πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ North Korea-Backed Spy Group Poses as Reporters in Spearphishing Attacks, Feds Warn ❌

The Kimsuky/Hidden Cobra APT is going after the commercial sector, according to CISA.

πŸ“– Read

via "Threat Post".
❌ Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote ❌

With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications.

πŸ“– Read

via "Threat Post".
πŸ•΄ Physical Security Has a Lot of Catching Up to Do πŸ•΄

The transformation we need: merging the network operations center with the physical security operations center.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-8240 β€Ό

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8261 β€Ό

A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8239 β€Ό

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.

πŸ“– Read

via "National Vulnerability Database".
❌ Iran-linked APT Targets T20 Summit, Munich Security Conference Attendees ❌

The Phosphorous APT has launched successful attacks against world leaders who are attending the Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia, Microsoft warns.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-27978 β€Ό

Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Trump Campaign Website Defaced by Unknown Attackers πŸ•΄

Individuals behind the brief Tuesday night incident posted anti-Trump sentiments and appeared to solicit cryptocurrency.

πŸ“– Read

via "Dark Reading".
❌ Russian Espionage Group Updates Custom Malware Suite ❌

Turla has outfitted a trio of backdoors with new C2 tricks and increased interop, as seen in an attack on a European government.

πŸ“– Read

via "Threat Post".
πŸ•΄ Rethinking Security for the Next Normal -- Under Pressure πŸ•΄

By making a commitment to a unified approach to security, then doing what's necessary to operationalize it, organizations can establish a better security model for the next normal.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15278 β€Ό

Red Discord Bot before version 3.4.1 has an unauthorized privilege escalation exploit in the Mod module. This exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it is possible to perform destructive actions within the guild the user has high privileges in. This exploit has been fixed in version 3.4.1. As a workaround, unloading the Mod module with unload mod or, disabling the massban command with command disable global massban can render this exploit not accessible. We still highly recommend updating to 3.4.1 to completely patch this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4782 β€Ό

IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Insider Threats Poised to Increase in 2021 πŸ”

Forrester, citing the persistence of remote work, predicts that internal incidents will be responsible for 33% of breaches in 2021.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ 6 Ways Passwords Fail Basic Security Tests πŸ•΄

New data shows humans still struggle with password creation and management.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-16262 β€Ό

Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26132 β€Ό

An issue was discovered in Home DNS Server 0.10. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the HomeDNSServer.exe binary.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜Copyright Violation’ Notices Lead to Facebook 2FA Bypass ❌

Fraudulent Facebook messages allege copyright infringement and threaten to take down pages, unless users enter logins, passwords and 2FA codes.

πŸ“– Read

via "Threat Post".
πŸ•΄ US Government Issues Warning on Kimsuky APT Group πŸ•΄

The joint alert, from CISA, the FBI, and others, describes activities from the North Korean advanced persistent threat group.

πŸ“– Read

via "Dark Reading".
🦿 Don't wait for a breach before implementing cybersecurity, expert says 🦿

Professor who specializes in security says we often treat a breach like a home break-in, adding security after the theft. More students are choosing security as a career, she adds.

πŸ“– Read

via "Tech Republic".
❌ More Hospitals Hit by Growing Wave of Ransomware Attacks ❌

Hospitals in New York and Oregon were targeted on Tuesday by threat actors who crippled systems and forced ambulances with sick patients to be rerouted, in some cases.

πŸ“– Read

via "Threat Post".