πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❔ CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild ❔

Estimated reading time: 1 minuteThe recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation of this vulnerability could run arbitrary code in the security context of the local system. About the vulnerability CVE-2018-8440 is a local privilege escalation vulnerability in the Windows Task Scheduler’s Advanced Local Procedure Call (ALPC) interface. The ALPC endpoint in Windows task scheduler exports the SchRpcSetSecurity function, which allows us to set an arbitrary DACL without checking permissions. Exploiting the vulnerability ultimately allows a local unprivileged user to change the permissions of any file on the system. The exploit code release was announced on twitter, on 27th August 2018, by a security researcher who goes with the handle β€œSandboxEscaper”.  Within days, PowerPool malware was found using the exploit to infect users. Vulnerable versions Windows 7 Windows 8.1 Windows 10 Windows Server 2008, 2012 and 2016 Quick Heal detection Quick Heal has released the following detection for the vulnerability CVE-2018-8440: Trojan.Win64 Trojan.IGeneric Quick Heal Security Labs is actively looking for new in-the-wild exploits for this vulnerability and ensuring coverage for them. References https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8440 Subject Matter Experts Sameer Patil | Quick Heal Security Labs The post CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

πŸ“– Read

via "Quick Heal Blog | Latest computer security news, tips, and advice".
πŸ” Awful military and government LinkedIn passwords highlight need for 2FA, new policies πŸ”

Password inadequacy remains a top threat in internet security, according to a new report from WatchGuard Technologies.

πŸ“– Read

via "Security on TechRepublic".
πŸ” BlackBerry's ambitious target: Protecting everything from smartphones to cities πŸ”

BlackBerry Security Summit London: CEO John Chen details how the company wants to harness machine learning and AI.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 8 Cryptomining Malware Families to Keep on the Radar πŸ•΄

Cryptojacking attacks at the hands of cryptomining malware is on the rise as these variants of Trojans, worms, and exploit kits make their rounds.

πŸ“– Read

via "Dark Reading: ".
❌ Osiris Banking Trojan Displays Modern Malware Innovation ❌

Osiris’ fundamental makeup positions it in the fore of malware trends, despite being based on old source code that’s been knocking around for years.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Apple Yet to Patch Safari Browser Address Bar Spoofing Flaw ❌

A flaw in Safari - that allows an attacker to spoof websites and trick victims into handing over their credentials - has yet to be patched.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Mobile Attack Rates Up 24% Globally, 44% in US πŸ•΄

One-third of all fraud targets are mobile, a growing source of all digital transactions.

πŸ“– Read

via "Dark Reading: ".
πŸ” Use Android Pie lockdown mode πŸ”

Jack Wallen activates and enables Android Pie's new lockdown mode.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 4 Trends Giving CISOs Sleepless Nights πŸ•΄

IoT attacks, budget shortfalls, and the skills gap are among the problems keeping security pros up at night.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ New Study Details Business Benefits of Biometrics πŸ•΄

Biometric authentication can be good for security and for business, according to a new study from Goode Intelligence

πŸ“– Read

via "Dark Reading: ".
❌ PowerShell Obfuscation Ups the Ante on Antivirus ❌

The development fits a trend that sees threat actors turning to well-known, commodity malware, overcoming its easy detection with ever-better obfuscation methods.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Creators of Tools for Building Malicious Office Docs Ditch Old Exploits πŸ•΄

In their place is a collection of new exploits for more recently disclosed - and therefore not likely widely patched - vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Malware Campaign Targeting Jaxx Wallet Holders Shut Down πŸ•΄

A site spoofing the official Jaxx website was discovered packing several infections for Windows and Mac machines, and has been shut down.

πŸ“– Read

via "Dark Reading: ".
πŸ” Facebook data privacy scandal: A cheat sheet πŸ”

Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Modular Malware Brings Stealthy Attacks to Former Soviet States πŸ•΄

A new malware technique is making phishing attacks harder to spot when they succeed.

πŸ“– Read

via "Dark Reading: ".
⚠ Update now! Microsoft’s September 2018 Patch Tuesday is here ⚠

September’s Patch Tuesday is upon Windows users - 61 CVEs, 17 flaws rated as critical, a zero-day and a flaw affecting Adobe Flash Player.

πŸ“– Read

via "Naked Security".
⚠ California bill regulates IoT for first time in US ⚠

California looks set to regulate IoT devices, becoming the first US state to do so and beating the Federal Government to the post.

πŸ“– Read

via "Naked Security".
❌ Experts Bemoan Shortcomings with IoT Security Bill ❌

The infosec community say California's IoT security bill is "nice," but doesn't hit on the important issues.

πŸ“– Read

via "The first stop for security news | Threatpost ".
⚠ Street gang members indicted for stealing POS terminals ⚠

...and using the credit card terminals to allegedly issue themselves fraudulent returns and to steal taxpayer IDs and bank info.

πŸ“– Read

via "Naked Security".
⚠ Veeam leaves MongoDB database wide open, exposes 445m records ⚠

The data-management firm's customer database held names, email addresses, some IP addresses and more: a wealth of ammo for phishers.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Increasingly Vulnerable Software Supply Chain πŸ•΄

Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.

πŸ“– Read

via "Dark Reading: ".