rare Firmware Rootkit Discovered Targeting Diplomats, NGOs ๐Ÿ•ด

Second-ever sighting of a firmware exploit in the wild is a grim reminder of the dangers of these mostly invisible attacks.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿฆฟ Cybersecurity Awareness Month: How to protect your kids from identity theft ๐Ÿฆฟ

Freezing your child's credit is one way to stop cybercriminals from destroying their credit. But you have to be careful to keep the key to thaw it later.

๐Ÿ“– Read

via "Tech Republic".
๐Ÿ•ด Open Source Threat Intelligence Searches for Sustainable Communities ๐Ÿ•ด

As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด New 'HEH' Botnet Targets Exposed Telnet Services ๐Ÿ•ด

Latest threat is one in a growing list of malware developed in the Go programming language.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด 'Bahamut' Threat Group Targets Government & Industry in Middle East ๐Ÿ•ด

Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.

๐Ÿ“– Read

via "Dark Reading".