‼ CVE-2020-27775 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27776 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.📖 Read
via "National Vulnerability Database".
❌ RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report ❌
📖 Read
via "Threat Post".
The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.📖 Read
via "Threat Post".
Threat Post
RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report
The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.
⚠ Naked Security Live – Home Wi-Fi security tips ⚠
📖 Read
via "Naked Security".
Latest episode - watch now!📖 Read
via "Naked Security".
Naked Security
Naked Security Live – Home Wi-Fi security tips
Latest episode – watch now!
🕴 Avoiding a 1984-Like Future 🕴
📖 Read
via "Dark Reading".
We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.📖 Read
via "Dark Reading".
Dark Reading
Avoiding a 1984-Like Future
We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.
‼ CVE-2020-5800 ‼
📖 Read
via "National Vulnerability Database".
The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5799 ‼
📖 Read
via "National Vulnerability Database".
The Eat Spray Love mobile app for both iOS and Android contains a backdoor account that, when modified, allowed privileged access to restricted functionality and to other users' data.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27151 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-9247 ‼
📖 Read
via "National Vulnerability Database".
There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5798 ‼
📖 Read
via "National Vulnerability Database".
inSync Client installer for macOS versions v6.8.0 and prior could allow an attacker to gain privileges of a root user from a lower privileged user due to improper integrity checks and directory permissions.📖 Read
via "National Vulnerability Database".
🕴 Name That Toon: Winter Forecast 🕴
📖 Read
via "Dark Reading".
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.📖 Read
via "Dark Reading".
Dark Reading
Name That Toon: Winter Forecast
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
❌ QNAP High-Severity Flaws Plague NAS Systems ❌
📖 Read
via "Threat Post".
The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.📖 Read
via "Threat Post".
Threat Post
QNAP High-Severity Flaws Plague NAS Systems
The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.
🕴 Chart: Cyberthreats Follow Workers Home 🕴
📖 Read
via "Dark Reading".
The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.📖 Read
via "Dark Reading".
Dark Reading
Chart: Cyberthreats Follow Workers Home
The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.
🕴 As DNA Synthesis Evolves, Cyber-Physical Attack Worries Grow 🕴
📖 Read
via "Dark Reading".
Israeli scientists warn that cybersecurity around DNA synthesis devices needs improvement -- or else the industry risks harmful DNA produced through cyber means.📖 Read
via "Dark Reading".
Dark Reading
As DNA Synthesis Evolves, Cyber-Physical Attack Worries Grow
Israeli scientists warn that cybersecurity around DNA synthesis devices needs improvement -- or else the industry risks harmful DNA produced through cyber means.
‼ CVE-2020-26513 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. The ReqIF XML data, used by the codebeamer ALM application to import projects, is parsed by insecurely configured software components, which can be abused for XML External Entity Attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26122 ‼
📖 Read
via "National Vulnerability Database".
Inspur NF5266M5 through 3.21.2 and other server M5 devices allow remote code execution via administrator privileges. The Baseboard Management Controller (BMC) program of INSPUR server is weak in checking the firmware and lacks the signature verification mechanism, the attacker who obtains the administrator's rights can control the BMC by inserting malicious code into the firmware program and bypassing the current verification mechanism to upgrade the BMC.📖 Read
via "National Vulnerability Database".
❌ Chinese Breakthrough in Quantum Computing a Warning for Security Teams ❌
📖 Read
via "Threat Post".
China joins Google in claiming quantum supremacy with new technology, ratcheting up RSA decryption concerns.📖 Read
via "Threat Post".
Threat Post
Chinese Breakthrough in Quantum Computing a Warning for Security Teams
China joins Google in claiming quantum supremacy with new technology, ratcheting up RSA decryption concerns.
❌ Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times ❌
📖 Read
via "Threat Post".
In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive. Lost in the chaos was IT security.📖 Read
via "Threat Post".
Threat Post
Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times
In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive. Lost in the chaos was IT security.
❌ Insider Report: Healthcare Security Woes Balloon in COVID-Era ❌
📖 Read
via "Threat Post".
As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses.📖 Read
via "Threat Post".
Threat Post
Insider Report: Healthcare Security Woes Balloon in COVID-Era
As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses.
🔏 NSA Urges Orgs Patch Vulnerability Following Russian Exploitation 🔏
📖 Read
via "Digital Guardian".
Attackers have been actively exploiting a recently uncovered command injection bug in VMware products to access protected data.📖 Read
via "Digital Guardian".
Digital Guardian
NSA Urges Orgs Patch Vulnerability Following Russian Exploitation
Attackers have been actively exploiting a recently uncovered command injection bug in VMware products to access protected data.
🦿 Experian predicts 5 key data breach targets for 2021 🦿
📖 Read
via "Tech Republic".
The pandemic warfare will shift to vaccine supply chains, home networks, and data from telemedicine visits in the new year.📖 Read
via "Tech Republic".
TechRepublic
Experian predicts 5 key data breach targets for 2021
The pandemic warfare will shift to vaccine supply chains, home networks, and data from telemedicine visits in the new year.