βΌ CVE-2020-29436 βΌ
π Read
via "National Vulnerability Database".
Sonatype Nexus Repository Manager 3.x before 3.29.0 allows a user with admin privileges to configure the system to gain access to content outside of NXRM via an XXE vulnerability. Fixed in version 3.29.0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35195 βΌ
π Read
via "National Vulnerability Database".
The official haproxy docker images before 1.8.18-alpine (Alpine specific) contain a blank password for a root user. System using the haproxy docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25094 βΌ
π Read
via "National Vulnerability Database".
LogRhythm Platform Manager 7.4.9 allows Command Injection. To exploit this, an attacker can inject arbitrary program names and arguments into a WebSocket. These are forwarded to any remote server with a LogRhythm Smart Response agent installed. By default, the commands are run with LocalSystem privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25010 βΌ
π Read
via "National Vulnerability Database".
An arbitrary code execution vulnerability in Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers Software Version:R0002.P05 allows remote attackers to upload a malicious script file by constructing a POST type request and writing a payload in the request parameters as an instruction to write a file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35188 βΌ
π Read
via "National Vulnerability Database".
The official chronograf docker images before 1.7.7-alpine (Alpine specific) contain a blank password for a root user. System using the chronograf docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25096 βΌ
π Read
via "National Vulnerability Database".
LogRhythm Platform Manager (PM) 7.4.9 has Incorrect Access Control. Users within LogRhythm can be delegated different roles and privileges, intended to limit what data and services they can interact with. However, no access control is enforced for WebSocket-based communication to the PM application server, which will forward requests to any configured back-end server, regardless of whether the user's access rights should permit this. As a result, even the most low-privileged user can interact with any back-end component that has a LogRhythm agent installed.π Read
via "National Vulnerability Database".
π¦Ώ Phone scammers were able to get 270% more personal information in 2020 than in 2019 π¦Ώ
π Read
via "Tech Republic".
The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.π Read
via "Tech Republic".
TechRepublic
Phone scammers were able to get 270% more personal information in 2020 than in 2019
The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.
β S3 Ep11: DIY phishes, sandwich scams and vaccine hacking [Podcast] β
π Read
via "Naked Security".
Here's the latest podcast - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep11: DIY phishes, sandwich scams and vaccine hacking [Podcast]
Hereβs the latest podcast β listen now!
π΄ VPNs, MFA & the Realities of Remote Work π΄
π Read
via "Dark Reading".
The work-from-home-era is accelerating cloud-native service adoption.π Read
via "Dark Reading".
Dark Reading
VPNs, MFA & the Realities of Remote Work
The work-from-home-era is accelerating cloud-native service adoption.
β When zombie malware leads to big-money ransomware attacks β
π Read
via "Naked Security".
SophosLabs investigates SystemBC, a malware utility for launching fileless malware attacks, including big-money ransomware.π Read
via "Naked Security".
Naked Security
When zombie malware leads to big-money ransomware attacks
SophosLabs investigates SystemBC, a malware utility for launching fileless malware attacks, including big-money ransomware.
π¦Ώ How to protect your organization following the SolarWinds compromise π¦Ώ
π Read
via "Tech Republic".
Whether your organization uses the vulnerable SolarWinds software or you want to defend yourself against similar exploits, here are recommendations from four sources.π Read
via "Tech Republic".
TechRepublic
How to protect your organization following the SolarWinds compromise
Whether your organization uses the vulnerable SolarWinds software or you want to defend yourself against similar exploits, here are recommendations from four sources.
β 3M Users Targeted by Malicious Facebook, Insta Browser Add-Ons β
π Read
via "Threat Post".
Researchers identify malware existing in popular add-ons for Facebook, Vimeo, Instagram and others that are commonly used in browsers from Google and Microsoft.π Read
via "Threat Post".
Threat Post
3M Users Targeted by Malicious Facebook, Insta Browser Add-Ons
Researchers identify malware existing in popular add-ons for Facebook, Vimeo, Instagram and others that are commonly used in browsers from Google and Microsoft.
β Code42 Incydr Series: Bringing Shadow IT into the light with Code42 Incydr β
π Read
via "Threat Post".
The massive shift to remote work has turbocharged the shadow IT problem.π Read
via "Threat Post".
Threat Post
Code42 Incydr Series: Bringing Shadow IT into the light with Code42 Incydr
The massive shift to remote work has turbocharged the shadow IT problem.
β Cryptologists Crack Zodiac Killerβs 340 Cipher β
π Read
via "Threat Post".
The Zodiacβs serial killerβs 340 cipher, which couldnβt be solved for 50 years, has been cracked by a remote team of mathematicians.π Read
via "Threat Post".
Threat Post
Cryptologists Crack Zodiac Killerβs 340 Cipher
The Zodiacβs serial killerβs 340 cipher, which couldnβt be solved for 50 years, has been cracked by a remote team of mathematicians.
βΌ CVE-2020-22083 βΌ
π Read
via "National Vulnerability Database".
jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function.π Read
via "National Vulnerability Database".
π¦Ώ The worst bugs in the top programming languages π¦Ώ
π Read
via "Tech Republic".
A heatmap shows PHP has the most flaws followed by C++, then Java, .Net, JavaScript, and Python in Veracode's annual security report.π Read
via "Tech Republic".
TechRepublic
The worst bugs in the top programming languages
A heatmap shows PHP has the most flaws followed by C++, then Java, .Net, JavaScript, and Python in Veracode's annual security report.
π΄ 51% of WFH Parents Say Children Have Accessed Work Accounts π΄
π Read
via "Dark Reading".
In addition, 14% of surveyed parents who are working from home say their children have access to their work devices, new data shows.π Read
via "Dark Reading".
Dark Reading
51% of WFH Parents Say Children Have Accessed Work Accounts
In addition, 14% of surveyed parents who are working from home say their children have access to their work devices, new data shows.
π΄ Rising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond π΄
π Read
via "Dark Reading".
For those who work in the security industry 2020 has been a particularly challenging year. Chris Price talks to five industry leaders from different perspectives in the sector about how they coped with COVID and asks them to look forward to 2021.π Read
via "Dark Reading".
Dark Reading
Rising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond
For those who work in the security industry 2020 has been a particularly challenging year. Chris Price talks to five industry leaders from different perspectives in the sector about how they coped with COVID and asks them to look forward to 2021.
π Zed Attack Proxy 2.10.0 Cross Platform Package π
π Read
via "Packet Storm Security".
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.π Read
via "Packet Storm Security".
Packetstormsecurity
Zed Attack Proxy 2.10.0 Cross Platform Package β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π DoppelPaymer Ransomware Gang Threatening Victims π
π Read
via "Digital Guardian".
In a recent FBI note the agency outlined how DoppelPaymer ransomware attacks have impacted critical infrastructure - and the lengths the attackers have gone to get paid.π Read
via "Digital Guardian".
Digital Guardian
DoppelPaymer Ransomware Gang Threatening Victims
In a recent FBI note the agency outlined how DoppelPaymer ransomware attacks have impacted critical infrastructure - and the lengths the attackers have gone to get paid.
π΄ CISA: SolarWinds Not the Only Initial Attack Vector in Massive Breach π΄
π Read
via "Dark Reading".
Agency says it has "evidence of additional initial access vectors" besides SolarWinds' Orion software.π Read
via "Dark Reading".
Dark Reading
CISA: SolarWinds Not the Only Initial Attack Vector in Massive Breach
Agency says it has evidence of additional initial access vectors besides SolarWinds' Orion software.