🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2020-15987

Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.

📖 Read

via "National Vulnerability Database".
CVE-2020-16010

Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
CVE-2020-6557

Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.

📖 Read

via "National Vulnerability Database".
🕴 6 Cybersecurity Lessons From 2020 🕴

The COVID-19 pandemic exposed new weaknesses in enterprise cybersecurity preparedness.

📖 Read

via "Dark Reading".
Oracle Rushes Emergency Fix for Critical WebLogic Server Flaw

The remote code-execution flaw (CVE-2020-14750) is low-complexity and requires no user interaction to exploit.

📖 Read

via "Threat Post".
🦿 It's an urgent plea this Election Day: Don't click on ransomware disguised as political ads 🦿

Remote work and social media have made it easier for businesses to be impacted by security breaches. Here's why, and how organizations can protect themselves.

📖 Read

via "Tech Republic".
🕴 Reworking the Taxonomy for Richer Risk Assessments 🕴

By accommodating unique requirements and conditions at different sites, security pros can dig deeper get a clearer sense of organizational risk.

📖 Read

via "Dark Reading".
CVE-2020-4649

IBM Planning Analytics Local 2.0.9.2 and IBM Planning Analytics Workspace 57 could expose data to non-privleged users by not invalidating TM1Web user sessions. IBM X-Force ID: 186022.

📖 Read

via "National Vulnerability Database".
Media Comms Giant Says Ransomware Hit Will Cost Millions

Aussie firm Isentia said "remediation and foregone revenue" could total $8.5 million AUS or more.

📖 Read

via "Threat Post".
🕴 9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time 🕴

This year has been the ultimate test of business resilience, and if anything has become clear, it's this: Security pros need to get to work and overhaul their playbooks in preparation for multilayered attacks.

📖 Read

via "Dark Reading".
Two Chrome Browser Updates Plugs Holes Actively Targeted by Exploits

Patches for both the Chrome desktop and Android browser address high-severity flaws with known exploits available in the wild.

📖 Read

via "Threat Post".
🔏 What is SOC 2? 🔏

SOC 2 is a set of compliance requirements for companies that use cloud-based storage of customer data. Learn about the basics of SOC 2 and best practices in this week's Data Protection 101!

📖 Read

via "Digital Guardian".
🕴 Oracle Issues Out-of-Band Update for Remote-Access Vulnerability 🕴

The exploit could give an attacker complete control of vulnerable WebLogic servers.

📖 Read

via "Dark Reading".
34M Records from 17 Companies Up for Sale in Cybercrime Forum

A diverse set of companies, including an adaptive-learning platform in Brazil, an online grocery service in Singapore and a cold-brew coffee-maker company, are caught up in the large data trove.

📖 Read

via "Threat Post".
🕴 Neustar Agrees to Buy Verisign's Public DNS Service 🕴

The address space for Verisign Public DNS will be incorporated into Neustar's UltraDNS Public service following the acquisition.

📖 Read

via "Dark Reading".
APT Groups Finding Success with Mix of Old and New Tools

The APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, largely supercharged by geo-politics, a report finds.

📖 Read

via "Threat Post".
🦿 How to use the limited photos picker in iOS 14 for added privacy 🦿

Ensure apps can only access the photos and albums that you designate by using the new limited photos picker in iOS 14.

📖 Read

via "Tech Republic".
CVE-2020-1908

Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked.

📖 Read

via "National Vulnerability Database".
CVE-2020-1909

A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.

📖 Read

via "National Vulnerability Database".
Oracle Solaris Zero-Day Attack Revealed

A threat actor is compromising telecommunications companies and targeted financial and professional consulting industries using an Oracle flaw.

📖 Read

via "Threat Post".
🦿 WinZip Mac 8 Pro: Create backups and encrypt sensitive files 🦿

Mac users can do more than just compress files using WinZip Mac 8 Pro. The program also assists with creating backups and encrypting sensitive files, among other features.

📖 Read

via "Tech Republic".