Skip to main content

Posts

Showing posts with the label Security News

Kali Linux 2020.2: New look, new packages, new installer options

Offensive Security has  released  Kali Linux 2020.2, the latest iteration of the popular open-source penetration testing platform. Kali Linux 2020.2 changes Dark and light themes are now available for the KDE Plasma desktop environment. The login screen got new graphics and a new layout. New package logos for each tool There are several cosmetic changes in this newest Kali Linux release: New packages: the latest version of the GNOME desktop environment (v3.36),  Joplin  (an open-source note taking and to-do application),  Nextnet  (a pivot point discovery tool), SpiderFoot (automated OSINT collection for reconnaissance), and Python 3.8. Also, the module for Python 2 has been re-included temporarily because some tools still need it. After recently switching the default “root/toor” credentials to “kali/kali” for desktop images and making the default user account a standard, unprivileged (non-root) user, Offensive Secur...

Elliot Alderson also known as @fs0c131y Exposed on Aarogya Setu App so called Security Issues!!!!

Elliot Alderson's Tweet Claiming Issues in the Application. Well, you heard right, this is the same person who had earlier provided many issues regarding the Indian Government various applications from DigiLocker to Aadhar application, etc. Well, this time it seems the findings posted by him are not completely right rather say just a twist of some technical words so that his wast audience who is mostly non-technical and very less to no knowledge of technicality of android/application environment/ space or even what is classified as a violation of privacy. A team of Indian Security researchers  Sri Ram, Nidhish Pandya, Biprodeep Roy, Kunwar Atal & Sunny Nehra have gone into depts and length of the posted privacy issues and have explained the findings. A Quick Gist of the Blog Here is the link to a blog post published in their findings. Let me know your thoughts and comments on it.

More than 440,000 Customers to be Notified by SAP to Address Security Issues with Some Cloud Products of it!!

SAP(Systems Applications and Products) announced on Monday that they are to patch security issues with some of their cloud-based products. The bugs are identified as a part of the internal cybersecurity audit and the company already started working on it. SAP Security Issues SAP said that some of it is “cloud products do not meet one or several contractually agreed or statutory IT security standards” and they started to fix them. Following are the products affected; SAP Success Factors, SAP Concur, SAP/CallidusCloud Commissions, SAP/Callidus Cloud CPQ; as well as SAP C4C/Sales Cloud, SAP Cloud Platform, and SAP Analytics Cloud. SAAP confirms that the  vulnerabilities  are not identified as a part of a security incident and no customer data has been compromised. “To ensure that the affected products meet relevant terms and conditions and in addition to technical remediation, SAP has decided to update its security-related terms and conditions. These remain in l...

A Deep Dive into WhatsApp Security Hacks: Are Your ‘Private’ Messages Really Ever Private?

WhatsApp one of the largest instant messengers and considered by many a social network of its own. So, in continuing our app safety discussion, we’re diving into some of the top security hacks and questions many WhatsApp app users and parents may have. But first, what’s a security hack? In short, it’s an attempt to exploit the weaknesses in an app, network, or digital service to gain unauthorized access, usually for some illicit purpose. Here are just some of the concerns WhatsApp users may have and some suggestions on boosting security. WhatsApp Hack FAQ Are WhatsApp conversations private? Yes — but there are exceptions. More than any other app, WhatsApp offers greater privacy thanks to end-to-end encryption that scrambles messages to ensure only you and the person you’re communicating with can read your messages or listen to your calls. Here’s the catch: WhatsApp messages (which include videos and photos) are vulnerable  before  they are encrypted and  after...

A New Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets

Since the past few weeks, software giant Citrix has privately been rolling out a critical software update to its enterprise customers that patches multiple security vulnerabilities affecting Citrix ShareFile content collaboration platform. The security advisory—about which The Hacker News learned from  Dimitri van de Giessen , an ethical hacker and system engineer—is scheduled to be available publicly later today on the  Citrix website . Citrix ShareFile is an enterprise-level file sharing solution for businesses using which employees can securely exchange proprietary and sensitive business data with each other. The software offers an on-premises secure cloud environment for data storage with auditing capabilities and regulatory compliance controls. For example, a company can remotely lock or wipe data from potentially compromised mobile devices, or they're when lost or stolen. The newly identified security issues ( CTX-CVE-2020-7473 ) specifically affect customer-m...

Mega Hosting Provider GoDaddy Hacked - Attackers Gained SSH Access to Customer Hosting Accounts!!

GoDaddy, the world’s largest domain registrar and hosting provider announced a data breach that impacts web hosting account credentials. The company notified unauthorized party access to their web hosting account credentials used to connect via SSH. GoDaddy Hack Godaddy found that the incident took place on October 19, 2019, was discovered on April 23, 2020, by GoDaddy security who found an SSH file altered in the hosting environment. “We recently identified suspicious activity on a subset of our servers and immediately began an investigation,” the company said in a data-breach notice filed with the California Attorney General, obtained by media. The company notified to the customers in an email signed by GoDaddy CISO and vice-president of engineering, Demetrius Comes, revealed that the security incident in question came to light after suspicious activity identified. The email notification  revealed  an “an unauthorized individual had access to your login infor...

Critical SaltStack RCE Bug (CVSS Score 10) Affects Thousands of Data Centers

Two severe security flaws have been discovered in the open-source  SaltStack Sat configuration framework  that could allow an adversary to execute arbitrary code on remote servers deployed in data centers and cloud environments. The vulnerabilities were identified by F-Secure researchers earlier this March and disclosed on Thursday, a day after SaltStack  released  a patch (version 3000.2)  addressing the issues , rated with CVSS score 10. "The vulnerabilities, allocated CVE IDs  CVE-2020-11651  and  CVE-2020-11652 , are of two different classes," the cybersecurity  firm said . "One being authentication bypass where functionality was unintentionally exposed to unauthenticated network clients, the other being directory traversal where untrusted input (i.e., parameters in network requests) was not sanitized correctly allowing unconstrained access to the entire filesystem of the master server." The researchers warned that the flaws could be...

Law enforcement and Microsoft Shutdown a Major Malware Attack by Mapping 400,000 IP’s

Microsoft’s Digital Crimes Unit (DCU) uncovered an IoT botnet operation that 100 times within one month. Analyzing further DCU team able to map 400,000 publicly available IPs and narrowed 90 suspicious IPs. The botnets continue to increase, as the threat actors can abuse millions of devices to carry out malicious activities. Major Malware Attack Out of 90 suspicious IP DCU able to define one IP that associated with the distribution of several malicious activities including malware, phishing emails, ransomware, and DDoS attacks. The issue has been further reported by DCU to Taiwan’s Ministry of Justice Investigation Bureau (MJIB), who tracked down the illegal VPN IP quickly and the accounts behind it. Generally, cybercriminals use compromise PCs to launch cyberattacks, but this time an IOT LED light control console is used. MJIB managed to shut down the device quickly. “This case marks a milestone. That’s because we were able to take down the IoT device and secure the br...