‼ CVE-2020-25449 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column.📖 Read
via "National Vulnerability Database".
🕴 Kmart Hit by Egregor Ransomware 🕴
📖 Read
via "Dark Reading".
Egregor is also behind recent attacks on UbiSoft and Barnes & Noble.📖 Read
via "Dark Reading".
Dark Reading
Kmart Hit by Egregor Ransomware
Egregor is also behind recent attacks on UbiSoft and Barnes & Noble.
❌ Making Sense of the Security Sensor Landscape ❌
📖 Read
via "Threat Post".
Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.📖 Read
via "Threat Post".
Threat Post
Making Sense of the Security Sensor Landscape
Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.
🕴 Microsoft Cloud Security Exec Talks New Tech, WFH, Gamification 🕴
📖 Read
via "Dark Reading".
Gunter Ollman explains the benefits of CPSM technology, how IT security teams have evolved, and how the pandemic has shaped security.📖 Read
via "Dark Reading".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
‼ CVE-2020-27774 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27772 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27773 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28950 ‼
📖 Read
via "National Vulnerability Database".
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27775 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27776 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
❌ RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report ❌
📖 Read
via "Threat Post".
The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.📖 Read
via "Threat Post".
Threat Post
RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report
The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.
⚠ Naked Security Live – Home Wi-Fi security tips ⚠
📖 Read
via "Naked Security".
Latest episode - watch now!📖 Read
via "Naked Security".
Naked Security
Naked Security Live – Home Wi-Fi security tips
Latest episode – watch now!
🕴 Avoiding a 1984-Like Future 🕴
📖 Read
via "Dark Reading".
We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.📖 Read
via "Dark Reading".
Dark Reading
Avoiding a 1984-Like Future
We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.
‼ CVE-2020-5800 ‼
📖 Read
via "National Vulnerability Database".
The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5799 ‼
📖 Read
via "National Vulnerability Database".
The Eat Spray Love mobile app for both iOS and Android contains a backdoor account that, when modified, allowed privileged access to restricted functionality and to other users' data.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27151 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-9247 ‼
📖 Read
via "National Vulnerability Database".
There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5798 ‼
📖 Read
via "National Vulnerability Database".
inSync Client installer for macOS versions v6.8.0 and prior could allow an attacker to gain privileges of a root user from a lower privileged user due to improper integrity checks and directory permissions.📖 Read
via "National Vulnerability Database".
🕴 Name That Toon: Winter Forecast 🕴
📖 Read
via "Dark Reading".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.📖 Read
via "Dark Reading".
Dark Reading
Name That Toon: Winter Forecast
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
❌ QNAP High-Severity Flaws Plague NAS Systems ❌
📖 Read
via "Threat Post".
The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.📖 Read
via "Threat Post".
Threat Post
QNAP High-Severity Flaws Plague NAS Systems
The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.
🕴 Chart: Cyberthreats Follow Workers Home 🕴
📖 Read
via "Dark Reading".
The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.📖 Read
via "Dark Reading".
Dark Reading
Chart: Cyberthreats Follow Workers Home
The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.