πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report ❌

The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.

πŸ“– Read

via "Threat Post".
⚠ Naked Security Live – Home Wi-Fi security tips ⚠

Latest episode - watch now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Avoiding a 1984-Like Future πŸ•΄

We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-5800 β€Ό

The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5799 β€Ό

The Eat Spray Love mobile app for both iOS and Android contains a backdoor account that, when modified, allowed privileged access to restricted functionality and to other users' data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27151 β€Ό

An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9247 β€Ό

There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5798 β€Ό

inSync Client installer for macOS versions v6.8.0 and prior could allow an attacker to gain privileges of a root user from a lower privileged user due to improper integrity checks and directory permissions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Name That Toon: Winter Forecast πŸ•΄

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
❌ QNAP High-Severity Flaws Plague NAS Systems ❌

The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.

πŸ“– Read

via "Threat Post".
πŸ•΄ Chart: Cyberthreats Follow Workers Home πŸ•΄

The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.

πŸ“– Read

via "Dark Reading".
πŸ•΄ As DNA Synthesis Evolves, Cyber-Physical Attack Worries Grow πŸ•΄

Israeli scientists warn that cybersecurity around DNA synthesis devices needs improvement -- or else the industry risks harmful DNA produced through cyber means.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26513 β€Ό

An issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. The ReqIF XML data, used by the codebeamer ALM application to import projects, is parsed by insecurely configured software components, which can be abused for XML External Entity Attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26122 β€Ό

Inspur NF5266M5 through 3.21.2 and other server M5 devices allow remote code execution via administrator privileges. The Baseboard Management Controller (BMC) program of INSPUR server is weak in checking the firmware and lacks the signature verification mechanism, the attacker who obtains the administrator's rights can control the BMC by inserting malicious code into the firmware program and bypassing the current verification mechanism to upgrade the BMC.

πŸ“– Read

via "National Vulnerability Database".
❌ Chinese Breakthrough in Quantum Computing a Warning for Security Teams ❌

China joins Google in claiming quantum supremacy with new technology, ratcheting up RSA decryption concerns.

πŸ“– Read

via "Threat Post".
❌ Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times ❌

In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive. Lost in the chaos was IT security.

πŸ“– Read

via "Threat Post".
❌ Insider Report: Healthcare Security Woes Balloon in COVID-Era ❌

As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses.

πŸ“– Read

via "Threat Post".
πŸ” NSA Urges Orgs Patch Vulnerability Following Russian Exploitation πŸ”

Attackers have been actively exploiting a recently uncovered command injection bug in VMware products to access protected data.

πŸ“– Read

via "Digital Guardian".
🦿 Experian predicts 5 key data breach targets for 2021 🦿

The pandemic warfare will shift to vaccine supply chains, home networks, and data from telemedicine visits in the new year.

πŸ“– Read

via "Tech Republic".
πŸ•΄ NortonLifeLock Acquires Avira for $360M πŸ•΄

The all-cash transaction is expected to broaden NortonLifeLock's international presence and bring a freemium business model into its portfolio.

πŸ“– Read

via "Dark Reading".
❌ β€˜Free’ Cyberpunk 2077 Downloads Lead to Data Harvesting ❌

The hotly anticipated game -- featuring a digital Keanu Reeves as a major character -- is being used as a lure for cyberattacks.

πŸ“– Read

via "Threat Post".