πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ XDR 101: What's the Big Deal About Extended Detection & Response? πŸ•΄

Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?

πŸ“– Read

via "Dark Reading".
🦿 How using tactical literacy makes it harder for cybercriminals to fool end users 🦿

End users just want to do their job, not become cybersecurity experts. When providing users with cybersecurity help, keep these tips in mind.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-35491 β€Ό

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4845 (security_key_lifecycle_manager) β€Ό

IBM Security Key Lifecycle Manager 3.0.1 and 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190289.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35489 β€Ό

The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows Unrestricted File Upload and remote code execution because a filename may contain special characters.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35545 β€Ό

Time-based SQL injection exists in Spotweb 1.4.9 via the query string.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35490 β€Ό

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26276 β€Ό

Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4846 (security_key_lifecycle_manager) β€Ό

IBM Security Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190290.

πŸ“– Read

via "National Vulnerability Database".
❌ Nuclear Weapons Agency Hacked in Widening Cyberattack – Report ❌

Sources said the DoE suffered "damage" in the attack, which also likely extends beyond the initially known SolarWinds Orion attack vector.

πŸ“– Read

via "Threat Post".
❌ How to Increase Your Security Posture with Fewer Resources ❌

Plixer's Justin Jett, Compliance & Audit director, discusses how to do more with less when your security resources are thin.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-8465 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8464 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product's admin interface to users who would not normally have access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8463 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8466 β€Ό

A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8462 β€Ό

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27010 β€Ό

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8461 β€Ό

A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.

πŸ“– Read

via "National Vulnerability Database".
⚠ β€œIs it you in the video?” – don’t fall for this Messenger scam ⚠

If a friend asks "is it you in the video", don't be in hurry to find out!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-12521 β€Ό

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13509 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) Using the IRP 0x9c4060cc gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability and this access could allow for information leakage of sensitive data.

πŸ“– Read

via "National Vulnerability Database".