🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴
📖 Read
via "Dark Reading".
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.📖 Read
via "Dark Reading".
Dark Reading
Navigating the Security Maze in a New Era of Cyberthreats
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿
📖 Read
via "Tech Republic".
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.📖 Read
via "Tech Republic".
TechRepublic
Open-source developers say securing their code is a soul-withering waste of time
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌
📖 Read
via "Threat Post".
Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.📖 Read
via "Threat Post".
Threat Post
COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware
Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.
🦿 How ID fraud has surged in the wake of COVID-19 🦿
📖 Read
via "Tech Republic".
Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.📖 Read
via "Tech Republic".
TechRepublic
How ID fraud has surged in the wake of COVID-19
Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.
‼ CVE-2020-23520 ‼
📖 Read
via "National Vulnerability Database".
imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.📖 Read
via "National Vulnerability Database".
🦿 Phishing emails: More than 25% of American workers fall for them 🦿
📖 Read
via "Tech Republic".
A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.📖 Read
via "Tech Republic".
TechRepublic
Phishing emails: More than 25% of American workers fall for them
A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.
‼ CVE-2020-26959 ‼
📖 Read
via "National Vulnerability Database".
During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26958 ‼
📖 Read
via "National Vulnerability Database".
Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26966 ‼
📖 Read
via "National Vulnerability Database".
Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.📖 Read
via "National Vulnerability Database".
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿
📖 Read
via "Tech Republic".
Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.📖 Read
via "Tech Republic".
TechRepublic
WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS
Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.
‼ CVE-2020-29656 ‼
📖 Read
via "National Vulnerability Database".
An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."📖 Read
via "National Vulnerability Database".
‼ CVE-2020-7337 ‼
📖 Read
via "National Vulnerability Database".
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29655 ‼
📖 Read
via "National Vulnerability Database".
An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29657 ‼
📖 Read
via "National Vulnerability Database".
In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29651 ‼
📖 Read
via "National Vulnerability Database".
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.📖 Read
via "National Vulnerability Database".
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴
📖 Read
via "Dark Reading".
A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.📖 Read
via "Dark Reading".
Dark Reading
Global Cybercrime Losses Cross $1 Trillion Mark
A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴
📖 Read
via "Dark Reading".
Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.📖 Read
via "Dark Reading".
Dark Reading
Black Hat Europe: Dark Reading Video News Desk Coverage
Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌
📖 Read
via "Threat Post".
Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.📖 Read
via "Threat Post".
Threat Post
D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws
Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿
📖 Read
via "Tech Republic".
The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.📖 Read
via "Tech Republic".
TechRepublic
Security firm FireEye hit by state-sponsored cyberattack
The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴
📖 Read
via "Dark Reading".
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.📖 Read
via "Dark Reading".
Dark Reading
Navigating the Security Maze in a New Era of Cyberthreats
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿
📖 Read
via "Tech Republic".
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.📖 Read
via "Tech Republic".
TechRepublic
Open-source developers say securing their code is a soul-withering waste of time
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.