πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
🦿 Zoom: These new features will prevent trolls and meeting-crashers 🦿

Zoom hosts can now pause a meeting while they remove a disruptive participant, and a new web-scanning tool will seek out compromised meeting links.

πŸ“– Read

via "Tech Republic".
🦿 "123456" tops list of most common passwords for 2020 🦿

People are still using very simple passwords, with many of them similar to the ones they used in 2019, according to NordPass.

πŸ“– Read

via "Tech Republic".
🦿 How to improve the security of your public cloud 🦿

Almost all the professionals who responded to a survey from BitGlass were concerned about the security of their public cloud apps and data.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Researchers Say They've Developed Fastest Open Source IDS/IPS πŸ•΄

With a five-processor core, "Pigasus" delivers the same performance as a system with between 100 and 700 cores, according to a team from Carnegie Mellon University's CyLab.

πŸ“– Read

via "Dark Reading".
⚠ Sophos 2021 Threat Report: Navigating cybersecurity in an uncertain world ⚠

Here's the latest Sophos Threat Report - learn what cybercriminals are up to on Windows, Linux, Android and more

πŸ“– Read

via "Naked Security".
πŸ•΄ How to Identify Cobalt Strike on Your Network πŸ•΄

Common antivirus systems frequently miss Cobalt Strike, a stealthy threat emulation toolkit admired by red teams and attackers alike.

πŸ“– Read

via "Dark Reading".
🦿 Security experts level criticism at Apple after Big Sur launch issues 🦿

Users took to social media to complain about slow systems with one report pointing to an OCSP responder as the culprit.

πŸ“– Read

via "Tech Republic".
🦿 66% of companies say it would take 5 or more days to fully recover from a ransomware attack ransom not paid 🦿

Veritas research finds data protection strategies are not keeping pace with the complexity of the attacks enterprises are facing.

πŸ“– Read

via "Tech Republic".
🦿 How remote working poses security risks for your organization 🦿

Companies are at greater risk due to phishing attacks, password sharing, and unsecured personal devices, says SailPoint.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-24723 β€Ό

Cross Site Scripting (XSS) vulnerability in the Registration page of the admin panel in PHPGurukul User Registration & Login and User Management System With admin panel 2.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7562 β€Ό

A CWE-125: Out-of-Bounds Read vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause a segmentation fault or a buffer overflow when uploading a specially crafted file on the controller over FTP.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7564 β€Ό

A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause write access and the execution of commands when uploading a specially crafted file on the controller over FTP.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7563 β€Ό

A CWE-787: Out-of-bounds Write vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause corruption of data, a crash, or code execution when uploading a specially crafted file on the controller over FTP.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28361 β€Ό

Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28005 β€Ό

httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25406 β€Ό

app\admin\controller\sys\Uploads.php in lemocms 1.8.x allows users to upload files to upload executable files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28724 β€Ό

Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28578 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28572 β€Ό

A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28581 β€Ό

A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27697 β€Ό

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.

πŸ“– Read

via "National Vulnerability Database".