๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.9K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
๐Ÿฆฟ How to improve the cybersecurity of your remote workers ๐Ÿฆฟ

Cyberattacks against businesses have spiked since the shift to remote work began in early 2020, says Keeper Security.

๐Ÿ“– Read

via "Tech Republic".
โš  Creepy covert camera โ€œfeatureโ€ found in popular smartwatch for kids โš 

This popular smartwatch aimed at kids had a backdoor that received covert encrypted commands via SMS.

๐Ÿ“– Read

via "Naked Security".
๐Ÿ•ด Trickbot Botnet Response Highlights Partnerships Preventing U.S. Election Interference ๐Ÿ•ด

Recent efforts by USCYBERCOM and Microsoft to disrupt the Trickbot botnet highlight the importance of partnerships in successful malware botnet disruption.

๐Ÿ“– Read

via "Dark Reading".
โŒ Critical Flash Player Flaw Opens Adobe Users to RCE โŒ

The flaw stems from a NULL Pointer Dereference error and plagues the Windows, macOS, Linux and ChromeOS versions of Adobe Flash Player.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด Where are the 'Great Exits' in the Data Security Market? ๐Ÿ•ด

If data security were a student, its report card would read "Not performing to potential." Here's why.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2020-17411 โ€ผ

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11190.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-17413 โ€ผ

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11226.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-17414 โ€ผ

This vulnerability allows local attackers to escalate privileges on affected installations of Foxit Reader 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the configuration files used by the Foxit Reader Update Service. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-11229.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด 25% of BEC Cybercriminals Based in the US ๐Ÿ•ด

While the US is known to be a prime target for BEC attacks, just how many perpetrators are based there came as a surprise to researchers.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Treasury Dept. Advisory Shines Spotlight on Ransomware Negotiators ๐Ÿ•ด

With attacks showing no signs of abating, some companies have begun offering services to help reduce ransom demands, buy more time, and arrange payments.

๐Ÿ“– Read

via "Dark Reading".
โŒ Software AG Data Released After Clop Ransomware Strike โ€“ Report โŒ

The Clop group attacked Software AG, a German conglomerate with operations in more than 70 countries, threatening to dump stolen data if the whopping $23 million ransom isnโ€™t paid.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections ๐Ÿ•ด

The state of email defenses has a role to play in the US presidential election.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ” 50 Colleges Where You Can Get a Cybersecurity Degree Online Now ๐Ÿ”

You can gain many valuable cybersecurity skills online now. To celebrate National Cyber Security Awareness Month (NCSAM) we put together a list of 50 schools offering cybersecurity degrees online.

๐Ÿ“– Read

via "Digital Guardian".
๐Ÿ›  Raptor WAF 0.61 ๐Ÿ› 

Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.

๐Ÿ“– Read

via "Packet Storm Security".
โ€ผ CVE-2018-20243 โ€ผ

The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2020-15251 โ€ผ

In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
โŒ Lemon Duck Cryptocurrency-Mining Botnet Activity Spikes โŒ

Researchers warn of a spike in the cryptocurrency-mining botnet since August 2020.

๐Ÿ“– Read

via "Threat Post".
๐Ÿ•ด Coalition Pokes Five Eyes on Call for Backdoors ๐Ÿ•ด

The Five Eyes international law enforcement group had called for implementing backdoors for law enforcement in all encryption implementations.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Microsoft Fixes Critical Windows TCP/IP Flaw in Patch Rollout ๐Ÿ•ด

The October 2020 Patch Tuesday fixed 87 vulnerabilities, including 21 remote code execution flaws, in Microsoft products and services.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2020-25645 โ€ผ

A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.

๐Ÿ“– Read

via "National Vulnerability Database".