πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Windows Zero-Day Used with Chrome Flaw in Targeted Attacks πŸ•΄

Google's Project Zero has disclosed a Windows kernel zero-day vulnerability being used with a known Chrome bug in targeted attacks.

πŸ“– Read

via "Dark Reading".
❌ Survey: Cybersecurity Skills Shortage is β€˜Bad,’ But There’s Hope ❌

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave.

πŸ“– Read

via "Threat Post".
❌ $100M Botnet Scheme Lands Cybercriminal 8 Years in Jail ❌

Aleksandr Brovko faces jail time after stealing $100 million worth of personal identifiable information (PII) and financial data over the course of more than 10 years.

πŸ“– Read

via "Threat Post".
πŸ•΄ Russian National Sentenced to 8 Years in Prison for Role in Botnet Operation πŸ•΄

Cybercrime scheme netted more than $100 million.

πŸ“– Read

via "Dark Reading".
🦿 Hackers have only just wet their whistle. Expect more ransomware and data breaches in 2021. 🦿

The COVID-19 pandemic provided a huge opening for bad actors this year, thanks to remote work. Security experts expect more advanced cybersecurity threats in the coming year.

πŸ“– Read

via "Tech Republic".
πŸ•΄ New Tools Make North Korea's Kimsuky Group More Dangerous πŸ•΄

Threat actor actively targeting US organizations in global intelligence-gathering campaign, government says.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26939 β€Ό

In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27982 β€Ό

IceWarp 11.4.5.0 allows XSS via the language parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7758 β€Ό

This affects all versions of package browserless-chrome. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9368 β€Ό

The Module Olea Gift On Order module through 5.0.8 for PrestaShop enables an unauthenticated user to read arbitrary files on the server via getfile.php?file=/.. directory traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8183 β€Ό

A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-6014 β€Ό

Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft & Others Catalog Threats to Machine Learning Systems πŸ•΄

Thirteen organizations worked together to create a dictionary of techniques used to attack ML models and warn that such malicious efforts will become more common.

πŸ“– Read

via "Dark Reading".
πŸ•΄ California's Prop. 24 Splits Privacy Advocates πŸ•΄

Critics worry that the curatives in Prop. 24 are worse than the disease of privacy-rights violations.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-9861 β€Ό

A stack overflow issue existed in Swift for Linux. The issue was addressed with improved input validation for dealing with deeply nested malicious JSON input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-16001 β€Ό

Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15973 β€Ό

Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-16007 β€Ό

Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15987 β€Ό

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-16010 β€Ό

Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-6557 β€Ό

Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".