β Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote β
π Read
via "Threat Post".
With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications.π Read
via "Threat Post".
Threat Post
Election Security: How Mobile Devices Are Shaping the Way We Work, Play and Vote
With the election just a week away, cybercriminals are ramping up mobile attacks on citizens under the guise of campaign communications.
π΄ Physical Security Has a Lot of Catching Up to Do π΄
π Read
via "Dark Reading".
The transformation we need: merging the network operations center with the physical security operations center.π Read
via "Dark Reading".
Dark Reading
Physical Security Has a Lot of Catching Up to Do
The transformation we need: merging the network operations center with the physical security operations center.
βΌ CVE-2020-8240 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8261 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8239 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.π Read
via "National Vulnerability Database".
β Iran-linked APT Targets T20 Summit, Munich Security Conference Attendees β
π Read
via "Threat Post".
The Phosphorous APT has launched successful attacks against world leaders who are attending the Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia, Microsoft warns.π Read
via "Threat Post".
Threat Post
Iran-linked APT Targets T20 Summit, Munich Security Conference Attendees
The Phosphorous APT has launched successful attacks against world leaders who are attending the Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia, Microsoft warns.
βΌ CVE-2020-27978 βΌ
π Read
via "National Vulnerability Database".
Shibboleth Identify Provider 3.x before 3.4.6 has a denial of service flaw. A remote unauthenticated attacker can cause a login flow to trigger Java heap exhaustion due to the creation of objects in the Java Servlet container session.π Read
via "National Vulnerability Database".
π΄ Trump Campaign Website Defaced by Unknown Attackers π΄
π Read
via "Dark Reading".
Individuals behind the brief Tuesday night incident posted anti-Trump sentiments and appeared to solicit cryptocurrency.π Read
via "Dark Reading".
Dark Reading
Trump Campaign Website Defaced by Unknown Attackers
Individuals behind the brief Tuesday night incident posted anti-Trump sentiments and appeared to solicit cryptocurrency.
β Russian Espionage Group Updates Custom Malware Suite β
π Read
via "Threat Post".
Turla has outfitted a trio of backdoors with new C2 tricks and increased interop, as seen in an attack on a European government.π Read
via "Threat Post".
Threat Post
Russian Espionage Group Updates Custom Malware Suite
Turla has outfitted a trio of backdoors with new C2 tricks and increased interop, as seen in an attack on a European government.
π΄ Rethinking Security for the Next Normal -- Under Pressure π΄
π Read
via "Dark Reading".
By making a commitment to a unified approach to security, then doing what's necessary to operationalize it, organizations can establish a better security model for the next normal.π Read
via "Dark Reading".
Dark Reading
Rethinking Security for the Next Normal -- Under Pressure
By making a commitment to a unified approach to security, then doing what's necessary to operationalize it, organizations can establish a better security model for the next normal.
βΌ CVE-2020-15278 βΌ
π Read
via "National Vulnerability Database".
Red Discord Bot before version 3.4.1 has an unauthorized privilege escalation exploit in the Mod module. This exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it is possible to perform destructive actions within the guild the user has high privileges in. This exploit has been fixed in version 3.4.1. As a workaround, unloading the Mod module with unload mod or, disabling the massban command with command disable global massban can render this exploit not accessible. We still highly recommend updating to 3.4.1 to completely patch this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4782 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.π Read
via "National Vulnerability Database".
π Insider Threats Poised to Increase in 2021 π
π Read
via "Digital Guardian".
Forrester, citing the persistence of remote work, predicts that internal incidents will be responsible for 33% of breaches in 2021.π Read
via "Digital Guardian".
Digital Guardian
Insider Threats Poised to Increase in 2021
Forrester, citing the persistence of remote work, predicts that internal incidents will be responsible for 33% of breaches in 2021.
π΄ 6 Ways Passwords Fail Basic Security Tests π΄
π Read
via "Dark Reading".
New data shows humans still struggle with password creation and management.π Read
via "Dark Reading".
Dark Reading
6 Ways Passwords Fail Basic Security Tests
New data shows humans still struggle with password creation and management.
βΌ CVE-2020-16262 βΌ
π Read
via "National Vulnerability Database".
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26132 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Home DNS Server 0.10. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the HomeDNSServer.exe binary.π Read
via "National Vulnerability Database".
β βCopyright Violationβ Notices Lead to Facebook 2FA Bypass β
π Read
via "Threat Post".
Fraudulent Facebook messages allege copyright infringement and threaten to take down pages, unless users enter logins, passwords and 2FA codes.π Read
via "Threat Post".
Threat Post
βCopyright Violationβ Notices Lead to Facebook 2FA Bypass
Fraudulent Facebook messages allege copyright infringement and threaten to take down pages, unless users enter logins, passwords and 2FA codes.
π΄ US Government Issues Warning on Kimsuky APT Group π΄
π Read
via "Dark Reading".
The joint alert, from CISA, the FBI, and others, describes activities from the North Korean advanced persistent threat group.π Read
via "Dark Reading".
Dark Reading
US Government Issues Warning on Kimsuky APT Group
The joint alert, from CISA, the FBI, and others, describes activities from the North Korean advanced persistent threat group.
π¦Ώ Don't wait for a breach before implementing cybersecurity, expert says π¦Ώ
π Read
via "Tech Republic".
Professor who specializes in security says we often treat a breach like a home break-in, adding security after the theft. More students are choosing security as a career, she adds.π Read
via "Tech Republic".
TechRepublic
Don't wait for a breach before implementing cybersecurity, expert says
Professor who specializes in security says we often treat a breach like a home break-in, adding security after the theft. More students are choosing security as a career, she adds.
β More Hospitals Hit by Growing Wave of Ransomware Attacks β
π Read
via "Threat Post".
Hospitals in New York and Oregon were targeted on Tuesday by threat actors who crippled systems and forced ambulances with sick patients to be rerouted, in some cases.π Read
via "Threat Post".
Threat Post
2 More Hospitals Hit by Growing Wave of Ransomware Attacks, As Feds Issue Warning
Hospitals in New York and Oregon were targeted on Tuesday by threat actors who crippled systems and forced ambulances with sick patients to be rerouted, in some cases.
π΄ Breaking the Glass Ceiling: Tough for Women, Tougher for Women of Color π΄
π Read
via "Dark Reading".
Security practitioners shed light on obstacles limiting career growth and the steps businesses can take to achieve their promises of a more diverse workforce.π Read
via "Dark Reading".
Dark Reading
Breaking the Glass Ceiling: Tough for Women, Tougher for Women of Color
Security practitioners shed light on obstacles limiting career growth and the steps businesses can take to achieve their promises of a more diverse workforce.