🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2020-35274

DotCMS Add Template with admin panel 20.11 is affected by cross-site Scripting (XSS) to gain remote privileges. An attacker could compromise the security of a website or web application through a stored XSS attack and stealing cookies using XSS.

📖 Read

via "National Vulnerability Database".
CVE-2020-35276

EgavilanMedia ECM Address Book 1.0 is affected by SQL injection. An attacker can bypass the Admin Login panel through SQLi and get Admin access and add or remove any user.

📖 Read

via "National Vulnerability Database".
CVE-2020-35275

Coastercms v5.8.18 is affected by cross-site Scripting (XSS). A user can steal a cookie and make the user redirect to any malicious website because it is trigged on the main home page of the product/application.

📖 Read

via "National Vulnerability Database".
CVE-2020-35273

EgavilanMedia User Registration & Login System with Admin Panel 1.0 is affected by Cross Site Request Forgery (CSRF) to remotely gain privileges in the User Profile panel. An attacker can update any user's account.

📖 Read

via "National Vulnerability Database".
🕴 7 Infamous Moments in Adobe Flash's Security History 🕴

End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.

📖 Read

via "Dark Reading".
🦿 The 5 tech skills should you master in 2021 🦿

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

📖 Read

via "Tech Republic".
🦿 Top 5 tech skills to master in 2021 🦿

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

📖 Read

via "Tech Republic".
Defending Against State and State-Sponsored Threat Actors

State and state-sponsored threat actors are the apex predators of the cybersecurity world.  

📖 Read

via "Threat Post".
🛠 GNU Privacy Guard 2.2.26 🛠

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

📖 Read

via "Packet Storm Security".
🛠 jSQL Injection 0.82 🛠

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the pre-built jar release.

📖 Read

via "Packet Storm Security".
🛠 jSQL Injection 0.82 Source Code Release 🛠

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

📖 Read

via "Packet Storm Security".
🛠 Wireshark Analyzer 3.4.2 🛠

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

📖 Read

via "Packet Storm Security".
🕴 NSA, CISA Warn of Attacks on Federated Authentication 🕴

While incident responders focus on attacks using SolarWinds Orion, government cyber defenders highlight other methods likely being used as well.

📖 Read

via "Dark Reading".
Smart Doorbell Disaster: Many Brands Vulnerable to Attack

Investigation reveals device sector is problem plagued when it comes to security bugs.

📖 Read

via "Threat Post".
CVE-2020-35604

An XXE attack can occur in Kronos WebTA 5.0.4 when SAML is used.

📖 Read

via "National Vulnerability Database".
CVE-2020-21378

SQL injection vulnerability in SeaCMS 10.1 (2020.02.08) via the id parameter in an edit action to admin_members_group.php.

📖 Read

via "National Vulnerability Database".
CVE-2020-35605

The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message.

📖 Read

via "National Vulnerability Database".
CVE-2020-21377

SQL injection vulnerability in yunyecms V2.0.1 via the selcart parameter.

📖 Read

via "National Vulnerability Database".
CVE-2020-35606

Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.

📖 Read

via "National Vulnerability Database".
Nosy Ex-Partners Armed with Instagram Passwords Pose a Serious Threat

A survey of single people found almost a third are still logging into their ex’s social-media accounts, some for revenge.

📖 Read

via "Threat Post".
🦿 Cybersecurity pros: Are humans really the weakest link? 🦿

Some experts argue that users might actually be the most vital link when it comes to certain types of cyberattacks.

📖 Read

via "Tech Republic".