π¦Ώ These Microsoft tools help you reduce, remove or lock down admin access to improve security π¦Ώ
π Read
via "Tech Republic".
The SolarWinds compromise means you can no longer put off privileged account management.π Read
via "Tech Republic".
TechRepublic
These Microsoft tools help you reduce, remove or lock down admin access to improve security
The SolarWinds compromise means you can no longer put off privileged account management.
π¦Ώ Bosses are using monitoring software to keep tabs on working at home. Privacy rules aren't keeping up π¦Ώ
π Read
via "Tech Republic".
Worker's union Prospect warned that the UK was at risk of 'sleepwalking into a world of surveillance' as more businesses turn to digital tools to keep tabs on remote workers.π Read
via "Tech Republic".
TechRepublic
Bosses are using monitoring software to keep tabs on working at home. Privacy rules aren't keeping up
Professionals union Prospect warned that the UK was at risk of 'sleepwalking into a world of surveillance' as more businesses turn to digital tools to keep tabs on remote workers.
β Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attacks β
π Read
via "Threat Post".
Netscout researchers identify more than 14,000 existing servers that can be abused by βthe general attack populationβ to flood organizationsβ networks with traffic.π Read
via "Threat Post".
Threat Post
Threat Actors Can Exploit Windows RDP Servers to Amplify DDoS Attacks
Netscout researchers identify more than 14,000 existing servers that can be abused by βthe general attack populationβ to flood organizationsβ networks with traffic.
β US administration adds βsubliminalβ ad to White House website β
π Read
via "Naked Security".
Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!π Read
via "Naked Security".
Naked Security
US administration adds βsubliminalβ ad to White House website
Hiding digital βsecretsβ where theyβre supposed to be found is good fun. Just donβt hide actual secrets and hope no one will notice!
π¦Ώ The new Microsoft Edge browser will warn you if your password has been leaked online π¦Ώ
π Read
via "Tech Republic".
The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.π Read
via "Tech Republic".
TechRepublic
The new Microsoft Edge browser will warn you if your password has been leaked online
The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web.
π΄ Why North Korea Excels in Cybercrime π΄
π Read
via "Dark Reading".
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.π Read
via "Dark Reading".
Dark Reading
Why North Korea Excels in Cybercrime
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.
π Friday Five 1/22 π
π Read
via "Digital Guardian".
Copycats, searchable phishing campaigns, and cybersecurity policy in the new administration - catch up on all of the week's infosec news with the Friday Five!π Read
via "Digital Guardian".
Digital Guardian
Friday Five 1/22
Copycats, searchable phishing campaigns, and cybersecurity policy in the new administration - catch up on all of the week's infosec news with the Friday Five!
βΌ CVE-2020-28488 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package jquery-ui; all versions of package org.fujion.webjars:jquery-ui. When the "dialog" is injected into an HTML tag more than once, the browser and the application may crash.π Read
via "National Vulnerability Database".
β Ransomware Attackers Publish 4K Private Scottish Gov Agency Files β
π Read
via "Threat Post".
Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve.π Read
via "Threat Post".
Threat Post
Ransomware Attackers Publish 4K Private Scottish Gov Agency Files
Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve.
β Discord-Stealing Malware Invades npm Packages β
π Read
via "Threat Post".
The CursedGrabber malware has infiltrated the open-source software code repository.π Read
via "Threat Post".
Threat Post
Discord-Stealing Malware Invades npm Packages
The CursedGrabber malware has infiltrated the open-source software code repository.
β ADT Tech Hacks Home-Security Cameras to Spy on Women β
π Read
via "Threat Post".
A former ADT employee pleads guilty of accessing customersβ cameras so he could spy on them.π Read
via "Threat Post".
Threat Post
ADT Tech Hacks Home-Security Cameras to Spy on Women
A former ADT employee pleads guilty of accessing customersβ cameras so he could spy on them.
βΌ CVE-2021-21259 βΌ
π Read
via "National Vulnerability Database".
HedgeDoc is open source software which lets you create real-time collaborative markdown notes. In HedgeDoc before version 1.7.2, an attacker can inject arbitrary JavaScript into a HedgeDoc note, which is executed when the note is viewed in slide mode. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.2. ### Workarounds Disallow loading JavaScript from 3rd party sites using the `Content-Security-Policy` header. Note that this will break some embedded content. ### References This issue was discovered by @TobiasHoll and reported to hackmdio/codimd: https://github.com/hackmdio/codimd/issues/1648 ### For more information If you have any questions or comments about this advisory: * Open an topic on our community forum * Join our matrix roomπ Read
via "National Vulnerability Database".
βΌ CVE-2021-21270 βΌ
π Read
via "National Vulnerability Database".
OctopusDSC is a PowerShell module with DSC resources that can be used to install and configure an Octopus Deploy Server and Tentacle agent. In OctopusDSC version 4.0.977 and earlier a customer API key used to connect to Octopus Server is exposed via logging in plaintext. This vulnerability is patched in version 4.0.1002.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21260 βΌ
π Read
via "National Vulnerability Database".
Online Invoicing System (OIS) is open source software which is a lean invoicing system for small businesses, consultants and freelancers created using AppGini. In OIS version 4.0 there is a stored XSS which can enables an attacker takeover of the admin account through a payload that extracts a csrf token and sends a request to change password. It has been found that Item description is reflected without sanitization in app/items_view.php which enables the malicious scenario.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28487 βΌ
π Read
via "National Vulnerability Database".
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4766 βΌ
π Read
via "National Vulnerability Database".
IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cause a denial of service by sending malformed MQ data requests which would consume all available resources. IBM X-Force ID: 188093.π Read
via "National Vulnerability Database".
π¦Ώ Expert: Manpower is a huge cybersecurity issue in 2021 π¦Ώ
π Read
via "Tech Republic".
Changing threats, volume of threats, and ransomware plague organizations. Having some autonomous AI tools to help pros do their jobs can help.π Read
via "Tech Republic".
TechRepublic
Expert: Manpower is a huge cybersecurity issue in 2021
Changing threats, volume of threats, and ransomware plague organizations. Having some autonomous AI tools to help pros do their jobs can help.
π¦Ώ Cybersecurity pros can't handle all the threat tasks alone, expert says π¦Ώ
π Read
via "Tech Republic".
Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.π Read
via "Tech Republic".
TechRepublic
Cybersecurity pros can't handle all the threat tasks alone, expert says
Having an AI tool to help can ease the burden on cybersecurity teams, which are struggling to keep up with constant and more serious threats.
π¦Ώ Cybersecurity: Blaming users is not the answer π¦Ώ
π Read
via "Tech Republic".
A punitive approach toward employees reporting data breaches intensifies problems.π Read
via "Tech Republic".
TechRepublic
Cybersecurity: Blaming users is not the answer
A punitive approach toward employees reporting data breaches intensifies problems.
βΌ CVE-2020-12514 βΌ
π Read
via "National Vulnerability Database".
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoverydπ Read
via "National Vulnerability Database".
βΌ CVE-2020-12513 βΌ
π Read
via "National Vulnerability Database".
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.π Read
via "National Vulnerability Database".