Malware Devil

Thursday, December 17, 2020

51% of WFH Parents Say Children Have Accessed Work Accounts

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: He takes the secure code review VERY seriously.
image

Current Issue

image2020: The Year in SecurityDownload this Tech Digest for a look at the biggest security stories that – so far – have shaped a very strange and stressful year.
image

Flash Poll

Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today’s Enterprises
COVID-19 has created a new IT paradigm in the enterprise — and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-15292
PUBLISHED: 2020-12-17

Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insuffici…

CVE-2020-15293
PUBLISHED: 2020-12-17

Memory corruption in IntLixCrashDumpDmesg, IntLixTaskFetchCmdLine, IntLixFileReadDentry and IntLixFileGetPath due to insufficient guest-data input validation may lead to denial of service conditions.

CVE-2020-15294
PUBLISHED: 2020-12-17

Compiler Optimization Removal or Modification of Security-critical Code vulnerability in IntPeParseUnwindData() results in multiple dereferences to the same pointer. If the pointer is located in memory-mapped from the guest space, this may cause a race-condition where the generated code would derefe…

CVE-2020-22083
PUBLISHED: 2020-12-17

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function.

CVE-2020-27199
PUBLISHED: 2020-12-17

The Magic Home Pro application 1.5.1 for Android allows Authentication Bypass. The security control that the application currently has in place is a simple Username and Password authentication function. Using enumeration, an attacker is able to forge a User specific token without the need for correc…

The post 51% of WFH Parents Say Children Have Accessed Work Accounts appeared first on Malware Devil.



https://malwaredevil.com/2020/12/17/51-of-wfh-parents-say-children-have-accessed-work-accounts/?utm_source=rss&utm_medium=rss&utm_campaign=51-of-wfh-parents-say-children-have-accessed-work-accounts

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...