πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-11580

Blipcare Wifi blood pressure monitor BP700 10.1 devices allow memory corruption that results in Denial of Service. When connected to the "Blip" open wireless connection provided by the device, if a large string is sent as a part of the HTTP request in any part of the HTTP headers, the device could become completely unresponsive. Presumably this happens as the memory footprint provided to this device is very small. According to the specs from Rezolt, the Wi-Fi module only has 256k of memory. As a result, an incorrect string copy operation using either memcpy, strcpy, or any of their other variants could result in filling up the memory space allocated to the function executing and this would result in memory corruption. To test the theory, one can modify the demo application provided by the Cypress WICED SDK and introduce an incorrect "memcpy" operation and use the compiled application on the evaluation board provided by Cypress semiconductors with exactly the same Wi-Fi SOC. The results were identical where the device would completely stop responding to any of the ping or web requests.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-11579

In the most recent firmware for Blipcare, the device provides an open Wireless network called "Blip" for communicating with the device. The user connects to this open Wireless network and uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is in vicinity of Wireless signal generated by the Blipcare device to easily sniff the credentials. Also, an attacker can connect to the open wireless network "Blip" exposed by the device and modify the HTTP response presented to the user by the device to execute other attacks such as convincing the user to download and execute a malicious binary that would infect a user's computer or mobile device with malware.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-11578

It was discovered as a part of the research on IoT devices in the most recent firmware for Blipcare device that the device allows to connect to web management interface on a non-SSL connection using plain text HTTP protocol. The user uses the web management interface of the device to provide the user's Wi-Fi credentials so that the device can connect to it and have Internet access. This device acts as a Wireless Blood pressure monitor and is used to measure blood pressure levels of a person. This allows an attacker who is connected to the Blipcare's device wireless network to easily sniff these values using a MITM attack.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ New MacOS Malware Discovered πŸ•΄

A wave of new MacOS malware over the past month includes a zero-day exploit and other attack code.

πŸ“– Read

via "Dark Reading: ".
⚠ Patch Android! July 2019 update fixes 9 critical flaws ⚠

Depending on when users receive it, this week’s Android’s July patch update will fix 33 security vulnerabilities, including 9 marked critical, and 24 marked high.

πŸ“– Read

via "Naked Security".
⚠ Miami police body cam videos up for sale on the darkweb ⚠

Videos from Miami Police Department body cams were leaked and stored in unprotected, internet-facing databases, then sold on the darkweb.

πŸ“– Read

via "Naked Security".
⚠ Georgia’s court system hit by ransomware ⚠

There's a hint that it might involve Ryuk ransomware. If so, it might be the fourth Ryuk attack against state and local agencies since May.

πŸ“– Read

via "Naked Security".
⚠ IoT vendor Orvibo gives away treasure trove of user and device data ⚠

Researchers at web privacy review service vpnMentor discovered the data in an exposed ElasticSearch server online. It contains two billion items of log data from devices sold by Shenzen, China-based smart IoT device manufacturer Orvibo.

πŸ“– Read

via "Naked Security".
πŸ•΄ TA505 Group Launches New Targeted Attacks πŸ•΄

Russian-speaking group has sent thousands of emails containing new malware to individuals working at financial institutions in the US, United Arab Emirates, and Singapore.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Black Hat Q&A: Understanding NSA's Quest to Open Source Ghidra πŸ•΄

National Security Agency researcher Brian Knighton previews his October Black Hat USA talk on the evolution of Ghidra.

πŸ“– Read

via "Dark Reading: ".
πŸ” UK Sees Steep Jump in Cyber Attacks on Financial Services Firms πŸ”

According to a regulator, retail banks in the region took the biggest hit last year.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ Disarming Employee Weaponization πŸ•΄

Human vulnerability presents a real threat for organizations. But it's also a remarkable opportunity to turn employees into our strongest cyber warriors.

πŸ“– Read

via "Dark Reading: ".
πŸ” DevOps will fail unless security and developer teams communicate better πŸ”

DevOps initiatives have become important for 74% of organizations over the past year, but communication must improve for DevOps to be successful, according to Trend Micro.

πŸ“– Read

via "Security on TechRepublic".
❌ Amazon Admits Alexa Voice Recordings Saved Indefinitely ❌

Amazon's acknowledgment that it saves Alexa voice recordings - even sometimes after consumers manually delete their interaction history - has thrust voice assistant privacy policies into the spotlight once again.

πŸ“– Read

via "Threatpost".
⚠ Serious Security: Beware eBay scrapers promising to help you with β€˜viral promotions’ ⚠

Selling items online? Watch our for people who suddenly offer to help!

πŸ“– Read

via "Naked Security".
πŸ” Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud πŸ”

This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.

πŸ“– Read

via "Security on TechRepublic".
❌ Apple Transparency Report Now Includes App Store Takedown Requests ❌

Apple report now includes data on requests by governments to take down apps from the tech giant's app store.

πŸ“– Read

via "Threatpost".
πŸ” Tech news roundup: Amazon Prime Day, EA gaming service's vulnerabilities, and the basics of multicloud πŸ”

This week's TechRepublic and ZDNet news stories include the brand battle between Apple and Microsoft, Word documents containing malicious links, and the future of on-premises databases.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-11427

CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2018-11426

A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.

πŸ“– Read

via "National Vulnerability Database".