πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-10720

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the desktop application used to connect to the device suffers from a stack overflow if more than 26 characters are passed to it as the Wi-Fi name. This application is installed on the device and an attacker who can provide the right payload can execute code on the user's system directly. Any breach of this system can allow an attacker to get access to all the data that the user has access too. The application uses a dynamic link library(DLL) called "avilib.dll" which is used by the application to send binary packets to the device that allow to control the device. One such action that the DLL provides is change password in the function "sendchangename" which allows a user to change the Wi-Fi name on the device. This function calls a sub function "sub_75876EA0" at address 0x758784F8. The function determines which action to execute based on the parameters sent to it. The "sendchangename" passes the datastring as the second argument which is the name we enter in the textbox and integer 1 as first argument. The rest of the 3 arguments are set to 0. The function "sub_75876EA0" at address 0x75876F19 uses the first argument received and to determine which block to jump to. Since the argument passed is 1, it jumps to 0x75876F20 and proceeds from there to address 0x75876F56 which calculates the length of the data string passed as the first parameter. This length and the first argument are then passed to the address 0x75877001 which calls the memmove function which uses a stack address as the destination where the password typed by us is passed as the source and length calculated above is passed as the number of bytes to copy which leads to a stack overflow.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-10719

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that the device has default Wi-Fi credentials that are exactly the same for every device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-10718

Recently it was discovered as a part of the research on IoT devices in the most recent firmware for Shekar Endoscope that any malicious user connecting to the device can change the default SSID and password thereby denying the owner an access to his/her own device. This device acts as an Endoscope camera that allows its users to use it in various industrial systems and settings, car garages, and also in some cases in the medical clinics to get access to areas that are difficult for a human being to reach. Any breach of this system can allow an attacker to get access to video feed and pictures viewed by that user and might allow them to get a foot hold in air gapped networks especially in case of nation critical infrastructure/industries.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How fraudulent domain names are powering phishing attacks πŸ”

Bargain basement gTLDs and glyph attacks using IDNs are powering phishing attacks, with fraudulent registrations on the rise. Worse yet, phishing sites are increasingly getting security certificates.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ How Fraudulent Domains 'Hide in Plain Sight' πŸ•΄

Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links.

πŸ“– Read

via "Dark Reading: ".
⚠ Phishing attack lures victims with encrypted message alert ⚠

Why are phishing emails so enduringly popular with the bad guys? A new approach may suggest that curiosity is at play.

πŸ“– Read

via "Naked Security".
⚠ The US is reportedly seeding Russia’s power grid with malware ⚠

The US is alleged to have been quietly planting malware throughout Russia's energy networks in response to years of Russian attacks on its own power grid.

πŸ“– Read

via "Naked Security".
⚠ Bella Thorne steals hacker’s thunder, publishes nude photos herself ⚠

Sheesh! At this rate, extortionists are going to have to seek alternate employment.

πŸ“– Read

via "Naked Security".
⚠ 90% off Ray-Bans? It’s a 100% Instagram SCAM! ⚠

The ads look like they're been shared by friends, but they're really pod people who've hijacked accounts.

πŸ“– Read

via "Naked Security".
πŸ” How organizations can better defend against DNS attacks πŸ”

DNS has become a primary target for cyberattacks, causing downtime and financial loss for many businesses, according to a new report from EfficientIP.

πŸ“– Read

via "Security on TechRepublic".
❌ Working BlueKeep Exploit Developed by DHS ❌

The Department of Homeland Security urged system administrators to update their Windows machines after testing a working BlueKeep exploit for Windows 2000.

πŸ“– Read

via "Threatpost".
πŸ•΄ Can Your Patching Strategy Keep Up with the Demands of Open Source? πŸ•΄

It's time to reassess your open source management policies and processes.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Management Console Bugs Allow Windows Takeover ❌

Multiple cross-site scripting (XSS) bugs and an XML external entity (XXE) problem opens the door to takeover of admin desktops.

πŸ“– Read

via "Threatpost".
πŸ” Security breaches: 4 business impacts πŸ”

The average cost of a cyberattack is approximately $4.6 million, according to a Radware report.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How small businesses can deal with getting regulated πŸ”

Even SMBs have to deal with big regulations thanks to GDPR and more. One startup has an answer for how to manage compliance and security.

πŸ“– Read

via "Security on TechRepublic".
πŸ” How HackerOne open sources security--one hacker at a time πŸ”

MΓ₯rten Mickos says hacker-powered security is where open source was 15 years ago, but it's moving much faster than open source did.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Google Targets Deceptive Sites with New Chrome Tools πŸ•΄

A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ The Evolution of Identity πŸ•΄

How data and technology can help businesses make the right fraud decisions, protect people's identities, and create an improved customer experience.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Advertising Alliance Plans Protocols to Reduce Dangerous Content πŸ•΄

The Global Alliance for Responsible Media will seek ways to clamp down on dangerous and fake content.

πŸ“– Read

via "Dark Reading: ".
❌ Linux Kernel Bug Knocks PCs, IoT Gadgets and More Offline ❌

Four vulnerabilities could "SACK" connected devices with denial-of-service exploits.

πŸ“– Read

via "Threatpost".
πŸ” New Guide Addresses Software Security in SDLC Models πŸ”

A new white paper, published by NIST, recommends a core set of high life secure sotware development practices that can be added to SDLC implementation.

πŸ“– Read

via "Subscriber Blog RSS Feed ".