πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Barnes & Noble restores Nook services after notifying customers about cyberattack 🦿

Analysts point to specific clues from the company's response that show it may have been a ransomware attack.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Cybercrime Losses Up 50%, Exceeding $1.8B πŸ•΄

Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2019-18796 β€Ό

The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Denial of Service vulnerability (infinite loop) via a crafted .mp3 file. This weakness could allow attackers to consume excessive CPU and the application becomes unresponsive.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26893 β€Ό

An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.

πŸ“– Read

via "National Vulnerability Database".
🦿 5 ways to manage computers securely (and remotely) using PowerShell 🦿

Being able to secure communications between remote resources is just as important as being able to access the device. Using PowerShell, IT can do both when accessing off-site devices cross-platform.

πŸ“– Read

via "Tech Republic".
⚠ S3 Ep2: Creepy smartwatches, botnets and Pings of Death – Podcast ⚠

Listen to the latest episode of the Naked Security Podcast

πŸ“– Read

via "Naked Security".
πŸ•΄ Academia Adopts Mitre ATT&CK Framework πŸ•΄

Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers.

πŸ“– Read

via "Dark Reading".
❌ Dickey’s BBQ Breach: Meaty 3M Payment Card Upload Drops on Joker’s Stash ❌

After cybercriminals smoked out 3 million compromised payment cards on the Joker’s Stash marketplace, researchers linked the data to a breach at the popular barbecue franchise.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-26682 β€Ό

In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15867 β€Ό

The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14299 β€Ό

A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
🦿 Fuzzing (fuzz testing) 101: Lessons from cyber security expert Dr. David Brumley 🦿

Dr. David Brumley, Carnegie Mellon University professor and CEO of ForAllSecure, explains what fuzzing, or fuss testing, is and how you can use it to improve application security and speed up your software development.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-9878 β€Ό

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9885 β€Ό

An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A user that is removed from an iMessage group could rejoin the group.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to view website trackers in mobile Safari 🦿

Learn how to use Apple's Privacy Report in Safari so you can see which websites attempted to track you on your iPhone or iPad.

πŸ“– Read

via "Tech Republic".
🦿 How to recover deleted files in Linux with testdisk 🦿

If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-9948 β€Ό

A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9959 β€Ό

A lock screen issue allowed access to messages on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0. A person with physical access to an iOS device may be able to view notification contents from the lockscreen.

πŸ“– Read

via "National Vulnerability Database".
❌ Phishing Lures Shift from COVID-19 to Job Opportunities ❌

Fortinet researchers are seeing a pivot in the spear-phishing and phishing lures used by cybercriminals, to entice potential job candidates as businesses open up.

πŸ“– Read

via "Threat Post".
πŸ•΄ An Uncommon 20 Years of Commonly Enumerating Vulns πŸ•΄

Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).

πŸ“– Read

via "Dark Reading".
πŸ•΄ US Counterintelligence Director & Fmr. Europol Leader Talk Election Security πŸ•΄

The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.

πŸ“– Read

via "Dark Reading".