πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-8539 β€Ό

Kia Motors Head Unit with Software version: SOP.003.30.18.0703, SOP.005.7.181019, and SOP.007.1.191209 may allow an attacker to inject unauthorized commands, by executing the micomd executable deamon, to trigger unintended functionalities. In addition, this executable may be used by an attacker to inject commands to generate CAN frames that are sent into the M-CAN bus (Multimedia CAN bus) of the vehicle.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11990 β€Ό

We have resolved a security issue in the camera plugin that could have affected certain Cordova (Android) applications. An attacker who could install (or lead the victim to install) a specially crafted (or malicious) Android application would be able to access pictures taken with the app externally.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-16958 β€Ό

Cross-site Scripting (XSS) vulnerability in SolarWinds Web Help Desk 12.7.0 allows attacker to inject arbitrary web script or HTML via Location Name.

πŸ“– Read

via "National Vulnerability Database".
❌ Cayman Islands Bank Records Exposed in Open Azure Blob ❌

An offshore Cayman Islands bank’s backups, covering a $500 million investment portfolio, were left unsecured and leaking personal banking information, passport data and even online banking PINs.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-28583 β€Ό

An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28582 β€Ό

An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28575 β€Ό

A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28573 β€Ό

An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28576 β€Ό

An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28577 β€Ό

An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.

πŸ“– Read

via "National Vulnerability Database".
❌ Android Messenger App Still Leaking Photos, Videos ❌

The GO SMS Pro app has been downloaded 100 million times; now, underground forums are actively sharing images stolen from GO SMS servers.

πŸ“– Read

via "Threat Post".
❌ Misconfigured Docker Servers Under Attack by Xanthe Malware ❌

The never-before-seen Xanthe cryptomining botnet has been targeting misconfigured Docker APIs.

πŸ“– Read

via "Threat Post".
πŸ•΄ SASE 101: Why All the Buzz? πŸ•΄

Wide area networking and network security services unite to provide secure, cloud-based connectivity for enterprises' remote employees -- and these days that means billions of workers.

πŸ“– Read

via "Dark Reading".
🦿 How to protect your personal data from being sold on the Dark Web 🦿

Cybercriminals can use stolen information for extortion, scams and phishing schemes, and the direct theft of money, says Kaspersky.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Inside North Korea's Rapid Evolution to Cyber Superpower πŸ•΄

Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26250 β€Ό

OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator classes, resulting in the same behavior as if this configuration has not been set. If this is the only mechanism of authorization restriction (i.e. no group or team restrictions in configuration) then all authenticated users will be allowed. Provider-based restrictions, including deprecated values such as `GitHubOAuthenticator.org_whitelist` are **not** affected. All users of OAuthenticator 0.12.0 and 0.12.1 with JupyterHub 1.2 (JupyterHub Helm chart 0.10.0-0.10.5) who use the `admin.whitelist.users` configuration in the jupyterhub helm chart or the `c.Authenticator.whitelist` configuration directly. Users of other deprecated configuration, e.g. `c.GitHubOAuthenticator.team_whitelist` are **not** affected. If you see a log line like this and expect a specific list of allowed usernames: "[I 2020-11-27 16:51:54.528 JupyterHub app:1717] Not using allowed_users. Any authenticated user will be allowed." you are likely affected. Updating oauthenticator to 0.12.2 is recommended. A workaround is to replace the deprecated `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...`. If any users have been authorized during this time who should not have been, they must be deleted via the API or admin interface, per the referenced documentation.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Unmanaged Devices Heighten Risks for School Networks πŸ•΄

Gaming consoles, Wi-Fi Pineapples, and building management systems are among many devices Armis says it discovered on K-12 school networks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-29458 β€Ό

Textpattern CMS 4.6.2 allows CSRF via the prefs subsystem.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-29456 β€Ό

Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Free Mobile App Measures Your Personal Cyber Risk πŸ•΄

New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis.

πŸ“– Read

via "Dark Reading".