πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-8278 β€Ό

Improper access control in Nextcloud Social app version 0.3.1 allowed to read posts of any user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-20933 β€Ό

InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8277 β€Ό

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.

πŸ“– Read

via "National Vulnerability Database".
🦿 Microsoft gives Linux a security boost with these new attack detection tools 🦿

Linux endpoint detection and response will help Microsoft Defender customers secure Linux servers and networks against security nasties.

πŸ“– Read

via "Tech Republic".
❌ Cybercriminals Batter Automakers With Ransomware, IP Theft Cyberattacks ❌

While the industry focus is on vehicle hacking, when it comes to the automotive industry cybercriminals are opting for less complex and sophisticated attacks - from phishing to ransomware.

πŸ“– Read

via "Threat Post".
πŸ•΄ Unpatched Browsers Abound, Study Shows πŸ•΄

Google Chrome users don't always take time to relaunch browser updates, and some legacy applications don't support new versions of Chrome, Menlo Security says.

πŸ“– Read

via "Dark Reading".
❌ APT Exploits Microsoft Zerologon Bug: Targets Japanese Companies ❌

Threat actors mount year-long campaign of espionage, exfiltrating data, stealing credentials and installing backdoors on victims’ networks.

πŸ“– Read

via "Threat Post".
πŸ•΄ 2021 Cybersecurity Spending: How to Maximize Value πŸ•΄

This is a pivotal moment for CISOs. As their influence increases, so does the pressure for them to make the right decisions.

πŸ“– Read

via "Dark Reading".
🦿 Consumers share their top frustrations about online retail purchasing 🦿

People say they've abandoned purchases at online retail stores because of the hassle of dealing with passwords, according to the FIDO Alliance.

πŸ“– Read

via "Tech Republic".
πŸ›  TestSSL 3.0.3 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Read

via "Packet Storm Security".
πŸ›  TCMalloc Inspector Tool πŸ› 

TCMalloc is an inspection tool that lets you parse and inspect tcmalloc internals, and detect lost memory, meaning memory which is not reachable via any (internal) pointers.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ New Proposed DNS Security Features Released πŸ•΄

Verisign's R&D team has developed new ways to authenticate and optimize DNS traffic on the client side of the domain-name resolution process.

πŸ“– Read

via "Dark Reading".
❌ IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk ❌

Security experts praised the newly approved IoT law as a step in the right direction for insecure connected federal devices.

πŸ“– Read

via "Threat Post".
❌ Food-Supply Giant Americold Admits Cyberattack ❌

A reported ransomware attack took down operations at the company, which in talks for COVID-19 vaccine-distribution contracts.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-11830 β€Ό

QualityProtect has a vulnerability to execute arbitrary system commands, affected product is com.oppo.qualityprotect V2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11831 β€Ό

OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28054 β€Ό

JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4718 β€Ό

IBM Jazz Reporting Service 6.0.6, 6.0.6.1, 7.0, and 7.0.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187731.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11829 β€Ό

Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4701 β€Ό

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9049 β€Ό

A vulnerability in specified versions of American Dynamics victor Web Client and Software House CÒ€’CURE Web Client could allow an unauthenticated attacker on the network to create and sign their own JSON Web Token and use it to execute an HTTP API Method without the need for valid authentication/authorization. Under certain circumstances, this could be used by an attacker to impact system availability by conducting a Denial of Service attack.

πŸ“– Read

via "National Vulnerability Database".