πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-26260 β€Ό

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26828 β€Ό

SAP Disclosure Management, version - 10.1, provides capabilities for authorized users to upload and download content of specific file type. In some file types it is possible to enter formulas which can call external applications or execute scripts. The execution of a payload (script) on target machine could be used to steal and modify the data available in the spreadsheet

πŸ“– Read

via "National Vulnerability Database".
πŸ” 50 Cloud-Based Security Selection Tips πŸ”

With more and more companies making the move to the cloud, security remains an utmost concern. Reviewing a cloud security solution? Ask yourself these 50 questions.

πŸ“– Read

via "Digital Guardian".
❌ SideWinder APT Targets Nepal, Afghanistan in Wide-Ranging Spy Campaign ❌

Convincing email-credentials phishing, emailed backdoors and mobile apps are all part of the groups latest effort against military and government targets.

πŸ“– Read

via "Threat Post".
πŸ•΄ Former Microsoft Cloud Security Leads Unveil New Startup πŸ•΄

Wiz has raised $100 million since its January launch and plans to help businesses with visibility into cloud security threats.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Vulnerabilities Continue Around 2019 Pace πŸ•΄

After lagging 2019 numbers in the first quarter, vulnerabilities have surged in the rest of 2020, leading researchers to predict that final numbers for this year will meet or exceed those of last year, report says.

πŸ“– Read

via "Dark Reading".
❌ Record Levels of Software Bugs Plague Short-Staffed IT Teams in 2020 ❌

As just one symptom, 83 percent of the Top 30 U.S. retailers have vulnerabilities which pose an β€œimminent” cyber-threat, including Amazon, Costco, Kroger and Walmart.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-28086 β€Ό

pass through 1.7.3 has a possibility of using a password for an unintended resource. For exploitation to occur, the user must do a git pull, decrypt a password, and log into a remote service with the password. If an attacker controls the central Git server or one of the other members' machines, and also controls one of the services already in the password store, they can rename one of the password files in the Git repository to something else: pass doesn't correctly verify that the content of a file matches the filename, so a user might be tricked into decrypting the wrong password and sending that to a service that the attacker controls. NOTE: for environments in which this threat model is of concern, signing commits can be a solution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26257 β€Ό

Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a reference "homeserver" implementation of Matrix. A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. The Matrix Synapse reference implementation before version 1.23.1 the implementation is vulnerable to this injection attack. Issue is fixed in version 1.23.1. As a workaround homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 10 Ways Device Identifiers Can Spot a Cybercriminal πŸ•΄

Device IDs, which are assigned to mobile devices to distinguish one from another, can help organizations flag fraud, cyberattacks, and other suspicious activities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Security Incidents Are 'Tip of the Iceberg,' Says UK Security Official πŸ•΄

Pete Cooper, deputy director of cyber defense for the UK Cabinet Office, emphasized the importance of security fundamentals, collaboration, and diversity in his Black Hat Europe keynote talk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ransomware Makes Up Half of All Major Incidents πŸ•΄

Misconfigurations and lack of visibility allow attackers to compromise networks and monetize their intrusions, according to CrowdStrike's analysis of about 200 incidents.

πŸ“– Read

via "Dark Reading".
❌ SideWinder APT Targets Nepal, Afghanistan in Wide-Ranging Spy Campaign ❌

Convincing email-credentials phishing, emailed backdoors and mobile apps are all part of the groups latest effort against military and government targets.

πŸ“– Read

via "Threat Post".
πŸ•΄ Former Microsoft Cloud Security Leads Unveil New Startup πŸ•΄

Wiz has raised $100 million since its January launch and plans to help businesses with visibility into cloud security threats.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Vulnerabilities Continue Around 2019 Pace πŸ•΄

After lagging 2019 numbers in the first quarter, vulnerabilities have surged in the rest of 2020, leading researchers to predict that final numbers for this year will meet or exceed those of last year, report says.

πŸ“– Read

via "Dark Reading".
❌ Record Levels of Software Bugs Plague Short-Staffed IT Teams in 2020 ❌

As just one symptom, 83 percent of the Top 30 U.S. retailers have vulnerabilities which pose an β€œimminent” cyber-threat, including Amazon, Costco, Kroger and Walmart.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-28086 β€Ό

pass through 1.7.3 has a possibility of using a password for an unintended resource. For exploitation to occur, the user must do a git pull, decrypt a password, and log into a remote service with the password. If an attacker controls the central Git server or one of the other members' machines, and also controls one of the services already in the password store, they can rename one of the password files in the Git repository to something else: pass doesn't correctly verify that the content of a file matches the filename, so a user might be tricked into decrypting the wrong password and sending that to a service that the attacker controls. NOTE: for environments in which this threat model is of concern, signing commits can be a solution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26257 β€Ό

Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a reference "homeserver" implementation of Matrix. A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. The Matrix Synapse reference implementation before version 1.23.1 the implementation is vulnerable to this injection attack. Issue is fixed in version 1.23.1. As a workaround homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 10 Ways Device Identifiers Can Spot a Cybercriminal πŸ•΄

Device IDs, which are assigned to mobile devices to distinguish one from another, can help organizations flag fraud, cyberattacks, and other suspicious activities.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Security Incidents Are 'Tip of the Iceberg,' Says UK Security Official πŸ•΄

Pete Cooper, deputy director of cyber defense for the UK Cabinet Office, emphasized the importance of security fundamentals, collaboration, and diversity in his Black Hat Europe keynote talk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Ransomware Makes Up Half of All Major Incidents πŸ•΄

Misconfigurations and lack of visibility allow attackers to compromise networks and monetize their intrusions, according to CrowdStrike's analysis of about 200 incidents.

πŸ“– Read

via "Dark Reading".