<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[NetSecDaily]]></title><description><![CDATA[Quick Cyber News, Reviews, Blog]]></description><link>https://www.netsecdaily.com/</link><image><url>http://www.netsecdaily.com/favicon.png</url><title>NetSecDaily</title><link>https://www.netsecdaily.com/</link></image><generator>Ghost 2.11</generator><lastBuildDate>Thu, 30 Oct 2025 09:10:26 GMT</lastBuildDate><atom:link href="https://www.netsecdaily.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Apple - FaceTime Bug Allows eavesdropping]]></title><description><![CDATA[A bug in FaceTime allows a caller to eavesdrop on the receiver without the receiver picking up the call.]]></description><link>https://www.netsecdaily.com/facetime-bug-allows-eavesdropping/</link><guid isPermaLink="false">5c5241adc0f8350dea89a528</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Thu, 31 Jan 2019 00:59:56 GMT</pubDate><content:encoded><![CDATA[<p>A bug in FaceTime allows a caller to eavesdrop on the receiver without the receiver picking up the call, subsequently allowing the the caller to see or hear the receiver's surrounding.</p><p>The bug seems to be a design or a logic flaw, and not a technical vulnerability. </p><iframe width="560" height="315" src="https://www.youtube.com/embed/Z2-RV7qVmro" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>Here are the steps to reproduce this <a href="https://thehackernews.com/2019/01/apple-facetime-privacy-hack.html">phenomenon</a>.</p><ol><li>Start a FaceTime Video call with any iPhone contact.</li><li>While your call is dialing, swipe up from the bottom of your iPhone screen and tap 'Add Person.'</li><li>You can add your own phone number in the 'Add Person' screen.</li><li>This will start a group FaceTime call including yourself and the person you first called, whose audio you will able to listen in even if he/she hasn't accepted the call yet.</li></ol><p>Some have also reported that if the receiver decides to reject the call, the camera of the iPhone of the receiver will still be engaged. </p><p>Apple have since acknowledged the issue and will be rolling out a fix in an upcoming patch. iPhone users should update their iOS when the security patch is out to avoid future eavesdropping. </p><p>For now, a preventive measure is to disable FaceTime on iOS devices. This can be achieved by going into Settings -&gt; FaceTime -&gt; Disable FaceTime.</p>]]></content:encoded></item><item><title><![CDATA[Over 9000 Cisco RV320/RV325 Routers Vulnerable To New Exploit]]></title><description><![CDATA[Running a Cisco RV320 or RV325 VPN router on your premise? It is highly recommended to install the latest security patch.]]></description><link>https://www.netsecdaily.com/over-9000-cisco-routers-vule/</link><guid isPermaLink="false">5c4fdbabc0f8350dea89a4e4</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Tue, 29 Jan 2019 05:20:22 GMT</pubDate><content:encoded><![CDATA[<p>Running a Cisco RV320 or RV325 VPN router on your premise? It is highly recommended to install the latest security patch, as a new exploit has surfaced which exploits a vulnerability in the VPN routers.</p><p>The <a href="https://github.com/0x27/CiscoRV320Dump">exploit</a> takes advantage of the CVE-2019-1653/CVE-2019-1652 vulnerabilities. The exploit code took advantage of a command injection flaw and a file disclosure flaw, which allows the dumping of plain text configuration file, which also includes password hashes to the webUI. </p><figure class="kg-card kg-image-card"><img src="http://www.netsecdaily.com/content/images/2019/01/image-6.png" class="kg-image"></figure><blockquote>CVE-2019-1652—The flaw allows an authenticated, remote attacker with administrative privileges on an affected device to execute arbitrary commands on the system.</blockquote><blockquote>CVE-2019-1653—This flaw doesn't require any authentication to reach the router's web-based management portal, allowing attackers to retrieve sensitive information including the router's configuration file containing MD5 hashed credentials and diagnostic information.</blockquote><p>Researchers from <a href="https://badpackets.net/over-9000-cisco-rv320-rv325-routers-vulnerable-to-cve-2019-1653/">Bad Packets</a> have also found at least 9657 Cisco routers worldwide that are still operating with the vulnerable firmware, and the majority of such routers are in the United States. The firm also shared a <a href="https://docs.google.com/spreadsheets/d/1ZocV8n4DOmcKJ_ugjjQ_gjIAmDHxT1JBhVxIAdABVyY/edit#gid=1297196434">visualization</a> of the vulnerable routers in 122 countries, with networks operated by 1619 unique internet service providers.</p><p>It is highly recommended that administrators of such routers should update their firmware immediately to prevent any security incident. An example of a failure to patch a critical vulnerability leading to a major data breach incident is the Equifax incident. The vulnerability exploited then was an Apache Struts vulnerability, and because it was not patched in time, attackers were able to gain a foothold and subsequently ex-filtrate sensitive data, leading to one of the biggest data breaches as we know today.</p>]]></content:encoded></item><item><title><![CDATA[Ransomware Spreading Using Word Document - Still Happening in 2019]]></title><description><![CDATA[<p>Security researchers from Carbon Black discovered malware campaigns embedded into MS Word macros. The <a href="https://www.carbonblack.com/2019/01/24/carbon-black-tau-threatsight-analysis-gandcrab-and-ursnif-campaign/">report</a>, indicated that it is distributing the Ursnif data-stealing malware, and the GandCrab ransomware. </p><p>The distribution of the malware starts with a phishing campaign, where malware infected Microsoft Word Documents are being attached to the phishing</p>]]></description><link>https://www.netsecdaily.com/ransomware-spreading-using-word-document/</link><guid isPermaLink="false">5c4c1129c0f8350dea89a4b1</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Sat, 26 Jan 2019 08:04:59 GMT</pubDate><content:encoded><![CDATA[<p>Security researchers from Carbon Black discovered malware campaigns embedded into MS Word macros. The <a href="https://www.carbonblack.com/2019/01/24/carbon-black-tau-threatsight-analysis-gandcrab-and-ursnif-campaign/">report</a>, indicated that it is distributing the Ursnif data-stealing malware, and the GandCrab ransomware. </p><p>The distribution of the malware starts with a phishing campaign, where malware infected Microsoft Word Documents are being attached to the phishing mails. Once the infected word document is invoked, a series of Powershell modules is used to download additional scripts, and this is where the fileless malware is delivered to the system. The malware would proceed to ex-filtrate data, and the ransomware would proceed on its ransomware behavior.</p><blockquote>What is a fileless malware? A fileless malware exists in the RAM of computers and uses common system tools to inject malicious code into normally safe and trusted processes. It differs from a traditional malware as it does not have a footprint on the disk, as it only exists in memory. Because it does not touch the disk, it is hard to detect and remove. However, such malware will not be persistent if it only exist in the RAM, since rebooting the machine would effectively clear the RAM.</blockquote><figure class="kg-card kg-image-card"><img src="http://www.netsecdaily.com/content/images/2019/01/image-5.png" class="kg-image"><figcaption>illustration of infected word document behavior</figcaption></figure><p>The result of the malicious word document would lead to data leakage, and machines falling victim to a ransomware. It is strongly encouraged to not open a word document from an unknown source which requires macro functionalities, unless it is from a trusted source. Threat actors today are finding new ways to break in, and the human factor is always the weakest link.</p><p>Source:  <a href="https://www.carbonblack.com/2019/01/24/carbon-black-tau-threatsight-analysis-gandcrab-and-ursnif-campaign/">https://www.carbonblack.com/2019/01/24/carbon-black-tau-threatsight-analysis-gandcrab-and-ursnif-campaign/</a></p>]]></content:encoded></item><item><title><![CDATA[Millions Found Running Outdated Software]]></title><description><![CDATA[<p>A report released by Avast [<a href="https://cdn2.hubspot.net/hubfs/486579/Avast_PC_Trends_Report_2019.pdf">here</a>] reveals that millions of users are still running outdated software, some of which contains critical vulnerabilities which could lead to a complete system takeover.</p><p>The report stated that 55% of the programs worldwide are out-of-date, and Adobe Shockwave is number one of the list,</p>]]></description><link>https://www.netsecdaily.com/are-you-still-running-and-outdated-software/</link><guid isPermaLink="false">5c4aada4c0f8350dea89a45d</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Fri, 25 Jan 2019 07:02:03 GMT</pubDate><content:encoded><![CDATA[<p>A report released by Avast [<a href="https://cdn2.hubspot.net/hubfs/486579/Avast_PC_Trends_Report_2019.pdf">here</a>] reveals that millions of users are still running outdated software, some of which contains critical vulnerabilities which could lead to a complete system takeover.</p><p>The report stated that 55% of the programs worldwide are out-of-date, and Adobe Shockwave is number one of the list, followed by VLC Media player, and Skype.</p><figure class="kg-card kg-image-card"><img src="http://www.netsecdaily.com/content/images/2019/01/image.png" class="kg-image"><figcaption>Top 10 Most Out-of-Date Programs (Avast Report)</figcaption></figure><p></p><p>It was reported that among the Windows Operating Systems (OS) in use, Windows 7 was the most used OS, with a usage of 43% as compared to Windows 10 which has a usage of 40%. About 15% of the Windows 7 in use are <strong>not</strong> updated to Windows 7 Service Pack 1 (SP1), and these machines will be in danger of being targets for hackers to exploit vulnerabilities as support by Microsoft to versions of Windows 7 prior to SP1 has ended.  </p><figure class="kg-card kg-image-card"><img src="http://www.netsecdaily.com/content/images/2019/01/image-3.png" class="kg-image"><figcaption>Distribution of users for each version of Windows (Avast Report)</figcaption></figure><figure class="kg-card kg-image-card"><img src="http://www.netsecdaily.com/content/images/2019/01/image-4.png" class="kg-image"><figcaption>Distribution of Windows 7 Users (Avast Report)</figcaption></figure><p></p><p>It is important to keep programs and OS up to date to prevent the exploitation of known vulnerabilities. High profiles cases such as the Equifax Data Breach in 2017 and Maersk falling victim to ransomware have shown that the lack of scrutiny for security updates could lead to an IT and Business nightmare.</p>]]></content:encoded></item><item><title><![CDATA[iOS 12 Jailbreak Proof of Concept Published - Chinese Security Researcher]]></title><description><![CDATA[<p>A Chinese security researcher has revealed the technical details to critical vulnerabilities in Apple Safari web browser and iOS that allows a remote attacker to jailbreak and compromise an iPhoneX running iOS 12.1.12 and before versions.</p><p>The trick? The attacker only needs to trick the iPhoneX user into</p>]]></description><link>https://www.netsecdaily.com/ios-12-jailbreak-proof-of-concept-published-chinese-hacker/</link><guid isPermaLink="false">5c4907e7c0f8350dea89a439</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Thu, 24 Jan 2019 00:50:07 GMT</pubDate><content:encoded><![CDATA[<p>A Chinese security researcher has revealed the technical details to critical vulnerabilities in Apple Safari web browser and iOS that allows a remote attacker to jailbreak and compromise an iPhoneX running iOS 12.1.12 and before versions.</p><p>The trick? The attacker only needs to trick the iPhoneX user into opening a custom crafted web page using Safari!</p><iframe width="560" height="315" src="https://www.youtube.com/embed/JznReTetgOI" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>As shown in the video, a flaw in Safari allows an attacker to use a well crafted malicious web content to execute arbitrary code on the victim device, and subsequently privilege access through a second vulnerability, and finally installing an application. </p><p>Fortunately, the researcher has chosen not to publish the exploit code in an attempt to prevent malicious attacks against Apple users. It is highly recommended for iPhone users to install the latest iOS update as soon as possible in light of this discovery.</p><p>Source: <a href="http://blogs.360.cn/post/IPC%20Voucher%20UaF%20Remote%20Jailbreak%20Stage%202%20(EN).html">http://blogs.360.cn/post/IPC Voucher UaF Remote Jailbreak Stage 2 (EN).html</a></p>]]></content:encoded></item><item><title><![CDATA[Remote Code Execution in APT - Linux]]></title><description><![CDATA[<p>Cyber security blogger "Max Justicz" reported a vulnerability in Linux Advanced Package Tool (APT), where an attacker is able to achieve remote code execution in an APT operation.</p><p>*For those non-Linux users, APT is software in Linux where it manages software installations and updates, just like Windows update manager.</p><p>The</p>]]></description><link>https://www.netsecdaily.com/remote-code-execution-in-apt-apt-get-linux/</link><guid isPermaLink="false">5c47a8a9c0f8350dea89a40d</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Wed, 23 Jan 2019 00:02:48 GMT</pubDate><content:encoded><![CDATA[<p>Cyber security blogger "Max Justicz" reported a vulnerability in Linux Advanced Package Tool (APT), where an attacker is able to achieve remote code execution in an APT operation.</p><p>*For those non-Linux users, APT is software in Linux where it manages software installations and updates, just like Windows update manager.</p><p>The vulnerable versions of APT does not properly sanitize some of the parameters in the event of a HTTP redirect, therefore allowing a remote man-in-the-middle attacker to inject malicious content and the system would install the altered packages. </p><iframe width="560" height="315" src="https://www.youtube.com/embed/POrzJvtZY_g" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>HTTP redirect is used in APT when fetching packages from the primary server fails, and the location of the next server is being used to fetch the packages. APT runs as "root" in Linux, which is the user with the highest privileges in the system, therefore, a targeted attack using this vulnerability would lead to a complete system takeover by an adversary. </p><p>The developers of APT have since released version 1.4.9 that addresses the issue. It is also highly recommended that Debian or Ubuntu users should update their systems as soon as possible.</p><p>Original: <a href="https://justi.cz/security/2019/01/22/apt-rce.html">https://justi.cz/security/2019/01/22/apt-rce.html</a></p>]]></content:encoded></item><item><title><![CDATA[Tech Giant fined by France - Google]]></title><description><![CDATA[<p>Tech giant Google has been fined nearly $57 million by French regulators for violating data-privacy rules in Europe, making it the first penalty brought against an American tech company.</p><p>The French data-privacy agency known as CNIL, indicated that Google failed to disclose to their users how their personal information is</p>]]></description><link>https://www.netsecdaily.com/tech-giant-fined-by-france/</link><guid isPermaLink="false">5c45f06ec0f8350dea89a3f6</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Mon, 21 Jan 2019 16:25:19 GMT</pubDate><content:encoded><![CDATA[<p>Tech giant Google has been fined nearly $57 million by French regulators for violating data-privacy rules in Europe, making it the first penalty brought against an American tech company.</p><p>The French data-privacy agency known as CNIL, indicated that Google failed to disclose to their users how their personal information is collected the usage of it. Google also did not obtain the consent of of its users properly, the agency said.</p><p>Quoting CNIL, “Despite the measures implemented by Google, (documentation and configuration tools), the infringements observed deprive the users of essential guarantees regarding processing operations that can reveal important parts of their private life since they are based on a huge amount of data, a wide variety of services and almost unlimited possible combinations”.</p><p>Under the GDPR, EU regulators have the power to find companies as much as 20million Euros, or four percent of their annual turnover, whichever is greater.</p>]]></content:encoded></item><item><title><![CDATA[Nearly 141 Airlines Affected - Flight Booking System Flaw]]></title><description><![CDATA[A software bug affected 141 airlines, allowing unauthorized access to bookings]]></description><link>https://www.netsecdaily.com/141-airlines-affected-flight-booking-system-flaw/</link><guid isPermaLink="false">5c45861ec0f8350dea89a3cc</guid><category><![CDATA[News]]></category><dc:creator><![CDATA[Jerome]]></dc:creator><pubDate>Mon, 21 Jan 2019 09:06:03 GMT</pubDate><content:encoded><![CDATA[<p>Travelers around the world were found exposed to a critical vulnerability discovered in an online flight booking system that allowed threat actors to access and modify sensitive information such as travel details and frequent flyer details.</p><p>According to an Israeli network security researcher Noam Rotem, he discovered this vulnerability during a flight booking process. The exploitation only required the victim's Passenger Name Record (PNR) number.</p><p>After a booking is made by the passenger, the passenger will receive a unique link container a PNR which would allow them to check on their booking status. Rotem discovered that changing a value on one of the parameters in the link to someone else's PNR number would display the booking information and personal details of the passenger with that number.</p><p>Rotem was also able to write a script to brute force PNR numbers and check for validity. This meant that he had the ability to have unauthorized access to passenger details and modification flight itinerary.</p><iframe width="560" height="315" src="https://www.youtube.com/embed/yYW_N6e8Was" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>Thankfully, this was discovered by Rotem who is a researcher, not a threat actor. His actions were done in good cause, and potentially stopped a data breach from occurring. The issue has been fixed, and the exploit done by Rotem is no longer able to work.</p><p>Link to original post: <a href="https://www.safetydetective.com/blog/major-security-breach-discovered-affecting-nearly-half-of-all-airline-travelers-worldwide/">https://www.safetydetective.com/blog/major-security-breach-discovered-affecting-nearly-half-of-all-airline-travelers-worldwide/</a></p>]]></content:encoded></item></channel></rss>