πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  TCMalloc Inspector Tool πŸ› 

TCMalloc is an inspection tool that lets you parse and inspect tcmalloc internals, and detect lost memory, meaning memory which is not reachable via any (internal) pointers.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ New Proposed DNS Security Features Released πŸ•΄

Verisign's R&D team has developed new ways to authenticate and optimize DNS traffic on the client side of the domain-name resolution process.

πŸ“– Read

via "Dark Reading".
❌ IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk ❌

Security experts praised the newly approved IoT law as a step in the right direction for insecure connected federal devices.

πŸ“– Read

via "Threat Post".
❌ Food-Supply Giant Americold Admits Cyberattack ❌

A reported ransomware attack took down operations at the company, which in talks for COVID-19 vaccine-distribution contracts.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-11830 β€Ό

QualityProtect has a vulnerability to execute arbitrary system commands, affected product is com.oppo.qualityprotect V2.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11831 β€Ό

OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28054 β€Ό

JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4718 β€Ό

IBM Jazz Reporting Service 6.0.6, 6.0.6.1, 7.0, and 7.0.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187731.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11829 β€Ό

Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4701 β€Ό

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9049 β€Ό

A vulnerability in specified versions of American Dynamics victor Web Client and Software House CÒ€’CURE Web Client could allow an unauthenticated attacker on the network to create and sign their own JSON Web Token and use it to execute an HTTP API Method without the need for valid authentication/authorization. Under certain circumstances, this could be used by an attacker to impact system availability by conducting a Denial of Service attack.

πŸ“– Read

via "National Vulnerability Database".
🦿 Linux servers: How to encrypt files with gocryptfs 🦿

Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.

πŸ“– Read

via "Tech Republic".
πŸ›  American Fuzzy Lop plus plus 2.68c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ›  erfs 1.4 πŸ› 

erfs is an easy-to-use, easy-to-setup, hassle-free secure file system with the encrypted data being stored on a remote cloud server without having to trust the server. The client is a bash-script. The cloud server is provided by THC for free (as in free beer!). There is no limit per user, no limit of the number of file systems and no limit of how many locations can access the same file system simultaneously. It supports collaboration and the same filesystem can be accessed from different computers at the same time. The data is securely and seamlessly synchronized. The server has no knowledge of the content. A rogue server operator can not access the data. All key material is created on the user's computer and never stored or transferred to the server.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Global Socket 1.4.22 πŸ› 

Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.

πŸ“– Read

via "Packet Storm Security".
❌ Code42 Incydr Series: Protect IP with Code42 Incydr ❌

The Code42 Incydr data risk detection and response solution focuses on giving security teams simplicity, signal and speed.

πŸ“– Read

via "Threat Post".
πŸ•΄ COVID-19: Latest Security News & Commentary πŸ•΄

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

πŸ“– Read

via "Dark Reading".
πŸ•΄ The Yellow Brick Road to Risk Management πŸ•΄

Beginning the journey to risk management can be daunting, but protecting your business is worth every step.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-25702 β€Ό

In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28942 β€Ό

An issue exists in PrimeKey EJBCA before 7.4.3 when enrolling with EST while proxied through an RA over the Peers protocol. As a part of EJBCA's domain security model, the peer connector allows the restriction of client certificates (for the RA, not the end user) to a limited set of allowed CAs, thus restricting the accessibility of that RA to the rights it has within a specific role. While this works for other protocols such as CMP, it was found that the EJBCA enrollment over an EST implementation bypasses this check, allowing enrollment with a valid client certificate through any functioning and authenticated RA connected to the CA. NOTE: an attacker must already have a trusted client certificate and authorization to enroll against the targeted CA.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25700 β€Ό

In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.

πŸ“– Read

via "National Vulnerability Database".