πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-26242 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.18, there is a Denial-of-service (crash) during block processing. This is fixed in 1.9.18.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26240 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. An ethash mining DAG generation flaw in Geth before version 1.9.24 could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. This issue is fixed as of 1.9.24

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep8: A conversation with Katie Moussouris ⚠

Here's the latest Naked Security Podcast - listen now!

πŸ“– Read

via "Naked Security".
❌ Light-Based Attacks Expand in the Digital Home ❌

The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investigate why MEMS microphones respond to sound.

πŸ“– Read

via "Threat Post".
πŸ•΄ Why Security Awareness Training Should Be Backed by Security by Design πŸ•΄

Cybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Prevention Is Better Than the Cure When Securing Cloud-Native Deployments πŸ•΄

The "OODA loop" shows us how to secure cloud-native deployments and prevent breaches before they occur.

πŸ“– Read

via "Dark Reading".
❌ How to Update Your Remote Access Policy – And Why You Should Now ❌

Reducing the risks of remote work starts with updating the access policies of yesterday.

πŸ“– Read

via "Threat Post".
🦿 Banks looking to confidential computing for solutions to money laundering, theft, and fraud 🦿

Tech companies are offering this emerging technology to help financial institutions secure data while it is being processed.

πŸ“– Read

via "Tech Republic".
πŸ” What is a Security Operations Center (SOC)? πŸ”

Learn about how security operations centers work and why many organizations rely on SOCs as a valuable resource for security incident detection.

πŸ“– Read

via "Digital Guardian".
❌ Major BEC Phishing Ring Cracked Open with 3 Arrests ❌

Some 50,000 targeted victims have been identified so far in a massive, global scam enterprise that involves 26 different malwares.

πŸ“– Read

via "Threat Post".
❌ Critical MobileIron RCE Flaw Under Active Attack ❌

Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others.

πŸ“– Read

via "Threat Post".
🦿 Top 5 business sectors targeted by ransomware 🦿

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware.

πŸ“– Read

via "Tech Republic".
🦿 5 business sectors ransomware targets 🦿

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-25650 β€Ό

A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Look Beyond the 'Big 5' in Cyberattacks πŸ•΄

Don't ignore cyber operations outside US and European interests, researcher says. We can learn a lot from methods used by attackers that aren't among the usual suspects.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Do You Know Who's Lurking in Your Cloud Environment? πŸ•΄

A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26212 β€Ό

GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of every other user, even admin ones. Steps to reproduce the behavior: 1. Create a new planning with 'eduardo.mozart' user (from 'IT' group that belongs to 'Super-admin') into it's personal planning at 'Assistance' > 'Planning'. 2. Copy the CalDAV url and use a CalDAV client (e.g. Thunderbird) to sync the planning with the provided URL. 3. Inform the username and password from any valid user (e.g. 'camila' from 'Proativa' group). 4. 'Camila' has read-only access to 'eduardo.mozart' personal planning. The same behavior happens to any group. E.g. 'Camila' has access to 'IT' group planning, even if she doesn't belong to this group and has a 'Self-service' profile permission). This issue is fixed in version 9.5.3. As a workaround, one can remove the `caldav.php` file to block access to CalDAV server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26243 β€Ό

Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed. This is fixed in versions 0.3.9.7 and 0.4.4. The following workarounds are available: 1) Set the option `no_unions` for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. 2) Set the type of the submessage field inside oneof to `FT_POINTER`. This way the whole submessage will be dynamically allocated and the problematic code is not executed. 3) Use an arena allocator for nanopb, to make sure all memory can be released afterwards.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27253 β€Ό

A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27251 β€Ό

A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25652 β€Ό

A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user could use this flaw to prevent legitimate agents from connecting to the spice-vdagentd daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and prior.

πŸ“– Read

via "National Vulnerability Database".