πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Good Heavens! 10M Impacted in Pray.com Data Exposure ❌

The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists.

πŸ“– Read

via "Threat Post".
❌ Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns ❌

Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-4004 β€Ό

VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28845 β€Ό

A CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20739 β€Ό

im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4005 β€Ό

VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20740 β€Ό

PDFResurrect before 0.20 lack of header validation checks causes heap-buffer-overflow in pdf_get_version().

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5797 β€Ό

UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25185 β€Ό

The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25725 β€Ό

In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed `t3GlyphStack->cache`, which causes an `heap-use-after-free` problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referred to another char in the same Type 3 font.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 10 Undergraduate Security Degree Programs to Explore πŸ•΄

Colleges and universities are ramping up cybersecurity education with a wider range of degree programs and more resources for students to build their infosec careers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How Retailers Can Fight Fraud and Abuse This Holiday Season πŸ•΄

Online shopping will be more popular than ever with consumers... and with malicious actors too.

πŸ“– Read

via "Dark Reading".
⚠ Facebook patches Messenger audio snooping bug – update now! ⚠

Do you ever make, ahem, "pointed remarks" just before answering calls from people you would rather avoid?

πŸ“– Read

via "Naked Security".
⚠ Naked Security Live – Beat the Threat! ⚠

Here's the latest Naked Security Live video - how to beat the crooks! Watch now...

πŸ“– Read

via "Naked Security".
πŸ•΄ 3 Steps CISOs Can Take to Convey Strategy for Budget Presentations πŸ•΄

Answering these questions will help CISOs define a plan and take the organization in a positive direction.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-28053 β€Ό

HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27985 β€Ό

Security Onion v2 prior to 2.3.10 has an incorrect sudo configuration, which allows local users to obtain root access by editing and executing /home/<user>/SecurityOnion/setup/so-setup.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  TestSSL 3.0.4 πŸ› 

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

πŸ“– Read

via "Packet Storm Security".
πŸ›  AIEngine 2.0.1 πŸ› 

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

πŸ“– Read

via "Packet Storm Security".
❌ Manchester United: IT Systems Disrupted in Cyberattack ❌

The popular U.K. soccer club confirmed an attack but said personal fan data remains secure.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-7777 β€Ό

This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so I assume that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a Function.apply();, leading to an Arbitrary Code Execution.

πŸ“– Read

via "National Vulnerability Database".