πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-4689 β€Ό

IBM Security Guardium 11.2 is vulnerable to CVS Injection. A remote privileged attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-ForceID: 186696.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8820 β€Ό

An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload will be rendered and executed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25825 β€Ό

In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.

πŸ“– Read

via "National Vulnerability Database".
🦿 Infographic: Ransomware attacks by industry, continent, and more 🦿

Cyberattacks have surged during the coronavirus pandemic. This infographic details ransomware attack trends by industry, continent, and more.

πŸ“– Read

via "Tech Republic".
πŸ•΄ What is End-to-End Encryption? πŸ•΄

Many services advertise E2EE, but not all of them actually offer it.

πŸ“– Read

via "Dark Reading".
πŸ›  Nmap Port Scanner 7.91 πŸ› 

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

πŸ“– Read

via "Packet Storm Security".
πŸ” Attackers Chaining Together Netlogon, VPN Bugs to Attack Govts πŸ”

CISA is warning that attackers are chaining together vulnerabilities in Windows Netlogon protocol and VPNs to hack government networks.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Security Firms & Financial Group Team Up to Take Down Trickbot πŸ•΄

Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15250 β€Ό

In JUnit4 before version 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26546 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in HelpDeskZ 1.0.2. The feature to auto-login a user, via the RememberMe functionality, is prone to SQL injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
⚠ Microsoft on the counter­attack! Trickbot malware network takes a hit ⚠

The crooks haven't yet been caught and arrested, but their malware distribution network has been hit hard.

πŸ“– Read

via "Naked Security".
πŸ•΄ Software AG Continues Efforts Against $20M Ransomware Attack πŸ•΄

The attack, which now includes extortion components, has moved into its second week.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15012 β€Ό

A Directory Traversal issue was discovered in Sonatype Nexus Repository Manager 2.x before 2.14.19. A user that requests a crafted path can traverse up the file system to get access to content on disk (that the user running nxrm also has access to).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-17444 β€Ό

Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7743 β€Ό

The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
❌ Office 365: A Favorite for Cyberattack Persistence ❌

Bad actors are leveraging legitimate services and tools within Microsoft's productivity suite to launch cyberattacks on COVID-19 stay-at-home workers, new research finds.

πŸ“– Read

via "Threat Post".
πŸ•΄ Online Voting Is Coming, but How Secure Will It Be? πŸ•΄

It's time for state governments to act as leaders, adopt digital ID standards, enable new online voting systems, and provide broad-based access to all communities for the benefit of all.

πŸ“– Read

via "Dark Reading".
❌ TrickBot Takedown Disrupts Major Crimeware Apparatus ❌

Microsoft and partners went after the botnet using a copyright infringement tactic and hunting down C2 servers.

πŸ“– Read

via "Threat Post".
🦿 Cybercriminals use stolen data and hacking tools as prizes in poker games and rap battles 🦿

Prizes for bad actors can be access to stolen data and tools to make hacks easier, according to new research from Trend Micro.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-16124 β€Ό

Integer Overflow or Wraparound vulnerability in the XML RPC library of OpenRobotics ros_comm communications packages allows unauthenticated network traffic to cause unexpected behavior. This issue affects: OpenRobotics ros_comm communications packages Noetic and prior versions. Fixed in https://github.com/ros/ros_comm/pull/2065.

πŸ“– Read

via "National Vulnerability Database".