πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-15256 β€Ό

A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5640 β€Ό

Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
❌ Google’s Waze Can Allow Hackers to Identify and Track Users ❌

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-7748 β€Ό

This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.

πŸ“– Read

via "National Vulnerability Database".
❌ Mobile Browser Bugs Open Safari, Opera Users to Malware ❌

A set of address-spoofing bugs affect users of six different types of mobile browsers, with some remaining unpatched.

πŸ“– Read

via "Threat Post".
πŸ•΄ Trickbot Tenacity Shows Infrastructure Resistant to Takedowns πŸ•΄

Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot -- but with only a short-term impact.

πŸ“– Read

via "Dark Reading".
🦿 Homebrew: How to install reconnaissance tools on macOS 🦿

We'll guide you through the process of using Homebrew package manager to install security tools on macOS to perform reconnaissance, discovery, and fingerprinting of the devices on your network.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Building the Human Firewall πŸ•΄

Cybersecurity was a challenge before COVID-19 sent millions of employees home to work from their own devices and networks. Now what?

πŸ“– Read

via "Dark Reading".
❌ Office 365 OAuth Attack Targets Coinbase Users ❌

Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth.

πŸ“– Read

via "Threat Post".
πŸ•΄ Businesses Rethink Endpoint Security for 2021 πŸ•΄

The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?

πŸ“– Read

via "Dark Reading".
❌ Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts ❌

Hundreds of medical patients taking cancer drugs, Premarin, Lyrica and more are now vulnerable to phishing, malware and identity fraud.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-4748 β€Ό

IBM Spectrum Scale 5.0.0 through 5.0.5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188517.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-6367 β€Ό

There is a reflected cross site scripting vulnerability in SAP NetWeaver Composite Application Framework, versions - 7.20, 7.30, 7.31, 7.40, 7.50. An unauthenticated attacker can trick an unsuspecting authenticated user to click on a malicious link. The end users browser has no way to know that the script should not be trusted, and will execute the script, resulting in sensitive information being disclosed or modified.

πŸ“– Read

via "National Vulnerability Database".
❌ Facebook: A Top Launching Pad For Phishing Attacks ❌

Amazon, Apple, Netflix, Facebook and WhatsApp are top brands leveraged by cybercriminals in phishing and fraud attacks - including a recent strike on a half-million Facebook users.

πŸ“– Read

via "Threat Post".
πŸ•΄ Farsight Labs Launched as Security Collaboration Platform πŸ•΄

Farsight Security's platform will offer no-cost access to certain tools and services.

πŸ“– Read

via "Dark Reading".
⚠ Naked Security Live – Ping of Death: are you at risk? ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
⚠ Russian β€œgovernment hackers” charged with cybercrimes by the US ⚠

What can we learn from the US DOJ indictments against the "Sandworm Team"?

πŸ“– Read

via "Naked Security".
❌ Adobe Fixes 16 Critical Code-Execution Bugs Across Portfolio ❌

The out-of-band patches follow a lighter-than-usual Patch Tuesday update earlier this month.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-3992 β€Ό

OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7370 β€Ό

User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of Danyil Vasilenko's Bolt Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Bolt Browser version 1.4 and prior versions.

πŸ“– Read

via "National Vulnerability Database".