βΌ CVE-2020-28573 βΌ
π Read
via "National Vulnerability Database".
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28576 βΌ
π Read
via "National Vulnerability Database".
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28577 βΌ
π Read
via "National Vulnerability Database".
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.π Read
via "National Vulnerability Database".
β Android Messenger App Still Leaking Photos, Videos β
π Read
via "Threat Post".
The GO SMS Pro app has been downloaded 100 million times; now, underground forums are actively sharing images stolen from GO SMS servers.π Read
via "Threat Post".
Threat Post
Android Messenger App Still Leaking Photos, Videos
The GO SMS Pro app has been downloaded 100 million times; now, underground forums are actively sharing images stolen from GO SMS servers.
β Misconfigured Docker Servers Under Attack by Xanthe Malware β
π Read
via "Threat Post".
The never-before-seen Xanthe cryptomining botnet has been targeting misconfigured Docker APIs.π Read
via "Threat Post".
Threat Post
Misconfigured Docker Servers Under Attack by Xanthe Malware
The never-before-seen Xanthe cryptomining botnet has been targeting misconfigured Docker APIs.
π΄ SASE 101: Why All the Buzz? π΄
π Read
via "Dark Reading".
Wide area networking and network security services unite to provide secure, cloud-based connectivity for enterprises' remote employees -- and these days that means billions of workers.π Read
via "Dark Reading".
Dark Reading
SASE 101: Why All the Buzz?
Wide area networking and network security services unite to provide secure, cloud-based connectivity for enterprises' remote employees -- and these days that means billions of workers.
π¦Ώ How to protect your personal data from being sold on the Dark Web π¦Ώ
π Read
via "Tech Republic".
Cybercriminals can use stolen information for extortion, scams and phishing schemes, and the direct theft of money, says Kaspersky.π Read
via "Tech Republic".
TechRepublic
How to protect your personal data from being sold on the Dark Web
Cybercriminals can use stolen information for extortion, scams and phishing schemes, and the direct theft of money, says Kaspersky.
π΄ Inside North Korea's Rapid Evolution to Cyber Superpower π΄
π Read
via "Dark Reading".
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations.π Read
via "Dark Reading".
Dark Reading
Inside North Korea's Rapid Evolution to Cyber Superpower
Researchers examine North Korea's rapid evolution from destructive campaigns to complex and efficient cyber operations.
βΌ CVE-2020-26250 βΌ
π Read
via "National Vulnerability Database".
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator classes, resulting in the same behavior as if this configuration has not been set. If this is the only mechanism of authorization restriction (i.e. no group or team restrictions in configuration) then all authenticated users will be allowed. Provider-based restrictions, including deprecated values such as `GitHubOAuthenticator.org_whitelist` are **not** affected. All users of OAuthenticator 0.12.0 and 0.12.1 with JupyterHub 1.2 (JupyterHub Helm chart 0.10.0-0.10.5) who use the `admin.whitelist.users` configuration in the jupyterhub helm chart or the `c.Authenticator.whitelist` configuration directly. Users of other deprecated configuration, e.g. `c.GitHubOAuthenticator.team_whitelist` are **not** affected. If you see a log line like this and expect a specific list of allowed usernames: "[I 2020-11-27 16:51:54.528 JupyterHub app:1717] Not using allowed_users. Any authenticated user will be allowed." you are likely affected. Updating oauthenticator to 0.12.2 is recommended. A workaround is to replace the deprecated `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...`. If any users have been authorized during this time who should not have been, they must be deleted via the API or admin interface, per the referenced documentation.π Read
via "National Vulnerability Database".
π΄ Unmanaged Devices Heighten Risks for School Networks π΄
π Read
via "Dark Reading".
Gaming consoles, Wi-Fi Pineapples, and building management systems are among many devices Armis says it discovered on K-12 school networks.π Read
via "Dark Reading".
Dark Reading
Unmanaged Devices Heighten Risks for School Networks
Gaming consoles, Wi-Fi Pineapples, and building management systems are among many devices Armis says it discovered on K-12 school networks.
βΌ CVE-2020-29458 βΌ
π Read
via "National Vulnerability Database".
Textpattern CMS 4.6.2 allows CSRF via the prefs subsystem.π Read
via "National Vulnerability Database".
βΌ CVE-2020-29456 βΌ
π Read
via "National Vulnerability Database".
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required.π Read
via "National Vulnerability Database".
π΄ Free Mobile App Measures Your Personal Cyber Risk π΄
π Read
via "Dark Reading".
New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis.π Read
via "Dark Reading".
Darkreading
Free Mobile App Measures Your Personal Cyber Risk
New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis.
β DNS Filtering: A Top Battle Front Against Malware and Phishing β
π Read
via "Threat Post".
Peter Lowe with DNSFilter discusses the science behind domain name system (DNS) filtering and how this method is effective in blocking out phishing and malware.π Read
via "Threat Post".
Threat Post
DNS Filtering: A Top Battle Front Against Malware and Phishing
Peter Lowe with DNSFilter discusses the science behind domain name system (DNS) filtering and how this method is effective in blocking out phishing and malware.
β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈ
π΄
β«οΈ π€ͺ Incredible pack of books from β¬1 in Humble Bundle! π€
π΄
β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈ
βͺοΈ Hacking: The Art of Exploitation.
βͺοΈ The Car Hacker's Handbook: A Guide for the Penetration Tester.
βͺοΈ Metasploit: A Penetration Tester's Guide.
βͺοΈ Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
βͺοΈ Penetration Testing: A Hands-On Introduction to Hacking.
βͺοΈ Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.
βͺοΈ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems.
βͺοΈ Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly.
βͺοΈ Malware Data Science: Attack Detection and Attribution.
βͺοΈ Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali.
βͺοΈ The Linux Command Line, 2nd Edition: A Complete Introduction.
βͺοΈ Serious Cryptography: A Practical Introduction to Modern Encryption.
βͺοΈ Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats.
βͺοΈ Black Hat Go: Go Programming For Hackers and Pentesters.
βͺοΈ The Hardware Hacker: Adventures in Making and Breaking Hardware.
βͺοΈ Web Security for Developers: Real Threats, Practical Defense.
βͺοΈ Foundations of Information Security: A Straightforward Introduction.
π»π»π»π»
β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈ
π΄
β«οΈ π€ͺ Incredible pack of books from β¬1 in Humble Bundle! π€
π΄
β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈπ΄β«οΈ
βͺοΈ Hacking: The Art of Exploitation.
βͺοΈ The Car Hacker's Handbook: A Guide for the Penetration Tester.
βͺοΈ Metasploit: A Penetration Tester's Guide.
βͺοΈ Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
βͺοΈ Penetration Testing: A Hands-On Introduction to Hacking.
βͺοΈ Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.
βͺοΈ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems.
βͺοΈ Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly.
βͺοΈ Malware Data Science: Attack Detection and Attribution.
βͺοΈ Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali.
βͺοΈ The Linux Command Line, 2nd Edition: A Complete Introduction.
βͺοΈ Serious Cryptography: A Practical Introduction to Modern Encryption.
βͺοΈ Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats.
βͺοΈ Black Hat Go: Go Programming For Hackers and Pentesters.
βͺοΈ The Hardware Hacker: Adventures in Making and Breaking Hardware.
βͺοΈ Web Security for Developers: Real Threats, Practical Defense.
βͺοΈ Foundations of Information Security: A Straightforward Introduction.
π»π»π»π»
π΄ PACK OF BOOKS FROM β¬1 IN HUMBLE BUNDLE βΌοΈ
---------
βͺοΈ Hacking: The Art of Exploitation.
βͺοΈ The Car Hacker's Handbook: A Guide for the Penetration Tester.
βͺοΈ Metasploit: A Penetration Tester's Guide.
βͺοΈ Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
βͺοΈ Penetration Testing: A Hands-On Introduction to Hacking.
βͺοΈ Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.
βͺοΈ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems.
βͺοΈ Etc., Etc., Etc.
π΄ PACK OF BOOKS FROM β¬1 IN HUMBLE BUNDLE βΌοΈ
---------
βͺοΈ Hacking: The Art of Exploitation.
βͺοΈ The Car Hacker's Handbook: A Guide for the Penetration Tester.
βͺοΈ Metasploit: A Penetration Tester's Guide.
βͺοΈ Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
βͺοΈ Penetration Testing: A Hands-On Introduction to Hacking.
βͺοΈ Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.
βͺοΈ Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems.
βͺοΈ Etc., Etc., Etc.
π΄ Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet π΄
π Read
via "Dark Reading".
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.π Read
via "Dark Reading".
Dark Reading
Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.
π¦Ώ Productivity Score: Microsoft limits features of new tool following 'workplace surveillance' concerns π¦Ώ
π Read
via "Tech Republic".
Productivity Score will no longer identify how individual users interact with Microsoft 365 apps.π Read
via "Tech Republic".
β Microsoft Revamps βInvasiveβ M365 Feature After Privacy Backlash β
π Read
via "Threat Post".
The Microsoft 365 tool that tracked employee usage of applications like Outlook, Skype and Teams was widely condemned by privacy experts.π Read
via "Threat Post".
Threat Post
Microsoft Revamps βInvasiveβ M365 Feature After Privacy Backlash
The Microsoft 365 tool that tracked employee usage of applications like Outlook, Skype and Teams was widely condemned by privacy experts.
π¦Ώ Sales of CEO email accounts may give cyber criminals access to the "crown jewels" of a company π¦Ώ
π Read
via "Tech Republic".
Multiple security professionals said stolen credentials on Exploit.in were part of a tidal wave of business email compromise attacks.π Read
via "Tech Republic".
TechRepublic
Sales of CEO email accounts may give cyber criminals access to the "crown jewels" of a company
Multiple security professionals said stolen credentials on Exploit.in were part of a tidal wave of business email compromise attacks.