πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Apple Offers Closer Look at Its Platform Security Technologies, Features πŸ•΄

In a nearly 200-page document, company offers a detailed overview of Secure Enclave and multiple other security controls in Apple silicon-based Macs and other platforms.

πŸ“– Read

via "Dark Reading".
❌ Apple Outlines 2021 Security, Privacy Roadmap ❌

Latest Apple Platform Security update folds iOS, macOS and hardware into security 2021 roadmap.

πŸ“– Read

via "Threat Post".
❌ Cybercriminal Enterprise β€˜Ringleaders’ Stole $55M Via COVID-19 Fraud, Romance Scams ❌

The Department of Justice (DoJ) cracked down on a Ghana-based cybercriminal enterprise behind a slew of romance scams, COVID-19 fraud attacks and business email compromise schemes since 2013.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-35776 β€Ό

A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35591 β€Ό

Pi-hole 5.0, 5.1, and 5.1.1 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35592 β€Ό

Pi-hole 5.0, 5.1, and 5.1.1 allows XSS via the Options header to the admin/ URI. A remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against other users and steal the session cookie.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26717 β€Ό

An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would send both audio and T.38 in the SDP. If this happened, and the remote responded with a declined T.38 stream, then Asterisk would crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3271 β€Ό

PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36233 β€Ό

The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26906 β€Ό

An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CrowdStrike Buys Log Management Startup Humio for $400M πŸ•΄

CrowdStrike plans to use Humio's technology to continue building out its extended detection and response platform.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Concludes Internal Investigation into Solorigate Breach πŸ•΄

The software giant found no evidence that attackers gained extensive access to services or customer data.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-26747 β€Ό

Netis WF2780 2.3.40404 and WF2411 1.1.29629 devices allow Shell Metacharacter Injection into the ping command, leading to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26712 β€Ό

Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep20: Corporate megahacking, true love gone bad, and tax grabs [Podcast] ⚠

Latest episode, listen now! (Includes special gardening safety section at no extra charge!)

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-36247 β€Ό

Open OnDemand before 1.5.7 and 1.6.x before 1.6.22 allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36251 β€Ό

ownCloud Server before 10.3.0 allows an attacker, who has received non-administrative access to a group share, to remove everyone else's access to that share.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36249 β€Ό

The File Firewall before 2.8.0 for ownCloud Server does not properly enforce file-type restrictions for public shares.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24908 β€Ό

Checkmk before 1.6.0p17 allows local users to obtain SYSTEM privileges via a Trojan horse shell script in the %PROGRAMDATA%\checkmk\agent\local directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26296 β€Ό

In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36250 β€Ό

In the ownCloud application before 2.15 for Android, the lock protection mechanism can be bypassed by moving the system date/time into the past.

πŸ“– Read

via "National Vulnerability Database".