πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-17513 β€Ό

In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.

πŸ“– Read

via "National Vulnerability Database".
🦿 Cybersecurity experts hail new IoT law 🦿

The bill would increase protection for the billions of connected devices "owned or controlled by the government" in homes and businesses.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Startups Should Do Things That Don't Scale, but Security Isn't One of Them πŸ•΄

Emerging businesses that don't embrace scalable security do so at their own peril.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-29227 β€Ό

An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Sifter 11-R3 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
πŸ›  WhatWeb Scanner 0.5.4 πŸ› 

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

πŸ“– Read

via "Packet Storm Security".
❌ New Windows Trojan Steals Browser Credentials, Outlook Files ❌

The newly discovered Python-based malware family targets the Outlook processes, and browser credentials, of Microsoft Windows victims.

πŸ“– Read

via "Threat Post".
🦿 US government agencies compromised by foreign nation-state 🦿

Stretching back for months, the breaches were pulled off by exploiting a vulnerability in network monitoring software from SolarWinds, according to security firm FireEye.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-35382 β€Ό

SQL Injection in Classbooking before 2.4.1 via the username field of a CSV file when adding a new user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14244 β€Ό

A vulnerability in the MIME message handling of the Domino server (versions 9 and 10) could potentially be exploited by an unauthenticated attacker resulting in a stack buffer overflow. This could allow a remote attacker to crash the server or inject code into the system which would execute with the privileges of the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35378 β€Ό

SQL Injection in the login page in Online Bus Ticket Reservation 1.0 allows attackers to execute arbitrary SQL commands and bypass authentication via the username and password fields.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14268 β€Ό

A vulnerability in the MIME message handling of the Notes client (versions 9 and 10) could potentially be exploited by an unauthenticated attacker resulting in a stack buffer overflow. This could allow a remote attacker to crash the client or inject code into the system which would execute with the privileges of the client.

πŸ“– Read

via "National Vulnerability Database".
πŸ” SolarWinds Hacked, Used in Potentially Massive Supply Chain Attack πŸ”

A global intrusion campaign involving the company’s IT monitoring and management software could date back to March.

πŸ“– Read

via "Digital Guardian".
πŸ•΄ 2021 Security Budgets: Top Priorities, New Realities πŸ•΄

An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies. What's on the horizon? They share with us their spending plans for 2021.

πŸ“– Read

via "Dark Reading".
❌ Microsoft Office 365 Credentials Under Attack By Fax β€˜Alert’ Emails ❌

Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with the aim of stealing their O365 credentials.

πŸ“– Read

via "Threat Post".
❌ DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report ❌

The attack was mounted via SolarWinds Orion, in a manual and targeted supply-chain effort.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-25179 β€Ό

GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35338 β€Ό

The Web Administrative Interface in Mobile Viewpoint Wireless Multiplex Terminal (WMT) Playout Server 20.2.8 and earlier has a default account with a password of "pokon."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25175 β€Ό

GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15733 β€Ό

An Origin Validation Error vulnerability in the SafePay component of Bitdefender Antivirus Plus allows a web resource to misrepresent itself in the URL bar. This issue affects: Bitdefender Antivirus Plus versions prior to 25.0.7.29.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28856 β€Ό

OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly determine the HTTP request's originating IP address, allowing attackers to spoof it using X-Forwarded-For in the header, by supplying localhost address such as 127.0.0.1, effectively bypassing all IP address based access controls.

πŸ“– Read

via "National Vulnerability Database".