🦿 How to get Linux to see the FEITIAN fingerprint reader for FIDO2 security 🦿
📖 Read
via "Tech Republic".
If you've purchased a FEITIAN FIDO2 device and can't seem to get it working with Linux, Jack Wallen shows you how.📖 Read
via "Tech Republic".
TechRepublic
How to get Linux to see the FEITIAN fingerprint reader for FIDO2 security
If you've purchased a FEITIAN FIDO2 device and can't seem to get it working with Linux, Jack Wallen shows you how.
‼ CVE-2020-29364 ‼
📖 Read
via "National Vulnerability Database".
In NetArt News Lister 1.0.0, news headlines are vulnerable to stored XSS.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25537 ‼
📖 Read
via "National Vulnerability Database".
File upload vulnerability exists in UCMS 1.5.0, and the attacker can take advantage of this vulnerability to obtain server management permission.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29392 ‼
📖 Read
via "National Vulnerability Database".
The Estil Hill Lock Password Manager Safe app 2.3 for iOS has a *#06#* backdoor password. An attacker with physical access can unlock the password manager without knowing the master password set by the user.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28926 ‼
📖 Read
via "National Vulnerability Database".
ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Sending a malicious UPnP HTTP request to the miniDLNA service using HTTP chunked encoding can lead to a signedness bug resulting in a buffer overflow in calls to memcpy/memmove.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29390 ‼
📖 Read
via "National Vulnerability Database".
Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.📖 Read
via "National Vulnerability Database".
❌ Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign ❌
📖 Read
via "Threat Post".
A strain of the 13-year old backdoor Bandook trojan has been spotted in an espionage campaign.📖 Read
via "Threat Post".
Threat Post
Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign
A strain of the 13-year old backdoor Bandook trojan has been spotted in an espionage campaign.
❌ Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand ❌
📖 Read
via "Threat Post".
The ransomware group has leaked stolen data to add pressure on the company to pay up.📖 Read
via "Threat Post".
Threat Post
Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand
The ransomware group has leaked stolen data to add pressure on the company to pay up.
🦿 Safari for iOS 14 and macOS 11: How to prevent websites from tracking your moves online 🦿
📖 Read
via "Tech Republic".
Apple has deployed a privacy feature in iOS 14 and macOS 11 Safari that disables trackers from learning about which websites you visit. Learn all about this new feature and how to use it.📖 Read
via "Tech Republic".
TechRepublic
How privacy features in iOS 14 and macOS Big Sur prevent apps and websites from tracking you online | TechRepublic
Apple has new features in iOS 14 and macOS 11 Safari that disable trackers from learning which websites you visit to protect your privacy. Here are tips on how to use these privacy features.
‼ CVE-2020-29394 ‼
📖 Read
via "National Vulnerability Database".
A buffer overflow in the dlt_filter_load function in dlt_common.c in dlt-daemon 2.8.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in a format argument).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6317 ‼
📖 Read
via "National Vulnerability Database".
In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files. This information although sensitive is of limited utility and cannot be used to further access, modify or render unavailable any other information in the cockpit or system. This affects SAP Adaptive Server Enterprise, Versions - 15.7, 16.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29395 ‼
📖 Read
via "National Vulnerability Database".
The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-8351 ‼
📖 Read
via "National Vulnerability Database".
A privilege escalation vulnerability was reported in Lenovo PCManager prior to version 3.0.50.9162 that could allow an authenticated user to execute code with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27586 ‼
📖 Read
via "National Vulnerability Database".
Quick Heal Total Security before version 19.0 transmits quarantine and sysinfo files via clear text.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27587 ‼
📖 Read
via "National Vulnerability Database".
Quick Heal Total Security before 19.0 allows attackers with local admin rights to obtain access to files in the File Vault via a brute-force attack on the password.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17901 ‼
📖 Read
via "National Vulnerability Database".
Cross-site request forgery (CSRF) in PbootCMS 1.3.2 allows attackers to change the password of a user.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27585 ‼
📖 Read
via "National Vulnerability Database".
Quick Heal Total Security before 19.0 allows attackers with local admin rights to modify sensitive anti virus settings via a brute-attack on the settings password.📖 Read
via "National Vulnerability Database".
❌ Post-Cyberattack, UVM Health Network Still Picking Up Pieces ❌
📖 Read
via "Threat Post".
More than a month after the cyberattack first hit, the UVM health network is still grappling with delayed payment processing and other issues.📖 Read
via "Threat Post".
Threat Post
Post-Cyberattack, UVM Health Network Still Picking Up Pieces
More than a month after the cyberattack first hit, the UVM health network is still grappling with delayed payment processing and other issues.
🕴 Baltimore County Public Schools Closed Due to Ransomware Attack 🕴
📖 Read
via "Dark Reading".
The incident struck the day before Thanksgiving and interfered with online classes for some 115,000 students, officials report.📖 Read
via "Dark Reading".
Dark Reading
Baltimore County Public Schools Closed Due to Ransomware Attack
The incident struck the day before Thanksgiving and interfered with online classes for some 115,000 students, officials report.
🕴 Driven by Ransomware, Cyber Claims Rise in Number & Value 🕴
📖 Read
via "Dark Reading".
Companies are on track to file 27% more cyber claims in 2020, one insurer estimates, while another underwriter finds five out of every 100 companies file a claim each year.📖 Read
via "Dark Reading".
Dark Reading
Driven by Ransomware, Cyber Claims Rise in Number & Value
Companies are on track to file 27% more cyber claims in 2020, one insurer estimates, while another underwriter finds five out of every 100 companies file a claim each year.
‼ CVE-2020-11867 ‼
📖 Read
via "National Vulnerability Database".
Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.📖 Read
via "National Vulnerability Database".