πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-15242 β€Ό

Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.

πŸ“– Read

via "National Vulnerability Database".
🦿 COVID-19 budgets, data security, and automation are concerns of IT leaders and staff 🦿

Dueling surveys from Kaseya showed that IT department leaders share their underlings' worries about security and productivity.

πŸ“– Read

via "Tech Republic".
🦿 Password managers: A cheat sheet for professionals 🦿

The sheer number of passwords the average person has can lead to confusion and tons of password retrieval emails. Simplify and secure your digital life by learning about password managers.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-15243 β€Ό

Affected versions of Smartstore have a missing WebApi Authentication attribute. This vulnerability affects Smartstore shops in version 4.0.0 & 4.0.1 which have installed and activated the Web API plugin. Users of Smartstore 4.0.0 and 4.0.1 must merge their repository with 4.0.x or overwrite the file SmartStore.Web.Framework in the */bin* directory of the deployed shop with this file. As a workaround without updating uninstall the Web API plugin to close this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26162 β€Ό

Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26921 β€Ό

Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective πŸ•΄

In recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.

πŸ“– Read

via "Dark Reading".
❌ Wormable Apple iCloud Bug Allows Automatic Photo Theft ❌

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep1: Ransomware – is it really OK to pay? – Naked Security Podcast ⚠

The Naked Security Podcast is back for Series 3 - here's Episode 1!

πŸ“– Read

via "Naked Security".
πŸ•΄ Why MSPs Are Hacker Targets, and What To Do About It πŸ•΄

Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-9105 β€Ό

Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13955 β€Ό

HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.

πŸ“– Read

via "National Vulnerability Database".
❌ Facebook Debuts Bug-Bounty β€˜Loyalty Program’ ❌

Facebook bounty hunters will be placed into tiers by analyzing their score, signal and number of submitted bug reports -- which will dictate new bonus percentages.

πŸ“– Read

via "Threat Post".
🦿 The new Ring Always Home Camera is a security disaster in the making 🦿

Jack Wallen offers his take on the upcoming release of the Ring Always Home Cam.

πŸ“– Read

via "Tech Republic".
🦿 Could Microsoft be en route to dumping Windows in favor of Linux? 🦿

Microsoft Linux is the next evolution of the Microsoft desktop operating system, argues Jack Wallen. He explains why this would be a win-win for Microsoft, IT pros, users, and the Linux community.

πŸ“– Read

via "Tech Republic".
❌ Sophisticated Android Ransomware Executes with the Home Button ❌

The malware also has a unique machine-learning module.

πŸ“– Read

via "Threat Post".
πŸ•΄ CISOs Planning on Bigger Budgets: Report πŸ•΄

Budgets are on the rise, even in a time of revenue worries across the industry.

πŸ“– Read

via "Dark Reading".
🦿 How to secure your open source supply chain 🦿

Commentary: Open source has never been more popular, which means it's time to figure out how to effectively secure the open source you use. Two experts weigh in.

πŸ“– Read

via "Tech Republic".
🦿 How the enterprise can shut down cyber criminals and protect a remote staff 🦿

Hackers accidentally allowed into company software by security noncompliant employees cost businesses millions annually; we asked experts to weigh in on best safety practices.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Critical Zerologon Flaw Exploited in TA505 Attacks πŸ•΄

Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

πŸ“– Read

via "Dark Reading".
πŸ” 10/9 Friday Five πŸ”

Antitrust reforms, biometic data collection, and DHS malware warnings - catch up on all the week's news with the Friday Five!

πŸ“– Read

via "Digital Guardian".