πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-27524 β€Ό

On Audi A7 MMI 2014 vehicles, the Bluetooth stack in Audi A7 MMI Multiplayer with version (N+R_CN_AU_P0395) mishandles %x and %s format string specifiers in a device name. This may lead to memory content leaks and potentially crash the services.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Former Microsoft Software Engineer Sentenced to 9 Years in Prison πŸ•΄

The 26-year-old was convicted earlier this year of wire fraud, money laundering, and filing false tax returns, among other charges.

πŸ“– Read

via "Dark Reading".
⚠ β€œInstant bank fraud” hoax is back – don’t spread fake news! ⚠

You need to spread the word to your family and friends NOT to spread the word to their family and friends

πŸ“– Read

via "Naked Security".
⚠ Smishing attack tells you β€œmobile payment problem” – don’t fall for it! ⚠

Don't be fooled by a website that looks OK - it's easy for crooks to make an exact copy. (This time, they got just one letter wrong.)

πŸ“– Read

via "Naked Security".
❌ Minecraft Apps on Google Play Fleece Players Out of Big Money ❌

Seven mobile apps for Android sneakily charge fans of Minecraft and Roblox hundreds of dollars per month.

πŸ“– Read

via "Threat Post".
❌ Ragnar Locker Ransomware Gang Takes Out Facebook Ads in Key New Tactic ❌

Following a Nov. 3 ransomware attack against Campari, Ragnar Locker group took out public Facebook ads threatening to release stolen data.

πŸ“– Read

via "Threat Post".
❌ Nvidia Warns Windows Gamers of GeForce NOW Flaw ❌

Both Nvidia and Intel faced severe security issues this week - including a high-severity bug in Nvidia's GeForce NOW.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-8353 β€Ό

Prior to August 10, 2020, some Lenovo Desktop and Workstation systems were shipped with the Embedded Host Based Configuration (EHBC) feature of Intel AMT enabled. This could allow an administrative user with local access to configure Intel AMT.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8354 β€Ό

A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8352 β€Ό

In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5426 β€Ό

Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 9 New Tactics to Spread Security Awareness πŸ•΄

Employees are often your first line of security defense when the bad guys come calling -- providing your workers are properly trained. Security leaders share how they're raising awareness.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Barracuda to Acquire Fyde for Zero-Trust Capabilities πŸ•΄

Plans call for expanding the Barracuda CloudGen SASE platform.

πŸ“– Read

via "Dark Reading".
πŸ” Best Practices for Organizations to Mitigate Risks in Collaboration Software πŸ”

Many companies are requiring employees to work from home and use collaboration software to communicate. What are the best ways to mitigate risks in collaboration software? We asked 27 experts their best practices.

πŸ“– Read

via "Digital Guardian".
❌ Silver Peak SD-WAN Bugs Allow for Network Takeover ❌

Three security vulnerabilities can be chained to enable unauthenticated remote code execution.

πŸ“– Read

via "Threat Post".
πŸ•΄ 3 Tips For Successfully Running Tech Outside the IT Department πŸ•΄

When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Security Hiring Plans Remain Constant Despite Pandemic πŸ•΄

Although we saw workforce gains this year, 56% of businesses surveyed report staff shortages are putting their organization at risk.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26218 β€Ό

touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting. The vulnerability allows an attacker to inject HTML payloads which could result in defacement, user redirection to a malicious webpage/website etc. The issue is patched in version 2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26219 β€Ό

touchbase.ai before version 2.0 is vulnerable to Open Redirect. Impacts can be many, and vary from theft of information and credentials, to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The issue is fixed in version 2.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Want to Avoid an Extreme Cyberloss? Focus on the Basics πŸ•΄

New analysis of attacks and breaches -- to the tune of more than $20 million in damages and losses of at least 20 million records -- underscores the importance of planning for these events.

πŸ“– Read

via "Dark Reading".
πŸ•΄ NSF-Funded Research Aims to Help Disrupt Cybercrime Supply Chains πŸ•΄

The National Science Foundation awarded a grant to Georgia State University (GSU) to come up with innovative ways to thwart the supply chains for counterfeiting, loan- and unemployment fraud.

πŸ“– Read

via "Dark Reading".