ATENTIONβΌ New - CVE-2017-8405
π Read
via "National Vulnerability Database".
An issue was discovered on D-Link DCS-1130 and DCS-1100 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary loads at address 0x00012CF4 a flag called "Authenticate" that indicates whether a user should be authenticated or not before allowing access to the video feed. By default, the value for this flag is zero and can be set/unset using the HTTP interface and network settings tab as shown below. The device requires that a user logging to the HTTP management interface of the device to provide a valid username and password. However, the device does not enforce the same restriction by default on RTSP URL due to the checkbox unchecked by default, thereby allowing any attacker in possession of external IP address of the camera to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11580
π Read
via "National Vulnerability Database".
Blipcare Wifi blood pressure monitor BP700 10.1 devices allow memory corruption that results in Denial of Service. When connected to the "Blip" open wireless connection provided by the device, if a large string is sent as a part of the HTTP request in any part of the HTTP headers, the device could become completely unresponsive. Presumably this happens as the memory footprint provided to this device is very small. According to the specs from Rezolt, the Wi-Fi module only has 256k of memory. As a result, an incorrect string copy operation using either memcpy, strcpy, or any of their other variants could result in filling up the memory space allocated to the function executing and this would result in memory corruption. To test the theory, one can modify the demo application provided by the Cypress WICED SDK and introduce an incorrect "memcpy" operation and use the compiled application on the evaluation board provided by Cypress semiconductors with exactly the same Wi-Fi SOC. The results were identical where the device would completely stop responding to any of the ping or web requests.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11579
π Read
via "National Vulnerability Database".
In the most recent firmware for Blipcare, the device provides an open Wireless network called "Blip" for communicating with the device. The user connects to this open Wireless network and uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is in vicinity of Wireless signal generated by the Blipcare device to easily sniff the credentials. Also, an attacker can connect to the open wireless network "Blip" exposed by the device and modify the HTTP response presented to the user by the device to execute other attacks such as convincing the user to download and execute a malicious binary that would infect a user's computer or mobile device with malware.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11578
π Read
via "National Vulnerability Database".
It was discovered as a part of the research on IoT devices in the most recent firmware for Blipcare device that the device allows to connect to web management interface on a non-SSL connection using plain text HTTP protocol. The user uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is connected to the Blipcare's device wireless network to easily sniff these values using a MITM attack.π Read
via "National Vulnerability Database".
π΄ New MacOS Malware Discovered π΄
π Read
via "Dark Reading: ".
A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.π Read
via "Dark Reading: ".
Darkreading
New MacOS Malware Discovered
A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.
β Patch Android! July 2019 update fixes 9 critical flaws β
π Read
via "Naked Security".
Depending on when users receive it, this weekβs Androidβs July patch update will fix 33 security vulnerabilities, including 9 marked critical, and 24 marked high.π Read
via "Naked Security".
Naked Security
Patch Android! July 2019 update fixes 9 critical flaws
Depending on when users receive it, this weekβs Androidβs July patch update will fix 33 security vulnerabilities, including 9 marked critical, and 24 marked high.
β Miami police body cam videos up for sale on the darkweb β
π Read
via "Naked Security".
Videos from Miami Police Department body cams were leaked and stored in unprotected, internet-facing databases, then sold on the darkweb.π Read
via "Naked Security".
Naked Security
Miami police body cam videos up for sale on the darkweb
Videos from Miami Police Department body cams were leaked and stored in unprotected, internet-facing databases, then sold on the darkweb.
β Georgiaβs court system hit by ransomware β
π Read
via "Naked Security".
There's a hint that it might involve Ryuk ransomware. If so, it might be the fourth Ryuk attack against state and local agencies since May.π Read
via "Naked Security".
Naked Security
Georgiaβs court system hit by ransomware
Thereβs a hint that it might involve Ryuk ransomware. If so, it might be the fourth Ryuk attack against state and local agencies since May.
β IoT vendor Orvibo gives away treasure trove of user and device data β
π Read
via "Naked Security".
Researchers at web privacy review service vpnMentor discovered the data in an exposed ElasticSearch server online. It contains two billion items of log data from devices sold by Shenzen, China-based smart IoT device manufacturer Orvibo.π Read
via "Naked Security".
Naked Security
IoT vendor Orvibo gives away treasure trove of user and device data
Researchers at web privacy review service vpnMentor discovered the data in an exposed ElasticSearch server online. It contains two billion items of log data from devices sold by Shenzen, China-baseβ¦
π΄ TA505 Group Launches New Targeted Attacks π΄
π Read
via "Dark Reading: ".
Russian-speaking group has sent thousands of emails containing new malware to individuals working at financial institutions in the US, United Arab Emirates, and Singapore.π Read
via "Dark Reading: ".
Darkreading
TA505 Group Launches New Targeted Attacks
Russian-speaking group has sent thousands of emails containing new malware to individuals working at financial institutions in the US, United Arab Emirates, and Singapore.
π΄ Black Hat Q&A: Understanding NSA's Quest to Open Source Ghidra π΄
π Read
via "Dark Reading: ".
National Security Agency researcher Brian Knighton previews his October Black Hat USA talk on the evolution of Ghidra.π Read
via "Dark Reading: ".
Dark Reading
Black Hat Q&A: Understanding NSA's Quest to Open Source Ghidra
National Security Agency researcher Brian Knighton previews his October Black Hat USA talk on the evolution of Ghidra.
π UK Sees Steep Jump in Cyber Attacks on Financial Services Firms π
π Read
via "Subscriber Blog RSS Feed ".
According to a regulator, retail banks in the region took the biggest hit last year.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
UK Sees Steep Jump in Cyber Attacks on Financial Services Firms
According to a regulator, retail banks in the region took the biggest hit last year.
π΄ Disarming Employee Weaponization π΄
π Read
via "Dark Reading: ".
Human vulnerability presents a real threat for organizations. But it's also a remarkable opportunity to turn employees into our strongest cyber warriors.π Read
via "Dark Reading: ".
Darkreading
Disarming Employee Weaponization
Human vulnerability presents a real threat for organizations. But it's also a remarkable opportunity to turn employees into our strongest cyber warriors.
π DevOps will fail unless security and developer teams communicate better π
π Read
via "Security on TechRepublic".
DevOps initiatives have become important for 74% of organizations over the past year, but communication must improve for DevOps to be successful, according to Trend Micro.π Read
via "Security on TechRepublic".
TechRepublic
DevOps will fail unless security and developer teams communicate better
DevOps initiatives have become important for 74% of organizations over the past year, but communication must improve for DevOps to be successful, according to Trend Micro.
β Amazon Admits Alexa Voice Recordings Saved Indefinitely β
π Read
via "Threatpost".
Amazon's acknowledgment that it saves Alexa voice recordings - even sometimes after consumers manually delete their interaction history - has thrust voice assistant privacy policies into the spotlight once again.π Read
via "Threatpost".
Threat Post
Amazon Admits Alexa Voice Recordings Saved Indefinitely
Amazon's acknowledgment that it saves Alexa voice recordings - even sometimes after consumers manually delete their interaction history - has thrust voice assistant privacy policies into the spotlight once again.
β Serious Security: Beware eBay scrapers promising to help you with βviral promotionsβ β
π Read
via "Naked Security".
Selling items online? Watch our for people who suddenly offer to help!π Read
via "Naked Security".
Naked Security
Serious Security: Beware eBay scrapers promising to help you
Selling items online? Watch out for people who suddenly offer to help!
π Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud π
π Read
via "Security on TechRepublic".
This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.π Read
via "Security on TechRepublic".
TechRepublic
Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud
This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.
β Apple Transparency Report Now Includes App Store Takedown Requests β
π Read
via "Threatpost".
Apple report now includes data on requests by governments to take down apps from the tech giant's app store.π Read
via "Threatpost".
Threat Post
Apple Transparency Report Now Includes App Store Takedown Requests
Apple report now includes data on requests by governments to take down apps from the tech giants app store.
π Tech news roundup: Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud π
π Read
via "Security on TechRepublic".
This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.π Read
via "Security on TechRepublic".
ATENTIONβΌ New - CVE-2018-11427
π Read
via "National Vulnerability Database".
CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.π Read
via "National Vulnerability Database".