β Turlaβs βCrutchβ Backdoor Leverages Dropbox in Espionage Attacks β
π Read
via "Threat Post".
In a recent cyberattack against an E.U. country's Ministry of Foreign Affairs, the Crutch backdoor leveraged Dropbox to exfiltrate sensitive documents.π Read
via "Threat Post".
Threat Post
Turlaβs βCrutchβ Backdoor Leverages Dropbox in Espionage Attacks
In a recent cyberattack against an E.U. country's Ministry of Foreign Affairs, the Crutch backdoor leveraged Dropbox to exfiltrate sensitive documents.
π FINRA Warns of Yet Another Phishing Attack Targeting Finance Industry π
π Read
via "Digital Guardian".
Emails from an ongoing campaign are not connected to FINRA and should be deleted, the organization warns.π Read
via "Digital Guardian".
Digital Guardian
FINRA Warns of Yet Another Phishing Attack Targeting Finance Industry
Emails from an ongoing campaign are not connected to FINRA and should be deleted, the organization warns.
π΄ Security Slipup Exposes Health Records & Lab Results π΄
π Read
via "Dark Reading".
NTreatment failed to add password protection to a cloud server, exposing thousands of sensitive medical records online.π Read
via "Dark Reading".
Dark Reading
Security Slipup Exposes Health Records & Lab Results
NTreatment failed to add password protection to a cloud server, exposing thousands of sensitive medical records online.
π I2P 0.9.48 π
π Read
via "Packet Storm Security".
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.π Read
via "Packet Storm Security".
Packetstormsecurity
I2P 0.9.48 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Automated Pen Testing: Can It Replace Humans? π΄
π Read
via "Dark Reading".
These tools have come a long way, but are they far enough along to make human pen testers obsolete?π Read
via "Dark Reading".
Dark Reading
Automated Pen Testing: Can It Replace Humans?
These tools have come a long way, but are they far enough along to make human pen testers obsolete?
βΌ CVE-2020-13494 βΌ
π Read
via "National Vulnerability Database".
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 parsing of compressed string tokens in binary USD files. A specially crafted malformed file can trigger a heap overflow which can result in out of bounds memory access which could lead to information disclosure. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, victim needs to access an attacker-provided malformed file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25266 βΌ
π Read
via "National Vulnerability Database".
AppImage appimaged before 1.0.3 does not properly check whether a downloaded file is a valid appimage. For example, it will accept a crafted mp3 file that contains an appimage, and install it.π Read
via "National Vulnerability Database".
βΌ CVE-2017-14451 βΌ
π Read
via "National Vulnerability Database".
An exploitable out-of-bounds read vulnerability exists in libevm (Ethereum Virtual Machine) of CPP-Ethereum. A specially crafted smart contract code can cause an out-of-bounds read which can subsequently trigger an out-of-bounds write resulting in remote code execution. An attacker can create/send malicious smart contract to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13496 βΌ
π Read
via "National Vulnerability Database".
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in TfToken Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13493 βΌ
π Read
via "National Vulnerability Database".
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. A specially crafted USDC file format path jumps decompression heap overflow in a way path jumps are processed. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-29389 βΌ
π Read
via "National Vulnerability Database".
The official Crux Linux Docker images 3.0 through 3.4 contain a blank password for a root user. System using the Crux Linux Docker container deployed by affected versions of the Docker image may allow an attacker to achieve root access with a blank password.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13497 βΌ
π Read
via "National Vulnerability Database".
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in String Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13956 βΌ
π Read
via "National Vulnerability Database".
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-29239 βΌ
π Read
via "National Vulnerability Database".
Online Birth Certificate System Project V 1.0 is affected by cross-site scripting (XSS). This vulnerability can result in an attacker injecting the XSS payload in the User Registration section. When an admin visits the View Detail of Application section from the admin panel, the attacker can able to steal the cookie according to the crafted payload.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13498 βΌ
π Read
via "National Vulnerability Database".
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in SdfPath Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-29240 βΌ
π Read
via "National Vulnerability Database".
Lepton-CMS 4.7.0 is affected by cross-site scripting (XSS). An attacker can inject the XSS payload in the URL field of the admin page and each time an admin visits the Menu-Pages-Pages Overview section, the XSS will be triggered.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25265 βΌ
π Read
via "National Vulnerability Database".
AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a system-installed .desktop file by providing a .desktop file that contains Name= with path components.π Read
via "National Vulnerability Database".
βΌ CVE-2017-2910 βΌ
π Read
via "National Vulnerability Database".
An exploitable Out-of-bounds Write vulnerability exists in the xls_addCell function of libxls 2.0. A specially crafted xls file can cause a memory corruption resulting in remote code execution. An attacker can send malicious xls file to trigger this vulnerability.π Read
via "National Vulnerability Database".
β Xerox DocuShare Bugs Allowed Data Leaks β
π Read
via "Threat Post".
CISA warns the leading enterprise document management platform is open to attack and urges companies to apply fixes.π Read
via "Threat Post".
Threat Post
Xerox DocuShare Bugs Allow Data Leaks
CISA warns the leading enterprise document management platform is open to attack and urges companies to apply fixes.
β Think-Tanks Under Attack by APTs, CISA Warns β
π Read
via "Threat Post".
The feds have seen ongoing cyberattacks on think-tanks (bent on espionage, malware delivery and more), using phishing and VPN exploits as primary attack vectors.π Read
via "Threat Post".
Threat Post
Think-Tanks Under Attack by Foreign APTs, CISA Warns
The feds have seen ongoing cyberattacks on think-tanks (bent on espionage, malware delivery and more), using phishing and VPN exploits as primary attack vectors.
π΄ Loyal Employee ... or Cybercriminal Accomplice? π΄
π Read
via "Dark Reading".
Can the bad guys' insider recruitment methods be reverse-engineered to reveal potential insider threats? Let's take a look.π Read
via "Dark Reading".
Dark Reading
Loyal Employee ... or Cybercriminal Accomplice?
Can the bad guys' insider recruitment methods be reverse-engineered to reveal potential insider threats? Let's take a look.