❌ Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand ❌
📖 Read
via "Threat Post".
The ransomware group has leaked stolen data to add pressure on the company to pay up.📖 Read
via "Threat Post".
Threat Post
Conti Gang Hits IoT Chipmaker Advantech with $14M Ransom Demand
The ransomware group has leaked stolen data to add pressure on the company to pay up.
🦿 Safari for iOS 14 and macOS 11: How to prevent websites from tracking your moves online 🦿
📖 Read
via "Tech Republic".
Apple has deployed a privacy feature in iOS 14 and macOS 11 Safari that disables trackers from learning about which websites you visit. Learn all about this new feature and how to use it.📖 Read
via "Tech Republic".
TechRepublic
How privacy features in iOS 14 and macOS Big Sur prevent apps and websites from tracking you online | TechRepublic
Apple has new features in iOS 14 and macOS 11 Safari that disable trackers from learning which websites you visit to protect your privacy. Here are tips on how to use these privacy features.
‼ CVE-2020-29394 ‼
📖 Read
via "National Vulnerability Database".
A buffer overflow in the dlt_filter_load function in dlt_common.c in dlt-daemon 2.8.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in a format argument).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6317 ‼
📖 Read
via "National Vulnerability Database".
In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files. This information although sensitive is of limited utility and cannot be used to further access, modify or render unavailable any other information in the cockpit or system. This affects SAP Adaptive Server Enterprise, Versions - 15.7, 16.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29395 ‼
📖 Read
via "National Vulnerability Database".
The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-8351 ‼
📖 Read
via "National Vulnerability Database".
A privilege escalation vulnerability was reported in Lenovo PCManager prior to version 3.0.50.9162 that could allow an authenticated user to execute code with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27586 ‼
📖 Read
via "National Vulnerability Database".
Quick Heal Total Security before version 19.0 transmits quarantine and sysinfo files via clear text.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27587 ‼
📖 Read
via "National Vulnerability Database".
Quick Heal Total Security before 19.0 allows attackers with local admin rights to obtain access to files in the File Vault via a brute-force attack on the password.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17901 ‼
📖 Read
via "National Vulnerability Database".
Cross-site request forgery (CSRF) in PbootCMS 1.3.2 allows attackers to change the password of a user.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27585 ‼
📖 Read
via "National Vulnerability Database".
Quick Heal Total Security before 19.0 allows attackers with local admin rights to modify sensitive anti virus settings via a brute-attack on the settings password.📖 Read
via "National Vulnerability Database".
❌ Post-Cyberattack, UVM Health Network Still Picking Up Pieces ❌
📖 Read
via "Threat Post".
More than a month after the cyberattack first hit, the UVM health network is still grappling with delayed payment processing and other issues.📖 Read
via "Threat Post".
Threat Post
Post-Cyberattack, UVM Health Network Still Picking Up Pieces
More than a month after the cyberattack first hit, the UVM health network is still grappling with delayed payment processing and other issues.
🕴 Baltimore County Public Schools Closed Due to Ransomware Attack 🕴
📖 Read
via "Dark Reading".
The incident struck the day before Thanksgiving and interfered with online classes for some 115,000 students, officials report.📖 Read
via "Dark Reading".
Dark Reading
Baltimore County Public Schools Closed Due to Ransomware Attack
The incident struck the day before Thanksgiving and interfered with online classes for some 115,000 students, officials report.
🕴 Driven by Ransomware, Cyber Claims Rise in Number & Value 🕴
📖 Read
via "Dark Reading".
Companies are on track to file 27% more cyber claims in 2020, one insurer estimates, while another underwriter finds five out of every 100 companies file a claim each year.📖 Read
via "Dark Reading".
Dark Reading
Driven by Ransomware, Cyber Claims Rise in Number & Value
Companies are on track to file 27% more cyber claims in 2020, one insurer estimates, while another underwriter finds five out of every 100 companies file a claim each year.
‼ CVE-2020-11867 ‼
📖 Read
via "National Vulnerability Database".
Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29438 ‼
📖 Read
via "National Vulnerability Database".
Tesla Model X vehicles before 2020-11-23 have key fobs that accept firmware updates without signature verification. This allows attackers to construct firmware that retrieves an unlock code from a secure enclave chip.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29440 ‼
📖 Read
via "National Vulnerability Database".
Tesla Model X vehicles before 2020-11-23 do not perform certificate validation during an attempt to pair a new key fob with the body control module (BCM). This allows an attacker (who is inside a vehicle, or is otherwise able to send data over the CAN bus) to start and drive the vehicle with a spoofed key fob.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-16850 ‼
📖 Read
via "National Vulnerability Database".
Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-4127 ‼
📖 Read
via "National Vulnerability Database".
HCL Domino is susceptible to a Login CSRF vulnerability. With a valid credential, an attacker could trick a user into accessing a system under another ID or use an intranet user's system to access internal systems from the internet. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29441 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Upload Widget in OutSystems Platform 10 before 10.0.1019.0. An unauthenticated attacker can upload arbitrary files. In some cases, this attack may consume the available database space (Denial of Service), corrupt legitimate data if files are being processed asynchronously, or deny access to legitimate uploaded files.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29439 ‼
📖 Read
via "National Vulnerability Database".
Tesla Model X vehicles before 2020-11-23 have key fobs that rely on five VIN digits for the authentication needed for a body control module (BCM) to initiate a Bluetooth wake-up action. (The full VIN is visible from outside the vehicle.)📖 Read
via "National Vulnerability Database".
‼ CVE-2020-16849 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on Canon MF237w 06.07 devices. An "Improper Handling of Length Parameter Inconsistency" issue in the IPv4/ICMPv4 component, when handling a packet sent by an unauthenticated network attacker, may expose Sensitive Information.📖 Read
via "National Vulnerability Database".