🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2020-25462

Heap buffer overflow in the fxCheckArrowFunction function at moddable/xs/sources/xsSyntaxical.c:3562 in Moddable SDK before OS200903.

📖 Read

via "National Vulnerability Database".
Novel Online Shopping Malware Hides in Social-Media Buttons

The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign images.

📖 Read

via "Threat Post".
🕴 BECs and EACs: What's the Difference? 🕴

Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.

📖 Read

via "Dark Reading".
High-Severity Chrome Bugs Allow Browser Hacks

Desktop versions of the browser received a total of eight fixes, half rated high-severity.

📖 Read

via "Threat Post".
CVE-2020-25449

Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column.

📖 Read

via "National Vulnerability Database".
🕴 Kmart Hit by Egregor Ransomware 🕴

Egregor is also behind recent attacks on UbiSoft and Barnes & Noble.

📖 Read

via "Dark Reading".
Making Sense of the Security Sensor Landscape

Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.

📖 Read

via "Threat Post".
🕴 Microsoft Cloud Security Exec Talks New Tech, WFH, Gamification 🕴

Gunter Ollman explains the benefits of CPSM technology, how IT security teams have evolved, and how the pandemic has shaped security.

📖 Read

via "Dark Reading".
CVE-2020-27774

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
CVE-2020-27772

A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
CVE-2020-27773

A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
CVE-2020-28950

The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.

📖 Read

via "National Vulnerability Database".
CVE-2020-27775

A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
CVE-2020-27776

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report

The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.

📖 Read

via "Threat Post".
Naked Security Live – Home Wi-Fi security tips

Latest episode - watch now!

📖 Read

via "Naked Security".
🕴 Avoiding a 1984-Like Future 🕴

We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.

📖 Read

via "Dark Reading".
CVE-2020-5800

The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to.

📖 Read

via "National Vulnerability Database".
CVE-2020-5799

The Eat Spray Love mobile app for both iOS and Android contains a backdoor account that, when modified, allowed privileged access to restricted functionality and to other users' data.

📖 Read

via "National Vulnerability Database".
CVE-2020-27151

An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes.

📖 Read

via "National Vulnerability Database".
CVE-2020-9247

There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B.

📖 Read

via "National Vulnerability Database".