πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ DHS to Require Federal Agencies Set Vulnerability Disclosure Policies πŸ•΄

The Cybersecurity and Infrastructure Security Agency (CISA) publishes a draft document mandating a vulnerability disclosure policy and a strategy for handling reports of security weaknesses.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Kali Linux Gets New Desktop Environment & Undercover Theme πŸ•΄

Updates to pen-testing platform are designed to improve performance and user interface, says Offensive Security, maintainer of the open source project.

πŸ“– Read

via "Dark Reading: ".
⚠ Ad fraud: Fake local news sites are rolling in the dough ⚠

"forbesbusinessinsider.com?" Names like that sound close enough to real news domains to pass, but bots are the only ones visiting.

πŸ“– Read

via "Naked Security".
⚠ IM RAT spy tool seller raided, busted, kicked offline ⚠

The spyware gave complete control of victimized computers, sold for as little as$25, and was bought by 14,500 hackers worldwide.

πŸ“– Read

via "Naked Security".
⚠ Mixcloud user accounts up for sale on dark web ⚠

A hacker is ransoming account data stolen from music streaming service Mixcloud, according to reports.

πŸ“– Read

via "Naked Security".
⚠ SMS company exposes millions of text messages, credentials online ⚠

Researchers at VpnMentor claim that the TrueDialog data leak exposure could have compromised tens of millions of people.

πŸ“– Read

via "Naked Security".
❌ β€˜StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps ❌

The flaw can allow hackers to take over typical device functions like sending messages and taking photos because users think malicious activity is a mobile app they use regularly.

πŸ“– Read

via "Threatpost".
❌ Supply Chain Account Takeover: How Criminals Exploit Third-Party Access ❌

It’s important for businesses of all sizes to not only view their suppliers’ attack surface as their own but also extend some of their security protections.

πŸ“– Read

via "Threatpost".
πŸ” New Android bug targets banking apps on Google Play store πŸ”

Labeled "StrandHogg," the vulnerability discovered by the mobile security vendor Promon could give hackers access to users' photos, contacts, phone logs, and more.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2019-12503

Due to unencrypted and unauthenticated data communication, the wireless barcode scanner Inateck BCST-60 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12394

Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12393

Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12392

Anviz access control devices allow remote attackers to issue commands without a password.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12391

The Anviz Management System for access control has insufficient logging for device events such as door open requests.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12390

Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12389

Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2019-12388

Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-4457 (cloudera_manager)

Multiple cross-site scripting (XSS) vulnerabilities in the Cloudera Manager UI before 5.4.3 allow remote authenticated users to inject arbitrary web script or HTML using unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-3406

The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to cause the unsigned portion of a SIGNATURE file to be treated as the signed portion via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-2060

cabextract before 1.6 does not properly check for leading slashes when extracting files, which allows remote attackers to conduct absolute directory traversal attacks via a malformed UTF-8 character that is changed to a UTF-8 encoded slash.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2015-1855

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.

πŸ“– Read

via "National Vulnerability Database".