Security News > 2020 > May

Monday review – the hot 11 stories of the week
2020-05-04 10:44

It's weekly roundup time!

SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP!
2020-05-04 10:32

Two vulnerabilities in SaltStack Salt, an open-source remote task and configuration management framework, are being actively exploited by attackers, CISA warns. The vulnerabilities affect all Salt versions prior to 2019.2.4 and 3000.2, which were released last week.

Xiaomi emits phone browser updates after almighty row over web activity harvested even in incognito mode
2020-05-04 10:30

A Forbes report last week outlined how some Xiaomi Android phones track their owners' web browsing and online activities. It was claimed the handsets' bundled Xiaomi browser collects things like browsing history, search queries, and news feed activity, and sends the data off to servers in China, even in private incognito mode.

Recent Salt Vulnerabilities Exploited to Hack LineageOS, Ghost, DigiCert Servers
2020-05-04 09:00

Over the past several days, hackers have exploited two recently disclosed Salt vulnerabilities to compromise the servers of LineageOS, Ghost and DigiCert. Last week, F-Secure security researchers disclosed two vulnerabilities in Salt that could allow remote attackers to execute commands as root on "Master" and connected minions.

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers
2020-05-04 07:57

Cybersecurity researcher Mordechai Guri from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. "Our developed malware can exploit the computer power supply unit to play sounds and use it as an out-of-band, secondary speaker with limited capabilities," Dr. Guri outlined in a paper published today and shared with The Hacker News.

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers
2020-05-04 07:57

Cybersecurity researcher Mordechai Guri from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. "Our developed malware can exploit the computer power supply unit to play sounds and use it as an out-of-band, secondary speaker with limited capabilities," Dr. Guri outlined in a paper published today and shared with The Hacker News.

India makes contact-tracing app compulsory in viral hot zones despite most local phones not being smart
2020-05-04 07:31

In 1965, Gordon Moore published a short informal paper, Cramming more components onto integrated circuits. Based on not much more but these few data points and his knowledge of silicon chip development - he was head of R&D at Fairchild Semiconductors, the company that was to seed Silicon Valley - he said that for the next decade, component counts by area could double every year.

Help your helpdesk: Empower employees to self-reset their AD account password
2020-05-04 07:30

Enroll users/employees to the self-service password reset service or direct users to self-enroll. Once the employees are enrolled, they can self-reset the password whenever they need to, via a web browser, the Windows logon screen on their workstations, or the uReset mobile application.

Protecting corporate data in popular cloud-based collaborative apps
2020-05-04 05:30

Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business demands. While utilizing these cloud apps provides flexibility and cost savings, it also can allow sensitive data to be exposed.

CCPA privacy requests cost business up to $275k per million consumer records
2020-05-04 05:00

Organizations who plan on manually processing CCPA data subject requests or data subject access requests will spend between $140k - $275k per million consumer records they have in their systems, according to DataGrail. B2C companies should prepare to process approximately 100 to 194 requests per million consumer records each year.