π΄ Dow Jones Leak Exposes Watchlist Database π΄
π Read
via "Dark Reading: ".
The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.π Read
via "Dark Reading: ".
Dark Reading
Dow Jones Leak Exposes Watchlist Database
The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone.
ATENTIONβΌ New - CVE-2018-12402
π Read
via "National Vulnerability Database".
The internal WebBrowserPersist code does not use correct origin context for a resource being saved. This manifests when sub-resources are loaded as part of "Save Page As..." functionality. For example, a malicious page could recover a visitor's Windows username and NTLM hash by including resources otherwise unreachable to the malicious page, if they can convince the visitor to save the complete web page. Similarly, SameSite cookies are sent on cross-origin requests when the "Save Page As..." menu item is selected to save a page, which can result in saving the wrong version of resources based on those cookies. This vulnerability affects Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12401
π Read
via "National Vulnerability Database".
Some special resource URIs will cause a non-exploitable crash if loaded with optional parameters following a '?' in the parsed string. This could lead to denial of service (DOS) attacks. This vulnerability affects Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12400
π Read
via "National Vulnerability Database".
In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12399
π Read
via "National Vulnerability Database".
When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12398
π Read
via "National Vulnerability Database".
By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12397
π Read
via "National Vulnerability Database".
A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12396
π Read
via "National Vulnerability Database".
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12395
π Read
via "National Vulnerability Database".
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12393
π Read
via "National Vulnerability Database".
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12392
π Read
via "National Vulnerability Database".
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12391
π Read
via "National Vulnerability Database".
During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12390
π Read
via "National Vulnerability Database".
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12389
π Read
via "National Vulnerability Database".
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-12388
π Read
via "National Vulnerability Database".
Mozilla developers and community members reported memory safety bugs present in Firefox 62. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63.π Read
via "National Vulnerability Database".
π΄ Solving Security: Repetition or Redundancy? π΄
π Read
via "Dark Reading: ".
To effectively defend against today's risks and threats, organizations must examine their failings as well as their successes.π Read
via "Dark Reading: ".
Dark Reading
Solving Security: Repetition or Redundancy?
To effectively defend against today's risks and threats, organizations must examine their failings as well as their successes.
π΄ Turkish Group Using Phishing Emails to Hijack Popular Instagram Profiles π΄
π Read
via "Dark Reading: ".
In some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says.π Read
via "Dark Reading: ".
Darkreading
Turkish Group Using Phishing Emails to Hijack Popular Instagram Profiles
In some cases, attackers have demanded ransom, nude photos/videos of victims in exchange for stolen account, Trend Micro says.
β The βMomo challengeβ β why itβs time to stop the hype [VIDEO] β
π Read
via "Naked Security".
What's the real deal with the "Momo challenge"?π Read
via "Naked Security".
Naked Security
The βMomo challengeβ β why itβs time to stop the hype [VIDEO]
Whatβs the real deal with the βMomo challengeβ?
π Using your Office 365 Secure Score π
π Read
via "Security on TechRepublic".
Office 365, Microsoft 365 and the Security Graph are coming together at last.π Read
via "Security on TechRepublic".
β Dow Jones Watchlist of risky businesses exposed on public server β
π Read
via "Naked Security".
A company with access to the Dow Jones Watchlist of risky people and businesses left it on a public AWS server without a password.π Read
via "Naked Security".
Naked Security
Dow Jones Watchlist of risky businesses exposed on public server
A company with access to the Dow Jones Watchlist of risky people and businesses left it on a public AWS server without a password.
β Disgruntled dev blames crypto-wallet for losing cryptocoins β
π Read
via "Naked Security".
Warith Al Maawali is blaming wallet vendor Coinomi for the loss of $65,000 in bitcoin. Coinomi countered by blaming him for blackmail.π Read
via "Naked Security".
Naked Security
Disgruntled dev blames crypto-wallet for losing cryptocoins
Warith Al Maawali is blaming wallet vendor Coinomi for the loss of $65,000 in bitcoin. Coinomi countered by blaming him for blackmail.