TSEC NEWS: 06.05.21 Cron-Job Fehlerhaft nach PHP Update + PWA mobile + Desktop / 04.05.21 - Android App von TSECURITY 28.04.21 - NEUER SERVER // 26.04.21 ++ Download the Electron-App für tsecurity.de // Über 550 Feed-Quellen


❈ How to Create a Post-Pandemic Data Security RFP

IT Security Nachrichten feedproxy.google.com

Even before the pandemic, the last couple of years has seen a series of seismic shifts in data privacy and security for companies. In 2021, there’s no denying things have changed. Some offices are opening up, but for many of us in the data security trenches, we’re still in the middle of a pandemic. Many of us are still firmly embedded in a protocol that’s been in place for more than a year now. 

read more

...


Kompletten Artikel lesen (externe Quelle: http://feedproxy.google.com/~r/securityweek/~3/C_P3aNzN6jQ/how-create-post-pandemic-data-security-rfp)

Zur Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

Diving Deep Into a Pwn2Own Winning WebKit Bug

vom 451.52 Punkte
Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of

CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters

vom 365 Punkte
In April 2020, Microsoft released four Critical and two Important-rated patches to fix remote code execution bugs in Microsoft SharePoint. All these are deserialization bugs. Two came through the ZDI program from an anonymous researcher: CVE-2020-0931

How Password Hashing Algorithms Work and Why You Never Ever Write Your Own

vom 349.36 Punkte
Are you fascinated with cryptography? You're not alone: a lot of engineers are. Occasionally, some of them decide to go as far as to write their own custom cryptographic hash functions and use them in real-world applications. While understandably enticing, doi

Veracode Hacker Games: The Results Are In!

vom 303.1 Punkte
The first everツ?Veracode Hacker Gamesツ?competition hasツ?come to a close, but were the flaws inツ?favor of our brave competitors? Read on to find out.ツ? Over the course of the two-weekツ?challenge, students from several universities in the U.S. and the U.K. came together to explore vulne

CVE-2020-0729: Remote Code Execution Through .LNK Files

vom 290.94 Punkte
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, John Simpson and Pengsu Cheng of the Trend Micro Research Team detail a recent remote code execution bug in Microsoft Windows .LNK files. The following is a portion of

Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

vom 272.82 Punkte
This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t

ConstraintLayout 2.0.0 beta 7

vom 258.61 Punkte
We are happy to announce the release of ConstraintLayout 2.0 beta 7. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta7'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint

Deobfuscating/REversing Remcos - AutoIt, Shellcode, and RunPE

vom 241.58 Punkte
Remcos is a robust RAT actively being used in the wild. This multi-staged/evasive RAT provides powerful functionality to an attacker. Each stage is written in a different language: AutoIt -> Shellcode -> C++. I wanted to explore both the evasiven

ConstraintLayout 2.0.0 beta 2

vom 232.26 Punkte
We are happy to announce the release of ConstraintLayout 2.0 beta 2. It’s available from the google maven repository: dependencies {    implementation 'com.android.support.constraint:constraint-layout:2.0.0-beta2'} or if using the AndroidX packages: dependencies {    implementation 'androidx.con

MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router

vom 219.38 Punkte
In early 2019, we received a bug submission from a new researcher affecting the TP-Link TL-WR841N Router. While this vulnerability is still in disclosure phase, we would like to share lessons learned when we were vetting this submission. TL-WR841N

ConstraintLayout 2.0.0 beta 5

vom 219.16 Punkte
We are happy to announce the release of ConstraintLayout 2.0 beta 5. It’s available from the google maven repository:dependencies {    implementation 'androidx.constraintlayout:constraintlayout:2.0.0-beta5'}or if using the android.support packages:dependencies {    implementation 'com.android.support.constraint:constraint

CVE-2019-0708: A Comprehensive Analysis of a Remote Desktop Services Vulnerability

vom 197.86 Punkte
In the May 2019 patch cycle, Microsoft released a patch for a remote code execution bug in their Remote Desktop Services (RDS). A remote, unauthenticated attacker can exploit this vulnerability by sending crafted RDP messages to the target server. Success

Team Security Diskussion über How to Create a Post-Pandemic Data Security RFP