πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Federal Photos Filched in Contractor Breach πŸ•΄

Data should never have been on subcontractor's servers, says Customs and Border Protection.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Cognitive Bias Can Hamper Security Decisions πŸ•΄

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-13718

The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-13717

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

πŸ“– Read

via "National Vulnerability Database".
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
⚠ Researchers crack digital safe using HSM flaw ⚠

French researchers have found a bug in a hardware security module (HSM) that could enable an attacker to steal highly prized secrets.

πŸ“– Read

via "Naked Security".
⚠ It’s a SCAM: Send Bitcoin or your company’s reputation is TOAST! ⚠

"I will insult people. And everyone will not care that it's not you." But it's social-disaster baloney!

πŸ“– Read

via "Naked Security".
⚠ iOS 13 will map the apps that are tracking you ⚠

A map will display the snail-slime trails that we all leave behind in our daily travels and through which background tracking apps follow us.

πŸ“– Read

via "Naked Security".
⚠ Critical flaws found in Amcrest security cameras ⚠

The Amcrest 721 family of security cameras features six security flaws discovered back in 2017 by a researcher at security outfit Synopsys.

πŸ“– Read

via "Naked Security".
❌ Data Breach Exposes 100K U.S. Traveler Photos, License Plates ❌

A recent breach of U.S. Customs and Border Protection traveler photo and license plate data has led experts to condemn the collection and storage of facial recognition data.

πŸ“– Read

via "Threatpost".
πŸ” More than 3B fake emails sent daily as phishing attacks persist πŸ”

Some 140,000 more domains are using DMARC records since the start of 2019, though DMARC-based enforcement remains complex to implement.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Getting Up to Speed on Magecart πŸ•΄

Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.

πŸ“– Read

via "Dark Reading: ".
❌ Troy Hunt Looks to Sell Have I Been Pwned ❌

"Project Svalbard" has commenced, as Hunt looks for the right company to take over the password-focused service.

πŸ“– Read

via "Threatpost".
❌ Critical Adobe Flash, ColdFusion Vulnerabilities Patched ❌

Adobe issued patches for 11 vulnerabilities overall across its Flash, ColdFusion and Campaign products.

πŸ“– Read

via "Threatpost".
❌ Linux Command-Line Editors Vulnerable to High-Severity Bug ❌

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations.

πŸ“– Read

via "Threatpost".
❌ Near-Ubiquitous Critical Microsoft RCE Bugs Affect All Versions of Windows ❌

The two CVEs allow bypasses to get around NTLM relay attack mitigations.

πŸ“– Read

via "Threatpost".
πŸ•΄ FBI Warns of Dangers in 'Safe' Websites πŸ•΄

Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to protect your network against security flaws in Microsoft's NTLM protocol πŸ”

Vulnerabilities in NTLM recently discovered by security provider Preempt could allow attackers to remotely execute malicious code on any Windows machine or authenticate to any web server that supports Windows Integrated Authentication.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ What 3 Powerful GoT Women Teach Us about Cybersecurity πŸ•΄

Imagine Game of Thrones' Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security.

πŸ“– Read

via "Dark Reading: ".
❌ Google Calendar Attacks Target Unwitting Mobile Users ❌

Automatic invite notifications are spreading malicious links.

πŸ“– Read

via "Threatpost".