π΄ Dealing With Insider Threats in the Age of COVID π΄
π Read
via "Dark Reading".
Dangerous gray areas like new BYOD policies and shadow IT devices have increased, thanks to the rapid shift to remote working.π Read
via "Dark Reading".
Dark Reading
Dealing With Insider Threats in the Age of COVID
Dangerous gray areas like new BYOD policies and shadow IT devices have increased, thanks to the rapid shift to remote working.
βΌ CVE-2020-5651 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to execute arbitrary SQL commands via a specially crafted URL.π Read
via "National Vulnerability Database".
βΌ CVE-2020-5650 βΌ
π Read
via "National Vulnerability Database".
Cross-site scripting vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.π Read
via "National Vulnerability Database".
β Cisco Warns of Severe DoS Flaws in Network Security Software β
π Read
via "Threat Post".
The majority of the bugs in Ciscoβs Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software can enable denial of service (DoS) on affected devices.π Read
via "Threat Post".
Threat Post
Cisco Warns of Severe DoS Flaws in Network Security Software
The majority of the bugs in Ciscoβs Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software can enable denial of service (DoS) on affected devices.
π NSA: Patch These 25 Vulnerabilities to Deter Chinese Hackers π
π Read
via "Digital Guardian".
In hopes that enterprises patch them, the NSA shared a list of 25 vulnerabilities currently being targeted by Chinese hackers.π Read
via "Digital Guardian".
Digital Guardian
NSA: Patch These 25 Vulnerabilities to Deter Chinese Hackers
In hopes that enterprises patch them, the NSA shared a list of 25 vulnerabilities currently being targeted by Chinese hackers.
π΄ As Smartphones Become a Hot Target, Can Mobile EDR Help? π΄
π Read
via "Dark Reading".
Lookout Security debuts a mobile endpoint detection and response offering that will integrate into its mobile security platform.π Read
via "Dark Reading".
Dark Reading
As Smartphones Become a Hot Target, Can Mobile EDR Help?
Lookout Security debuts a mobile endpoint detection and response offering that will integrate into its mobile security platform.
β Bug Parade: NSA Warns on Cresting China-Backed Cyberattacks β
π Read
via "Threat Post".
The Feds have published a Top 25 exploits list, rife with big names like BlueKeep, Zerologon and other notorious security vulnerabilities.π Read
via "Threat Post".
Threat Post
Bug Parade: NSA Warns on Cresting China-Backed Cyberattacks
The Feds have published a Top 25 exploits list, rife with big names like BlueKeep, Zerologon and other notorious security vulnerabilities.
βΌ CVE-2020-3563 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a large number of TCP packets to a specific port on an affected device. A successful exploit could allow the attacker to exhaust system memory, which could cause the device to reload unexpectedly. No manual intervention is needed to recover the device after it has reloaded.π Read
via "National Vulnerability Database".
βΌ CVE-2020-3565 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the TCP Intercept functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Access Control Policies (including Geolocation) and Service Polices on an affected system. The vulnerability exists because TCP Intercept is invoked when the embryonic connection limit is reached, which can cause the underlying detection engine to process the packet incorrectly. An attacker could exploit this vulnerability by sending a crafted stream of traffic that matches a policy on which TCP Intercept is configured. A successful exploit could allow the attacker to match on an incorrect policy, which could allow the traffic to be forwarded when it should be dropped. In addition, the traffic could incorrectly be dropped.π Read
via "National Vulnerability Database".
βΌ CVE-2020-3317 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the ssl_inspection component of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to crash Snort instances. The vulnerability is due to insufficient input validation in the ssl_inspection component. An attacker could exploit this vulnerability by sending a malformed TLS packet through a Cisco Adaptive Security Appliance (ASA). A successful exploit could allow the attacker to crash a Snort instance, resulting in a denial of service (DoS) condition.π Read
via "National Vulnerability Database".
βΌ CVE-2020-3585 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the TLS handler of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 1000 Series firewalls could allow an unauthenticated, remote attacker to gain access to sensitive information. The vulnerability is due to improper implementation of countermeasures against the Bleichenbacher attack for cipher suites that rely on RSA for key exchange. An attacker could exploit this vulnerability by sending crafted TLS messages to the device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. To exploit this vulnerability, an attacker must be able to perform both of the following actions: Capture TLS traffic that is in transit between clients and the affected device Actively establish a considerable number of TLS connections to the affected deviceπ Read
via "National Vulnerability Database".
βΌ CVE-2020-3599 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.π Read
via "National Vulnerability Database".
π΄ Oracle Releases Another Mammoth Security Patch Update π΄
π Read
via "Dark Reading".
October's CPU contains 402 patches for vulnerabilities across 29 product sets, many of which are remotely executable without the need for authentication.π Read
via "Dark Reading".
Dark Reading
Oracle Releases Another Mammoth Security Patch Update
October's CPU contains 402 patches for vulnerabilities across 29 product sets, many of which are remotely executable without the need for authentication.
π΄ FIRST Announces Cyber-Response Ethical Guidelines π΄
π Read
via "Dark Reading".
The 12 points seek to provide security professionals with advice on ethical behavior during incident response.π Read
via "Dark Reading".
Dark Reading
FIRST Announces Cyber-Response Ethical Guidelines
The 12 points seek to provide security professionals with advice on ethical behavior during incident response.
βΌ CVE-2020-27615 βΌ
π Read
via "National Vulnerability Database".
The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.π Read
via "National Vulnerability Database".
βΌ CVE-2020-9749 βΌ
π Read
via "National Vulnerability Database".
Adobe Animate version 20.5 (and earlier) is affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .fla file in Animate.π Read
via "National Vulnerability Database".
βΌ CVE-2020-24421 βΌ
π Read
via "National Vulnerability Database".
Adobe InDesign version 15.1.2 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .indd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2020-17355 βΌ
π Read
via "National Vulnerability Database".
Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause a denial of service (restart of agents) by crafting a malformed DHCP packet which leads to an incorrect route being installed.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27619 βΌ
π Read
via "National Vulnerability Database".
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27620 βΌ
π Read
via "National Vulnerability Database".
The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups.π Read
via "National Vulnerability Database".
β Time for a mobile privacy reset? β
π Read
via "Naked Security".
Can you remember which permissions you gave to what apps, and why? Nor can we... time for a reset!π Read
via "Naked Security".
Naked Security
iOS 14 and Android 11 privacy tips β top 5 things to check
Can you remember which permissions you gave to what apps, and why? Nor can we⦠time for a reset!