โผ CVE-2020-3998 โผ
๐ Read
via "National Vulnerability Database".
VMware Horizon Client for Windows (5.x prior to 5.5.0) contains an information disclosure vulnerability. A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes.๐ Read
via "National Vulnerability Database".
โ COVID-19 Vaccine-Maker Hit with Cyberattack, Data Breach โ
๐ Read
via "Threat Post".
Dr. Reddy's, the contractor for Russiaโs โSputinik Vโ COVID-19 vaccine and a major generics producer, has had to close plants and isolate its data centers.๐ Read
via "Threat Post".
Threat Post
COVID-19 Vaccine-Maker Hit with Cyberattack, Data Breach
Dr. Reddy's, the contractor for Russiaโs โSputinik Vโ COVID-19 vaccine and a major generics producer, has had to close plants and isolate its data centers.
๐ฆฟ 75% of all 56 US states and territories show signs of vulnerable election IT infrastructure, report finds ๐ฆฟ
๐ Read
via "Tech Republic".
The report comes as officials in Georgia revealed more information about a ransomware attack that affected a digital voter database.๐ Read
via "Tech Republic".
TechRepublic
75% of all 56 US states and territories show signs of vulnerable election IT infrastructure, report finds
The report comes as officials in Georgia revealed more information about a ransomware attack that affected a digital voter database.
โ Georgia Election Data Hit in Ransomware Attack โ
๐ Read
via "Threat Post".
With Election Day approaching, local governments need to be prepared for malware attacks on election infrastructure.๐ Read
via "Threat Post".
Threat Post
Georgia Election Data Hit in Ransomware Attack
With Election Day approaching, local governments need to be prepared for malware attacks on election infrastructure.
โ Election Security: Beyond Mail-In Voting โ
๐ Read
via "Threat Post".
There are many areas of the election process that criminal hackers can target to influence election results.๐ Read
via "Threat Post".
Threat Post
Election Security: Beyond Mail-In Voting
There are many areas of the election process that criminal hackers can target to influence election results.
โ Louisiana Calls Out National Guard to Fight Ransomware Surge โ
๐ Read
via "Threat Post".
An investigation showed a custom backdoor RAT and the Emotet trojan in the networks of municipal victims of the attacks.๐ Read
via "Threat Post".
Threat Post
Louisiana Calls Out National Guard to Fight Ransomware Surge
An investigation showed a custom backdoor RAT and the Emotet trojan in the networks of municipal victims of the attacks.
๐ด Flurry of Warnings Highlight Cyber Threats to US Elections ๐ด
๐ Read
via "Dark Reading".
FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.๐ Read
via "Dark Reading".
Dark Reading
Flurry of Warnings Highlight Cyber Threats to US Elections
FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.
โผ CVE-2020-25483 โผ
๐ Read
via "National Vulnerability Database".
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-24848 โผ
๐ Read
via "National Vulnerability Database".
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.๐ Read
via "National Vulnerability Database".
โ IoT Device Takeovers Surge 100 Percent in 2020 โ
๐ Read
via "Threat Post".
The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks.๐ Read
via "Threat Post".
Threat Post
IoT Device Takeovers Surge 100 Percent in 2020
The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks.
๐ด Cybercriminals Could be Coming After Your Coffee ๐ด
๐ Read
via "Dark Reading".
Researchers show no IoT device is too small to fall victim to ransomware techniques.๐ Read
via "Dark Reading".
Dark Reading
Cybercriminals Could be Coming After Your Coffee
Researchers show no IoT device is too small to fall victim to ransomware techniques.
โ U.S. Levies Sanctions Against Russian Research Institution Linked to Triton Malware โ
๐ Read
via "Threat Post".
The latest in a flurry of actions this week, tied to foreign threats against U.S. computer systems, includes sanctions by the Department of the Treasury.๐ Read
via "Threat Post".
Threat Post
U.S. Levies Sanctions Against Russian Research Institution Linked to Triton Malware
The latest in a flurry of actions this week, tied to foreign threats against U.S. computer systems, includes sanctions by the Department of the Treasury.
๐ด US Treasury Sanctions Russian Institution Linked to Triton Malware ๐ด
๐ Read
via "Dark Reading".
Triton, also known as TRISIS and HatMan, was developed to target and manipulate industrial control systems, the US Treasury reports.๐ Read
via "Dark Reading".
Dark Reading
US Treasury Sanctions Russian Institution Linked to Triton Malware
Triton, also known as TRISIS and HatMan, was developed to target and manipulate industrial control systems, the US Treasury reports.
โโโ ๏ธ ======================= โ ๏ธ
๐ LOOK! It's amazingโผ๏ธ
โ ๏ธ ======================= โ ๏ธ
๐ LOOK! It's amazingโผ๏ธ
โ ๏ธ ======================= โ ๏ธ
โ Naked Security Live โ Whoโs watching you? 5 mobile privacy tips โ
๐ Read
via "Naked Security".
Here's the latest Naked Security Live video - enjoy (and please share with your friends)!๐ Read
via "Naked Security".
Naked Security
Naked Security Live โ Whoโs watching you? 5 mobile privacy tips
Hereโs the latest Naked Security Live video โ enjoy (and please share with your friends)!
โผ CVE-2020-27388 โผ
๐ Read
via "National Vulnerability Database".
Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-27388 โผ
๐ Read
via "National Vulnerability Database".
Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.๐ Read
via "National Vulnerability Database".
๐ด The Story of McAfee: How the Security Giant Arrived at a Second IPO ๐ด
๐ Read
via "Dark Reading".
Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.๐ Read
via "Dark Reading".
Dark Reading
The Story of McAfee: How the Security Giant Arrived at a Second IPO
Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.
โผ CVE-2020-27678 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-7751 โผ
๐ Read
via "National Vulnerability Database".
This affects all versions of package pathval.๐ Read
via "National Vulnerability Database".
๐ด Microsoft's Kubernetes Threat Matrix: Here's What's Missing ๐ด
๐ Read
via "Dark Reading".
With a fuller picture of the Kubernetes threat matrix, security teams can begin to implement mitigation strategies to protect their cluster from threats.๐ Read
via "Dark Reading".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading