π΄ XDR 101: What's the Big Deal About Extended Detection & Response? π΄
π Read
via "Dark Reading".
Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?π Read
via "Dark Reading".
Dark Reading
XDR 101: What's the Big Deal About Extended Detection & Response?
Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?
π¦Ώ How using tactical literacy makes it harder for cybercriminals to fool end users π¦Ώ
π Read
via "Tech Republic".
End users just want to do their job, not become cybersecurity experts. When providing users with cybersecurity help, keep these tips in mind.π Read
via "Tech Republic".
TechRepublic
How using tactical literacy makes it harder for cybercriminals to fool end users
End users just want to do their job, not become cybersecurity experts. When providing users with cybersecurity help, keep these tips in mind.
βΌ CVE-2020-35491 βΌ
π Read
via "National Vulnerability Database".
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4845 (security_key_lifecycle_manager) βΌ
π Read
via "National Vulnerability Database".
IBM Security Key Lifecycle Manager 3.0.1 and 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190289.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35489 βΌ
π Read
via "National Vulnerability Database".
The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows Unrestricted File Upload and remote code execution because a filename may contain special characters.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35545 βΌ
π Read
via "National Vulnerability Database".
Time-based SQL injection exists in Spotweb 1.4.9 via the query string.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35490 βΌ
π Read
via "National Vulnerability Database".
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26276 βΌ
π Read
via "National Vulnerability Database".
Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4846 (security_key_lifecycle_manager) βΌ
π Read
via "National Vulnerability Database".
IBM Security Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190290.π Read
via "National Vulnerability Database".
β Nuclear Weapons Agency Hacked in Widening Cyberattack β Report β
π Read
via "Threat Post".
Sources said the DoE suffered "damage" in the attack, which also likely extends beyond the initially known SolarWinds Orion attack vector.π Read
via "Threat Post".
Threat Post
Nuclear Weapons Agency Hacked in Widening Cyberattack
The DoE suffered "damage" in the attack, which also likely extends beyond the initially known SolarWinds Orion attack vector.
β How to Increase Your Security Posture with Fewer Resources β
π Read
via "Threat Post".
Plixer's Justin Jett, Compliance & Audit director, discusses how to do more with less when your security resources are thin.π Read
via "Threat Post".
Threat Post
How to Increase Your Security Posture with Fewer Resources
Plixer's Justin Jett, Compliance & Audit director, discusses how to prioritize when your security resources are thin.
βΌ CVE-2020-8465 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8464 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product's admin interface to users who would not normally have access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8463 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8466 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8462 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27010 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8461 βΌ
π Read
via "National Vulnerability Database".
A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.π Read
via "National Vulnerability Database".
β βIs it you in the video?β β donβt fall for this Messenger scam β
π Read
via "Naked Security".
If a friend asks "is it you in the video", don't be in hurry to find out!π Read
via "Naked Security".
Naked Security
βIs it you in the video?β β donβt fall for this Messenger scam
If a friend asks βis it you in the videoβ, donβt be in hurry to find out!
βΌ CVE-2020-12521 βΌ
π Read
via "National Vulnerability Database".
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13509 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) Using the IRP 0x9c4060cc gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability and this access could allow for information leakage of sensitive data.π Read
via "National Vulnerability Database".