βΌ CVE-2021-40214 βΌ
π Read
via "National Vulnerability Database".
Gibbon v22.0.00 suffers from a stored XSS vulnerability within the wall messages component.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27970 βΌ
π Read
via "National Vulnerability Database".
Yandex Browser before 20.10.0 allows remote attackers to spoof the address barπ Read
via "National Vulnerability Database".
π¦Ώ Protect your endpoints with top EDR software π¦Ώ
π Read
via "Tech Republic".
Endpoint detection and response (EDR) software detects and identifies threats on network-connected devices. Compare features of top EDR tools.π Read
via "Tech Republic".
TechRepublic
5 Best Endpoint Detection & Response (EDR) Solutions for 2024
What is the best EDR software for your business? Use our guide to review our picks of the best EDR tools.
π¦Ώ 5 ways to better prepare your organization for a ransomware attack π¦Ώ
π Read
via "Tech Republic".
Most executives cite ransomware as their biggest security concern but few have run simulated attacks to prepare, says Deloitte.π Read
via "Tech Republic".
TechRepublic
5 ways to better prepare your organization for a ransomware attack
Most executives cite ransomware as their biggest security concern but few have run simulated attacks to prepare, says Deloitte.
ποΈ Fraudster handed 11-year prison term for role in North Korean cybercrime operation ποΈ
π Read
via "The Daily Swig".
Defendant ordered to pay $30m in restitution to victimsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Fraudster handed 11-year prison term for role in North Korean cybercrime operation
Defendant ordered to pay $30m in restitution to victims
π¦Ώ How to use mkcert to create locally signed SSL certificates π¦Ώ
π Read
via "Tech Republic".
Jack Wallen shows you how to use mkcert. If you need to generate quick SSL certificates for test servers and services, this might be the fastest option available.π Read
via "Tech Republic".
TechRepublic
How to use mkcert to create locally signed SSL certificates
Jack Wallen shows you how to use mkcert. If you need to generate quick SSL certificates for test servers and services, this might be the fastest option available.
βΌ CVE-2021-29643 βΌ
π Read
via "National Vulnerability Database".
PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32137 βΌ
π Read
via "National Vulnerability Database".
Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32132 βΌ
π Read
via "National Vulnerability Database".
The abst_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32134 βΌ
π Read
via "National Vulnerability Database".
The gf_odf_desc_copy function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32135 βΌ
π Read
via "National Vulnerability Database".
The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.π Read
via "National Vulnerability Database".
β Serious Security: How to make sure you donβt miss bug reports! β
π Read
via "Naked Security".
Hey, let's create a text file that lists our security contacts! We'll call it... security DOT txt.π Read
via "Naked Security".
Naked Security
Serious Security: How to make sure you donβt miss bug reports!
Hey, letβs create a text file that lists our security contacts! Weβll call itβ¦ security DOT txt.
β S3 Ep49: Poison PACs, pointless alarms and phunky bugs [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep49: Poison PACs, pointless alarms and phunky bugs [Podcast]
Latest episode β listen now!
π¦Ώ IoT device attacks double in the first half of 2021, and remote work may shoulder some of the blame π¦Ώ
π Read
via "Tech Republic".
The smart home could be ripe for IoT device attacks as cybercriminals rake in record ransomware payments. Remote work may be responsible for the increase in attacks, Kaspersky says.π Read
via "Tech Republic".
β Honing Cybersecurity Strategy When Everyoneβs a Target for Ransomware β
π Read
via "Threat Post".
Aamir Lakhani, researcher at FortiGuard Labs, explains why organizations must extend cyber-awareness training across the entire enterprise, from Luddites to the C-suite.π Read
via "Threat Post".
Threat Post
Honing Cybersecurity Strategy When Everyoneβs a Target for Ransomware
Aamir Lakhani, researcher at FortiGuard Labs, explains why organizations must extend cyber-awareness training across the entire enterprise, from Luddites to the C-suite.
β WooCommerce Multi Currency Bug Allows Shoppers to Change eCommerce Pricing β
π Read
via "Threat Post".
The security vulnerability can be exploited with a malicious CSV file.π Read
via "Threat Post".
Threat Post
WooCommerce Multi Currency Bug Allows Shoppers to Change eCommerce Pricing
The security vulnerability can be exploited with a malicious CSV file.
β WhatsAppβs End-to-End Encryption Isnβt Actually Broken β
π Read
via "Threat Post".
WhatsAppβs moderators sent messages flagged by intended recipients. Researchers say this isn't concerning -- yet.π Read
via "Threat Post".
π¦Ώ How to utilize openssl in Linux to check SSL certificate details π¦Ώ
π Read
via "Tech Republic".
SSL certificates are an integral component in securing data and connectivity to other systems. Learn tips on how you can use the Linux openssl command to find critical certificate details.π Read
via "Tech Republic".
TechRepublic
How to utilize openssl in Linux to check SSL certificate details
SSL certificates are an integral component in securing data and connectivity to other systems. Learn tips on how you can use the Linux openssl command to find critical certificate details.
β REvilβs Back; Coder Fat-Fingered Away Its Decryptor Key β
π Read
via "Threat Post".
How did Kaseya get a universal decryptor after a mind-bogglingly big ransomware attack? A REvil coder misclicked, generated & issued it, and βThatβs how we sh*t ourselves.βπ Read
via "Threat Post".
Threat Post
REvilβs Back; Coder Fat-Fingered Away Its Decryptor Key?
How did Kaseya get a universal decryptor after a mind-bogglingly big ransomware attack? A REvil coder misclicked, generated & issued it, and βThatβs how we sh*t ourselves.β
π Jury Convicts Ex-Employee in Tech Trade Secret Theft Case π
π Read
via "".
The conviction came just days before National Insider Threat Awareness Month, a government campaign designed to boost awareness around insider threats and identifying risky behavior.π Read
via "".
Digital Guardian
Jury Convicts Ex-Employee in Tech Trade Secret Theft Case
The conviction came just days before National Insider Threat Awareness Month, a government campaign designed to boost awareness around insider threats and identifying risky behavior.
βΌ CVE-2021-24621 βΌ
π Read
via "National Vulnerability Database".
The WP Courses LMS WordPress plugin before 2.0.44 does not sanitise its Video Embed Code, allowing malicious code to be injected in it by high privilege users, even when the unfiltered_html capability is disallowed, which could lead to Stored Cross-Site Scripting issuesπ Read
via "National Vulnerability Database".