βΌ CVE-2020-13348 βΌ
π Read
via "National Vulnerability Database".
An issue has been discovered in GitLab EE affecting all versions starting from 10.2. Required CODEOWNERS approval could be bypassed by targeting a branch without the CODEOWNERS file. Affected versions are >=10.2, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.π Read
via "National Vulnerability Database".
β ThreatList: Pharma Mobile Phishing Attacks Turn to Malware β
π Read
via "Threat Post".
After the breakout of the COVID-19 pandemic, mobile phishing attacks targeting pharmaceutical companies have shifted their focus from credential theft to malware delivery.π Read
via "Threat Post".
Threat Post
ThreatList: Pharma Mobile Phishing Attacks Turn to Malware
After the breakout of the COVID-19 pandemic, mobile phishing attacks targeting pharmaceutical companies have shifted their focus from credential theft to malware delivery.
β Defining Security Policies to Manage Remote Insider Threats β
π Read
via "Threat Post".
This is the time to define the new normal; having well-defined policies in place will help businesses maintain its security posture while bolstering the security of the ever-increasing work-from-home population.π Read
via "Threat Post".
Threat Post
Defining Security Policies to Manage Remote Insider Threats
Plixer's Justin Jett on finding insider threats amidst the ever-increasing work-from-home population.
π΄ Vulnerability Prioritization Tops Security Pros' Challenges π΄
π Read
via "Dark Reading".
Why vulnerability prioritization has become a top challenge for security professionals and how security and development teams can get it right.π Read
via "Dark Reading".
Dark Reading
Vulnerability Prioritization Tops Security Pros' Challenges
Why vulnerability prioritization has become a top challenge for security professionals and how security and development teams can get it right.
β Multiple Industrial Control System Vendors Warn of Critical Bugs β
π Read
via "Threat Post".
Four industrial control system vendors each announced vulnerabilities that ranged from critical to high-severity.π Read
via "Threat Post".
Threat Post
Multiple Industrial Control System Vendors Warn of Critical Bugs
Four industrial control system vendors each announced vulnerabilities that ranged from critical to high-severity.
π΄ EFF, Security Experts Condemn Politicization of Election Security π΄
π Read
via "Dark Reading".
Open letter, signed by high-profile security professionals and organizations, urges White House to "reverse course and support election security."π Read
via "Dark Reading".
Dark Reading
EFF, Security Experts Condemn Politicization of Election Security
Open letter, signed by high-profile security professionals and organizations, urges White House to reverse course and support election security.
βΌ CVE-2020-26551 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Aviatrix Controller before R5.3.1151. Encrypted key values are stored in a readable file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28129 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-site scripting (XSS) vulnerability in SourceCodester Gym Management System 1.0 allows users to inject and store arbitrary JavaScript code in index.php?page=packages via vulnerable fields 'Package Name' and 'Description'.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26549 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Aviatrix Controller before R5.4.1290. The htaccess protection mechanism to prevent requests to directories can be bypassed for file downloading.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28915 βΌ
π Read
via "National Vulnerability Database".
A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.π Read
via "National Vulnerability Database".
β Firing of CISA Chief Christopher Krebs Widely Condemned β
π Read
via "Threat Post".
President Trump fired US cybersecurity chief over Twitter Tuesday, an act widely condemned within the cybersecurity community.π Read
via "Threat Post".
Threat Post
Firing of CISA Chief Christopher Krebs Widely Condemned
President Trump fired US cybersecurity chief over Twitter Tuesday, an act widely condemned within the cybersecurity community.
π¦Ώ Microsoft's new security chip takes PC protection to a higher level π¦Ώ
π Read
via "Tech Republic".
Intel, AMD and Qualcomm will use the Microsoft-designed Pluton security processor from Xbox One and Azure Sphere in future SoCs to deliver better protection than a TPM.π Read
via "Tech Republic".
π¦Ώ Zoom: These new features will prevent trolls and meeting-crashers π¦Ώ
π Read
via "Tech Republic".
Zoom hosts can now pause a meeting while they remove a disruptive participant, and a new web-scanning tool will seek out compromised meeting links.π Read
via "Tech Republic".
TechRepublic
Zoom: These new features will prevent trolls and meeting-crashers
Zoom hosts can now pause a meeting while they remove a disruptive participant, and a new web-scanning tool will seek out compromised meeting links.
π¦Ώ "123456" tops list of most common passwords for 2020 π¦Ώ
π Read
via "Tech Republic".
People are still using very simple passwords, with many of them similar to the ones they used in 2019, according to NordPass.π Read
via "Tech Republic".
TechRepublic
"123456" tops list of most common passwords for 2020
People are still using very simple passwords, with many of them similar to the ones they used in 2019, according to NordPass.
π¦Ώ How to improve the security of your public cloud π¦Ώ
π Read
via "Tech Republic".
Almost all the professionals who responded to a survey from BitGlass were concerned about the security of their public cloud apps and data.π Read
via "Tech Republic".
TechRepublic
How to improve the security of your public cloud
Almost all the professionals who responded to a survey from BitGlass were concerned about the security of their public cloud apps and data.
π΄ Researchers Say They've Developed Fastest Open Source IDS/IPS π΄
π Read
via "Dark Reading".
With a five-processor core, "Pigasus" delivers the same performance as a system with between 100 and 700 cores, according to a team from Carnegie Mellon University's CyLab.π Read
via "Dark Reading".
Dark Reading
Researchers Say They've Developed Fastest Open Source IDS/IPS
With a five-processor core, Pigasus delivers the same performance as a system with between 100 and 700 cores, according to a team from Carnegie Mellon University's CyLab.
β Sophos 2021 Threat Report: Navigating cybersecurity in an uncertain world β
π Read
via "Naked Security".
Here's the latest Sophos Threat Report - learn what cybercriminals are up to on Windows, Linux, Android and moreπ Read
via "Naked Security".
Naked Security
Sophos 2021 Threat Report: Navigating cybersecurity in an uncertain world
Hereβs the latest Sophos Threat Report β learn what cybercriminals are up to on Windows, Linux, Android and more
π΄ How to Identify Cobalt Strike on Your Network π΄
π Read
via "Dark Reading".
Common antivirus systems frequently miss Cobalt Strike, a stealthy threat emulation toolkit admired by red teams and attackers alike.π Read
via "Dark Reading".
Dark Reading
How to Identify Cobalt Strike on Your Network
Common antivirus systems frequently miss Cobalt Strike, a stealthy threat emulation toolkit admired by red teams and attackers alike.
π¦Ώ Security experts level criticism at Apple after Big Sur launch issues π¦Ώ
π Read
via "Tech Republic".
Users took to social media to complain about slow systems with one report pointing to an OCSP responder as the culprit.π Read
via "Tech Republic".
TechRepublic
Security experts level criticism at Apple after Big Sur launch issues
Users took to social media to complain about slow systems with one report pointing to an OCSP responder as the culprit.
π¦Ώ 66% of companies say it would take 5 or more days to fully recover from a ransomware attack ransom not paid π¦Ώ
π Read
via "Tech Republic".
Veritas research finds data protection strategies are not keeping pace with the complexity of the attacks enterprises are facing.π Read
via "Tech Republic".
TechRepublic
66% of companies say it would take 5 or more days to fully recover from a ransomware attack ransom not paid
Veritas research finds data protection strategies are not keeping pace with the complexity of the attacks enterprises are facing.
π¦Ώ How remote working poses security risks for your organization π¦Ώ
π Read
via "Tech Republic".
Companies are at greater risk due to phishing attacks, password sharing, and unsecured personal devices, says SailPoint.π Read
via "Tech Republic".
TechRepublic
How remote working poses security risks for your organization
Companies are at greater risk due to phishing attacks, password sharing, and unsecured personal devices, says SailPoint.