‼ CVE-2020-29651 ‼
📖 Read
via "National Vulnerability Database".
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.📖 Read
via "National Vulnerability Database".
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴
📖 Read
via "Dark Reading".
A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.📖 Read
via "Dark Reading".
Dark Reading
Global Cybercrime Losses Cross $1 Trillion Mark
A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴
📖 Read
via "Dark Reading".
Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.📖 Read
via "Dark Reading".
Dark Reading
Black Hat Europe: Dark Reading Video News Desk Coverage
Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌
📖 Read
via "Threat Post".
Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.📖 Read
via "Threat Post".
Threat Post
D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws
Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿
📖 Read
via "Tech Republic".
The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.📖 Read
via "Tech Republic".
TechRepublic
Security firm FireEye hit by state-sponsored cyberattack
The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴
📖 Read
via "Dark Reading".
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.📖 Read
via "Dark Reading".
Dark Reading
Navigating the Security Maze in a New Era of Cyberthreats
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿
📖 Read
via "Tech Republic".
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.📖 Read
via "Tech Republic".
TechRepublic
Open-source developers say securing their code is a soul-withering waste of time
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌
📖 Read
via "Threat Post".
Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.📖 Read
via "Threat Post".
Threat Post
COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware
Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.
🦿 How ID fraud has surged in the wake of COVID-19 🦿
📖 Read
via "Tech Republic".
Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.📖 Read
via "Tech Republic".
TechRepublic
How ID fraud has surged in the wake of COVID-19
Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.
‼ CVE-2020-23520 ‼
📖 Read
via "National Vulnerability Database".
imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.📖 Read
via "National Vulnerability Database".
🦿 Phishing emails: More than 25% of American workers fall for them 🦿
📖 Read
via "Tech Republic".
A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.📖 Read
via "Tech Republic".
TechRepublic
Phishing emails: More than 25% of American workers fall for them
A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.
🕴 The Holiday Shopping Season: A Prime Opportunity for Triangulation Fraud 🕴
📖 Read
via "Dark Reading".
As e-commerce sales increase, so does the risk of hard-to-detect online fraud.📖 Read
via "Dark Reading".
Dark Reading
The Holiday Shopping Season: A Prime Opportunity for Triangulation Fraud
As e-commerce sales increase, so does the risk of hard-to-detect online fraud.
‼ CVE-2020-26832 ‼
📖 Read
via "National Vulnerability Database".
SAP AS ABAP (SAP Landscape Transformation), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA (SAP Landscape Transformation), versions - 101, 102, 103, 104, 105, allows a high privileged user to execute a RFC function module to which access should be restricted, however due to missing authorization an attacker can get access to some sensitive internal information of vulnerable SAP system or to make vulnerable SAP systems completely unavailable.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17528 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26831 ‼
📖 Read
via "National Vulnerability Database".
SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request Forgery (SSRF) and denial-of-service (DoS).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26816 ‼
📖 Read
via "National Vulnerability Database".
SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17529 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26837 ‼
📖 Read
via "National Vulnerability Database".
SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-2020 ‼
📖 Read
via "National Vulnerability Database".
An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29660 ‼
📖 Read
via "National Vulnerability Database".
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26261 ‼
📖 Read
via "National Vulnerability Database".
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15📖 Read
via "National Vulnerability Database".