πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Sophos 2021 Threat Report: Navigating Cybersecurity in an Uncertain World πŸ•΄

SPONSORED: As most of the world shifted to remote work in 2020, cybercriminals upped their game, devising ways to use the fears and anxieties of organizations and end users against them. Sophos Principal Research Scientist Chester Wisniewski discusses the fast-changing attacker behaviors outlined in the Sophos 2021 Threat Report, and how IT professionals need to update their approach to protect against more sophisticated threats.

πŸ“– Read

via "Dark Reading".
πŸ›  THC-IPv6 Attack Tool 3.8 πŸ› 

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

πŸ“– Read

via "Packet Storm Security".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.4.12 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Mandos Encrypted File System Unattended Reboot Utility 1.8.13 πŸ› 

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ Ivanti Acquires MobileIron & Pulse Secure πŸ•΄

The company plans to use these acquisitions to strengthen and secure IT connections across remote devices and infrastructure.

πŸ“– Read

via "Dark Reading".
❌ Zoom Impersonation Attacks Aim to Steal Credentials ❌

The Better Business Bureau warns of phishing messages with the Zoom logo that tell recipients they have a missed meeting or suspended account.

πŸ“– Read

via "Threat Post".
❌ Electronic Medical Records Cracked Open by OpenClinic Bugs ❌

Four security vulnerabilities in an open-source medical records management platform allow remote code execution, patient data theft and more.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-7548 β€Ό

A CWE-330 - Use of Insufficiently Random Values vulnerability exists in Smartlink, PowerTag, and Wiser Series Gateways (see security notification for version information) that could allow unauthorized users to login.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28971 β€Ό

An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie, because of insufficient validation of URI paths.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28970 β€Ό

An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie. (In addition, an upload endpoint could then be used by an authenticated administrator to upload executable PHP scripts.)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28993 β€Ό

A Directory Traversal vulnerability exists in ATX miniCMTS200a Broadband Gateway through 2.0 and Pico CMTS through 2.0. Successful exploitation of this vulnerability would allow an unauthenticated attacker to retrieve administrator credentials by sending a malicious POST request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28940 β€Ό

On Western Digital My Cloud OS 5 devices before 5.06.115, the NAS Admin dashboard has an authentication bypass vulnerability that could allow an unauthenticated user to execute privileged commands on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26762 β€Ό

A stack-based buffer-overflow exists in Edimax IP-Camera IC-3116W (v3.06) and IC-3140W (v3.07), which allows an unauthenticated, unauthorized attacker to perform remote-code-execution due to a crafted GET-Request. The overflow occurs in binary ipcam_cgi due to a missing type check in function doGetSysteminfo(). This has been fixed in version: IC-3116W v3.08.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25181 β€Ό

WECON PLC Editor Versions 1.3.8 and prior has a heap-based buffer overflow vulnerabilities have been identified that may allow arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7545 β€Ό

A CWE-284:Improper Access Control vulnerability exists in EcoStruxureΓ‚Βͺ and SmartStruxureΓ‚Βͺ Power Monitoring and SCADA Software (see security notification for version information) that could allow for arbitrary code execution on the server when an authorized user access an affected webpage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7546 β€Ό

A CWE-79: Improper Neutralization of Input During Web Page Generation vulnerability exists in EcoStruxureΓ‚Βͺ and SmartStruxureΓ‚Βͺ Power Monitoring and SCADA Software (see security notification for version information) that could allow an attacker to perform actions on behalf of the authorized user when accessing an affected webpage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25177 β€Ό

WECON PLC Editor Versions 1.3.8 and prior has a stack-based buffer overflow vulnerability has been identified that may allow arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7533 β€Ό

A CWE-255: Credentials Management vulnerability exists in Web Server on Modicon M340, Modicon Quantum and ModiconPremium Legacy offers and their Communication Modules (see security notification for version information) which could cause the execution of commands on the webserver without authentication when sending specially crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7547 β€Ό

A CWE-284: Improper Access Control vulnerability exists in EcoStruxureΓ‚Βͺ and SmartStruxureΓ‚Βͺ Power Monitoring and SCADA Software (see security notification for version information) that could allow a user the ability to perform actions via the web interface at a higher privilege level.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-6880 β€Ό

A ZXELINK wireless controller has a SQL injection vulnerability. A remote attacker does not need to log in. By sending malicious SQL statements, because the device does not properly filter parameters, successful use can obtain management rights. This affects: ZXV10 W908 all versions before MIPS_A_1022IPV6R3T6P7Y20.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Call Fraud Operator Ordered to Pay $9M to Victims πŸ•΄

Indian national will serve 20 years in prison for running a large call center fraud operation.

πŸ“– Read

via "Dark Reading".