πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-13893 β€Ό

Multiple stored cross-site scripting (XSS) vulnerabilities in Sage EasyPay 10.7.5.10 allow authenticated attackers to inject arbitrary web script or HTML via multiple parameters through Unicode Transformations (Best-fit Mapping), as demonstrated by the full-width variants of the less-than sign (%EF%BC%9C) and greater-than sign (%EF%BC%9E).

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft: Most-Imitated Brand for Phishing Emails ❌

The shift to remote working spurred Microsoft and Amazon to the top of the heap for cybercriminals to use as lures in the third quarter.

πŸ“– Read

via "Threat Post".
⚠ Naked Security Live – Ping of Death: are you at risk? ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-7745 β€Ό

This affects the package MintegralAdSDK before 6.6.0.0. The SDK distributed by the company contains malicious functionality that acts as a backdoor. Mintegral and their partners (advertisers) can remotely execute arbitrary code on a user device.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A New Risk Vector: The Enterprise of Things πŸ•΄

Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.

πŸ“– Read

via "Dark Reading".
❌ Hackers Claim Source Code Theft for Watch Dogs: Legion, Albion ❌

In both cases, cybercriminals claim to have reams of information for the popular gaming titles.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-15909 β€Ό

SolarWinds N-central through 2020.1 allows session hijacking.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15910 β€Ό

SolarWinds N-central through 12.3 does not include the HTTPOnly flag in the Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13778 β€Ό

rConfig 3.9.4 and earlier allows authenticated code execution (of system commands) by sending a forged GET request to lib/ajaxHandlers/ajaxAddTemplate.php or lib/ajaxHandlers/ajaxEditTemplate.php.

πŸ“– Read

via "National Vulnerability Database".
🦿 Microsoft now the most impersonated brand in phishing attacks 🦿

Almost 20% of phishing campaigns last quarter spoofed Microsoft as many people continue to work remotely due to the coronavirus pandemic, says Check Point Research.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Expert Tips to Keep WordPress Safe πŸ•΄

The most widely used content management system on the Web relies heavily on plug-ins and add-on software, rigorous security measures at every level.

πŸ“– Read

via "Dark Reading".
❌ Microsoft Exchange, Outlook Under Siege By APTs ❌

A new threat report shows that APTs are switching up their tactics when exploiting Microsoft services like Exchange and OWA, in order to avoid detection.

πŸ“– Read

via "Threat Post".
πŸ•΄ A Swift Reminder About Cybersecurity πŸ•΄

The hackers gonna crack, crack, crack, crack, crack ...

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-24265 β€Ό

An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in MemcmpInterceptorCommon() that can make tcpprep crash and cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24266 β€Ό

An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in get_l2len() that can make tcpprep crash and cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Chart: The Pandemic Reprioritizes Security Projects πŸ•΄

Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.

πŸ“– Read

via "Dark Reading".
❌ Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack ❌

Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours.

πŸ“– Read

via "Threat Post".
πŸ•΄ 7 Tips for Choosing Security Metrics That Matter πŸ•΄

Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

πŸ“– Read

via "Dark Reading".
❌ Overlay Malware Targets Windows Users with a DLL Hijack Twist ❌

Brazilians are warned of a new Vizom malware masquerading as video conferencing and browser software.

πŸ“– Read

via "Threat Post".
❌ GravityRAT Comes Back to Earth with Android, macOS Spyware ❌

The espionage tool masquerades as legitimate applications and robs victims blind of their data.

πŸ“– Read

via "Threat Post".
πŸ•΄ Trickbot, Phishing, Ransomware & Elections πŸ•΄

The botnet has taken some hits lately, but that doesn't mean the threat is over. Here are some steps you can take to keep it from your door.

πŸ“– Read

via "Dark Reading".