❌ 2 More Google Chrome Zero-Days Under Active Exploitation ❌
📖 Read
via "Threat Post".
Browser users are once again being asked to patch severe vulnerabilities that can lead to remote code execution.📖 Read
via "Threat Post".
Threat Post
2 More Google Chrome Zero-Days Under Active Exploitation
Browser users are once again being asked to patch severe vulnerabilities that can lead to remote code execution.
🦿 How to combat the latest and most aggressive botnets and malware 🦿
📖 Read
via "Tech Republic".
Launching more sophisticated botnets, malware, and other threats, cybercriminals are getting more ruthless, says Nuspire.📖 Read
via "Tech Republic".
TechRepublic
How to combat the latest and most aggressive botnets and malware
Launching more sophisticated botnets, malware, and other threats, cybercriminals are getting more ruthless, says Nuspire.
🕴 5 Steps Every Company Should Take to Avoid Data Theft Risk 🕴
📖 Read
via "Dark Reading".
It's never been easier for employees to download company data and take it with them to their next gig.📖 Read
via "Dark Reading".
Dark Reading
5 Steps Every Company Should Take to Avoid Data Theft Risk
It's never been easier for employees to download company data and take it with them to their next gig.
‼ CVE-2020-9128 ‼
📖 Read
via "National Vulnerability Database".
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13954 ‼
📖 Read
via "National Vulnerability Database".
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25658 ‼
📖 Read
via "National Vulnerability Database".
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25706 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27481 ‼
📖 Read
via "National Vulnerability Database".
An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization.📖 Read
via "National Vulnerability Database".
🛠 Sifter 11 🛠
📖 Read
via "Packet Storm Security".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Sifter 11 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🛠 OATH Toolkit 2.6.4 🛠
📖 Read
via "Packet Storm Security".
OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.📖 Read
via "Packet Storm Security".
Packetstormsecurity
OATH Toolkit 2.6.4 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
❌ Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks ❌
📖 Read
via "Threat Post".
Security problems in Schneider Electric programmable logic controllers allow compromise of the hardware, responsible for physical plant operations.📖 Read
via "Threat Post".
Threat Post
Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks
Security problems in Schneider Electric programmable logic controllers allow compromise of the hardware, responsible for physical plant operations.
‼ CVE-2020-24443 ‼
📖 Read
via "National Vulnerability Database".
Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24442 ‼
📖 Read
via "National Vulnerability Database".
Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24441 ‼
📖 Read
via "National Vulnerability Database".
Adobe Acrobat Reader for Android version 20.6.2 (and earlier) does not properly restrict access to directories created by the application. This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application.📖 Read
via "National Vulnerability Database".
❌ Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys ❌
📖 Read
via "Threat Post".
Hacker forums are a rich source of threat intelligence.📖 Read
via "Threat Post".
Threat Post
Digging into the Dark Web: How Security Researchers Learn to Think Like the Bad Guys
Fortinet's Aamir Lakhani discusses hacker forums as a rich source of threat intelligence.
🕴 DARPA and Academia Jumpstart 5G IoT Security Efforts 🕴
📖 Read
via "Dark Reading".
With 5G IoT devices projected to hit 49 million units by 2023, researchers launch programs to keep IoT from becoming a blackhole of exfiltration.📖 Read
via "Dark Reading".
Dark Reading
DARPA and Academia Jumpstart 5G IoT Security Efforts
With 5G IoT devices projected to hit 49 million units by 2023, researchers launch programs to keep IoT from becoming a blackhole of exfiltration.
‼ CVE-2020-0588 ‼
📖 Read
via "National Vulnerability Database".
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-8766 ‼
📖 Read
via "National Vulnerability Database".
Improper conditions check in the Intel(R) SGX DCAP software before version 1.6 may allow an unauthenticated user to potentially enable denial of service via adjacent access.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-12310 ‼
📖 Read
via "National Vulnerability Database".
Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28271 ‼
📖 Read
via "National Vulnerability Database".
Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution.📖 Read
via "National Vulnerability Database".