πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-0348 β€Ό

In vpu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05349201.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25245 β€Ό

An improper access control vulnerability in Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain various pieces of settings informaiton.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25243 β€Ό

An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain patch level information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25236 β€Ό

A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro OfficeScan XG SP1 and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a specific sweep.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25239 β€Ό

An improper access control vulnerability in Trend Micro Apex One (on-prem), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about x86 agent hotfixes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0345 β€Ό

In mobile_log_d, there is a possible escalation of privilege due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05432974.

πŸ“– Read

via "National Vulnerability Database".
❌ Android Devices Prone to Botnet’s DDoS Onslaught ❌

A new DDoS botnet propagates via the Android Debug Bridge and uses Tor to hide its activity.

πŸ“– Read

via "Threat Post".
πŸ•΄ Microsoft Says It's Time to Attack Your Machine-Learning Models πŸ•΄

With access to some training data, Microsoft's red team recreated a machine-learning system and found sequences of requests that resulted in a denial-of-service.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Web Application Attacks Grow Reliant on Automated Tools πŸ•΄

Attackers often use automation in fuzzing attacks, injection attacks, fake bots, and application DDoS attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ IBM Offers $3M in Grants to Defend Schools from Cyberattacks πŸ•΄

The grants will be awarded to six school districts in the United States to help prepare for, and respond to, cyberattacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Google's Payout to Bug Hunters Hits New High πŸ•΄

Over 660 researchers from 62 countries collected rewards for reporting bugs in Chrome, Android, and other Google technologies.

πŸ“– Read

via "Dark Reading".
⚠ Chrome zero-day browser bug found β€“ patch now! ⚠

Google is playing its cards close to its chest to avoid giving too much away.

πŸ“– Read

via "Naked Security".
πŸ•΄ AI and APIs: The A+ Answers to Keeping Data Secure and Private πŸ•΄

Many IT and security leaders view regulations and internal processes designed to manage and secure data as additional red tape, slowing processes and innovation. Nothing could be further from the truth.

πŸ“– Read

via "Dark Reading".
πŸ” Friday Five 2/5 πŸ”

Chrome updates, open source frameworks, and an interview with a cybercriminal - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
πŸ•΄ Cybercrime Goes Mainstream πŸ•΄

Organized cybercrime is global in scale and the second-greatest risk over the next decade.

πŸ“– Read

via "Dark Reading".
❌ Ransomware Attacks Hit Major Utilities ❌

Electrobras, the largest power company in Latin America, faced a temporary suspension of some operations.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-26711 β€Ό

A frame-injection issue in the online help in Redwood Report2Web 4.3.4.5 and 4.5.3 allows remote attackers to render an external resource inside a frame via the help/Online_Help/NetHelp/default.htm turl parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36241 β€Ό

autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8807 β€Ό

In Electric Coin Company Zcashd before 2.1.1-1, the time offset between messages could be leveraged to obtain sensitive information about the relationship between a suspected victim's address and an IP address, aka a timing side channel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26708 β€Ό

A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-10538 β€Ό

An issue was discovered in Epikur before 20.1.1. It stores the secret passwords of the users as MD5 hashes in the database. MD5 can be brute-forced efficiently and should not be used for such purposes. Additionally, since no salt is used, rainbow tables can speed up the attack.

πŸ“– Read

via "National Vulnerability Database".