πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-8279 β€Ό

Missing validation of server certificates for out-going connections in Nextcloud Social < 0.4.0 allowed a man-in-the-middle attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15710 β€Ό

Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8278 β€Ό

Improper access control in Nextcloud Social app version 0.3.1 allowed to read posts of any user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-20933 β€Ό

InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8277 β€Ό

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

πŸ“– Read

via "National Vulnerability Database".
🦿 Microsoft gives Linux a security boost with these new attack detection tools 🦿

Linux endpoint detection and response will help Microsoft Defender customers secure Linux servers and networks against security nasties.

πŸ“– Read

via "Tech Republic".
❌ Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks ❌

While the industry focus is on vehicle hacking, when it comes to the automotive industry cybercriminals are opting for less complex and sophisticated attacks - from phishing to ransomware.

πŸ“– Read

via "Threat Post".
πŸ•΄ Unpatched Browsers Abound, Study Shows πŸ•΄

Google Chrome users don't always take time to relaunch browser updates, and some legacy applications don't support new versions of Chrome, Menlo Security says.

πŸ“– Read

via "Dark Reading".
❌ APT Exploits Microsoft Zerologon Bug: Targets Japanese Companies ❌

Threat actors mount year-long campaign of espionage, exfiltrating data, stealing credentials and installing backdoors on victims’ networks.

πŸ“– Read

via "Threat Post".
πŸ•΄ 2021 Cybersecurity Spending: How to Maximize Value πŸ•΄

This is a pivotal moment for CISOs. As their influence increases, so does the pressure for them to make the right decisions.

πŸ“– Read

via "Dark Reading".
🦿 Consumers share their top frustrations about online retail purchasing 🦿

People say they've abandoned purchases at online retail stores because of the hassle of dealing with passwords, according to the FIDO Alliance.

πŸ“– Read

via "Tech Republic".
πŸ›  TestSSL 3.0.3 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Read

via "Packet Storm Security".
πŸ›  TCMalloc Inspector Tool πŸ› 

TCMalloc is an inspection tool that lets you parse and inspect tcmalloc internals, and detect lost memory, meaning memory which is not reachable via any (internal) pointers.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ New Proposed DNS Security Features Released πŸ•΄

Verisign's R&D team has developed new ways to authenticate and optimize DNS traffic on the client side of the domain-name resolution process.

πŸ“– Read

via "Dark Reading".
❌ IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk ❌

Security experts praised the newly approved IoT law as a step in the right direction for insecure connected federal devices.

πŸ“– Read

via "Threat Post".
❌ Food-Supply Giant Americold Admits Cyberattack ❌

A reported ransomware attack took down operations at the company, which in talks for COVID-19 vaccine-distribution contracts.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-11830 β€Ό

QualityProtect has a vulnerability to execute arbitrary system commands, affected product is com.oppo.qualityprotect V2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11831 β€Ό

OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28054 β€Ό

JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4718 β€Ό

IBM Jazz Reporting Service 6.0.6, 6.0.6.1, 7.0, and 7.0.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187731.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11829 β€Ό

Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.

πŸ“– Read

via "National Vulnerability Database".