πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2017-8409 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device requires that a user logging to the device to provide a username and password. However, the device does not enforce the same restriction on a specific URL thereby allowing any attacker in possession of that to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-8406 (dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 devices. The device provides a crossdomain.xml file with no restrictions on who can access the webserver. This allows an hosted flash file on any domain to make calls to the device's webserver and pull any information that is stored on the device. In this case, user's credentials are stored in clear text on the device and can be pulled easily. It also seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site flashing attack on the user's browser and execute any action on the device provided by the web management interface which steals the credentials from tools_admin.cgi file's response and displays it inside a Textfield.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-8405 (dcs-1100_firmware, dcs-1130_firmware)

An issue was discovered on D-Link DCS-1130 and DCS-1100 devices. The binary rtspd in /sbin folder of the device handles all the rtsp connections received by the device. It seems that the binary loads at address 0x00012CF4 a flag called "Authenticate" that indicates whether a user should be authenticated or not before allowing access to the video feed. By default, the value for this flag is zero and can be set/unset using the HTTP interface and network settings tab as shown below. The device requires that a user logging to the HTTP management interface of the device to provide a valid username and password. However, the device does not enforce the same restriction by default on RTSP URL due to the checkbox unchecked by default, thereby allowing any attacker in possession of external IP address of the camera to view the live video feed. The severity of this attack is enlarged by the fact that there more than 100,000 D-Link devices out there.

πŸ“– Read

via "National Vulnerability Database".
πŸ” How to securely and completely delete files in Windows 10 without third-party software πŸ”

Deleting files in Windows 10 does not really delete the file. Security best practice requires deleted files to be completely overwritten more than once.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Hotel Chain Fined $123 Million in Second Major GDPR Fine of Week πŸ”

The massive fine comes one day after the ICO's fine of British Airways.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ•΄ What the AppSec Penetration Test Found πŸ•΄

New data drills down on the types of security misconfigurations and challenges dogging application developers.

πŸ“– Read

via "Dark Reading: ".
❌ Microsoft Patches A Pair of Zero-Days Under Active Attack ❌

The software giant also addressed 15 critical flaws and advised on the recently disclosed Linux Kernel "SACK Panic" bug.

πŸ“– Read

via "Threatpost".
ATENTIONβ€Ό New - CVE-2018-11427 (oncell_g3150-hspa-t_firmware, oncell_g3150-hspa_firmware)

CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Patches Zero-Day Vulnerabilities Under Active Attack πŸ•΄

Microsoft issued fixes for 77 unique vulnerabilities this Patch Tuesday, including two zero-day privilege escalation vulnerabilities seen exploited in the wild.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Zoom Client for Mac Exposing Users to Serious Risks πŸ•΄

Videoconferencing software maker downplays risks and says mitigations are on the way.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Coast Guard Warns Shipping Firms of Maritime Cyberattacks πŸ•΄

A commercial vessel suffered a significant malware attack in February, prompting the US Coast Guard to issues an advisory to all shipping companies: Here be malware.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Financial Impact of Cybercrime Exceeded $45B in 2018 πŸ•΄

Cybersecurity analysts explore a range of industry research to examine trends around cyber incidents and their financial impact.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Organizations Are Adapting Authentication for Cloud Applications πŸ•΄

Companies see the changing demands of cloud identity management but are mixed in their responses to those demands.

πŸ“– Read

via "Dark Reading: ".
❌ Intel Patches High-Severity Flaw in Processor Diagnostic Tool ❌

Intel issued patches for a high-severity flaw in its processor diagnostic tool as well as a fix for a medium-severity vulnerability in its data center SSD lineup.

πŸ“– Read

via "Threatpost".
⚠ Instagram asks bullies, β€˜Are you sure you want to say that?’ ⚠

A new anti-bullying feature uses AI to recognize mean words in comments and warns users before they post them.

πŸ“– Read

via "Naked Security".
⚠ Rogue Android apps ignore your permissions ⚠

New research has revealed that apps are snooping on data such as location and unique ID number - even when users haven't given permission.

πŸ“– Read

via "Naked Security".
⚠ Two zero days and 15 critical flaws fixed in July’s Patch Tuesday ⚠

Patch Tuesday July 2019 offers fixes for a total of 77 vulnerabilities, including 15 marked critical, rounded out by two zero-day flaws.

πŸ“– Read

via "Naked Security".
πŸ” Corporate users struggle to identify phishing attacks, other security threats πŸ”

An audit of security awareness conducted by Proofpoint found that users on average answered 22% of security-related questions incorrectly.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 10 Ways to Keep a Rogue RasPi From Wrecking Your Network πŸ•΄

A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network.

πŸ“– Read

via "Dark Reading: ".
❌ Agent Smith Malware Infects 25M Android Phones to Push Rogue Ads ❌

Researchers say malware infects phones in order to sneak ads on devices for profit.

πŸ“– Read

via "Threatpost".
πŸ•΄ 4 Reasons Why SOC Superstars Quit πŸ•΄

Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy.

πŸ“– Read

via "Dark Reading: ".