🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 CISA: SolarWinds Not the Only Initial Attack Vector in Massive Breach 🕴

Agency says it has "evidence of additional initial access vectors" besides SolarWinds' Orion software.

📖 Read

via "Dark Reading".
🦿 How to quickly encrypt text for Apple Mail 🦿

Jack Wallen shows you how easy it can be to encrypt text to be sent via email, using Apple Mail and the GPG Suite.

📖 Read

via "Tech Republic".
RubyGems Packages Laced with Bitcoin-Stealing Malware

Two malicious software building blocks that could be baked into web applications prey on unsuspecting users.

📖 Read

via "Threat Post".
Air-Gap Attack Turns Memory Modules into Wi-Fi Radios

Attack turns SDRAM buses into a Wi-Fi radio to leak data from air-gapped computers.

📖 Read

via "Threat Post".
CVE-2020-15292

Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations.

📖 Read

via "National Vulnerability Database".
CVE-2020-15294

Compiler Optimization Removal or Modification of Security-critical Code vulnerability in IntPeParseUnwindData() results in multiple dereferences to the same pointer. If the pointer is located in memory-mapped from the guest space, this may cause a race-condition where the generated code would dereference the same address twice, thus obtaining different values, which may lead to arbitrary code execution. This issue affects: Bitdefender Hypervisor Introspection versions prior to 1.132.2.

📖 Read

via "National Vulnerability Database".
CVE-2020-15293

Memory corruption in IntLixCrashDumpDmesg, IntLixTaskFetchCmdLine, IntLixFileReadDentry and IntLixFileGetPath due to insufficient guest-data input validation may lead to denial of service conditions.

📖 Read

via "National Vulnerability Database".
Police Vouch for Hacker Who Guessed Trump’s Twitter Password

No charges for Dutch ethical hacker Victor Gevers who prosecutors say did actually access Trump’s Twitter account by guessing his password, “MAGA2020!” last October.

📖 Read

via "Threat Post".
🕴 XDR 101: What's the Big Deal About Extended Detection & Response? 🕴

Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?

📖 Read

via "Dark Reading".
🦿 How using tactical literacy makes it harder for cybercriminals to fool end users 🦿

End users just want to do their job, not become cybersecurity experts. When providing users with cybersecurity help, keep these tips in mind.

📖 Read

via "Tech Republic".
CVE-2020-35491

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.

📖 Read

via "National Vulnerability Database".
CVE-2020-4845 (security_key_lifecycle_manager)

IBM Security Key Lifecycle Manager 3.0.1 and 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190289.

📖 Read

via "National Vulnerability Database".
CVE-2020-35489

The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows Unrestricted File Upload and remote code execution because a filename may contain special characters.

📖 Read

via "National Vulnerability Database".
CVE-2020-35545

Time-based SQL injection exists in Spotweb 1.4.9 via the query string.

📖 Read

via "National Vulnerability Database".
CVE-2020-35490

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.

📖 Read

via "National Vulnerability Database".
CVE-2020-26276

Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.

📖 Read

via "National Vulnerability Database".
CVE-2020-4846 (security_key_lifecycle_manager)

IBM Security Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190290.

📖 Read

via "National Vulnerability Database".
Nuclear Weapons Agency Hacked in Widening Cyberattack – Report

Sources said the DoE suffered "damage" in the attack, which also likely extends beyond the initially known SolarWinds Orion attack vector.

📖 Read

via "Threat Post".
How to Increase Your Security Posture with Fewer Resources

Plixer's Justin Jett, Compliance & Audit director, discusses how to do more with less when your security resources are thin.

📖 Read

via "Threat Post".
CVE-2020-8465

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.

📖 Read

via "National Vulnerability Database".
CVE-2020-8464

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product's admin interface to users who would not normally have access.

📖 Read

via "National Vulnerability Database".