π’ Apple patches zero-day flaw abused by infamous NSO exploit π’
π Read
via "ITPro".
The ForcedEntry flaw affects all Apple devices and allows hackers to compromise systems without any user interactionπ Read
via "ITPro".
ITPro
Apple patches zero-day flaw abused by infamous NSO exploit
The ForcedEntry flaw affects all Apple devices and allows hackers to compromise systems without any user interaction
π’ WhatsApp activates end-to-end encrypted cloud backups π’
π Read
via "ITPro".
The messaging service will grant users a password-protected key when they save their chat histories to the cloudπ Read
via "ITPro".
IT PRO
WhatsApp activates end-to-end encrypted cloud backups | IT PRO
The messaging service will grant users a password-protected key when they save their chat histories to the cloud
π’ Dual citizen sentenced to 11 years for role in North Korean crypto hacking scheme π’
π Read
via "ITPro".
Ontario resident laundered cash for North Korea from bank heists and BEC scamsπ Read
via "ITPro".
IT PRO
Dual citizen sentenced to 11 years for laundering money | IT PRO
Ontario resident laundered cash for North Korea from bank heists and BEC scams
π’ Olympus hit by suspected ransomware attack π’
π Read
via "ITPro".
The former digital camera specialist has shut down its networks in Europe, Africa and the Middle East while it investigates the incidentπ Read
via "ITPro".
IT PRO
Olympus hit by suspected ransomware attack | IT PRO
The former digital camera specialist has shut down its networks in Europe, Africa and the Middle East while it investigates the incident
π’ Irish data regulator fails to resolve 98% of big tech GDPR cases π’
π Read
via "ITPro".
Campaigners accuse the Irish DPC of being the βbottleneckβ for GDPR enforcement with 160 unresolved complaintsπ Read
via "ITPro".
IT PRO
Irish data regulator fails to resolve 98% of big tech GDPR cases | IT PRO
Campaigners accuse the Irish DPC of being the βbottleneckβ for GDPR enforcement with 160 unresolved complaints
π’ Google handed user data to Hong Kong authorities despite pledge π’
π Read
via "ITPro".
The tech giant last year said it would suspend the processing of user data requests from the Hong Kong government after a law that criminalised protests was introducedπ Read
via "ITPro".
IT PRO
Google handed user data to Hong Kong authorities despite pledge | IT PRO
The tech giant last year said it would suspend the processing of user data requests from the Hong Kong government after a law that criminalised protests was introduced
π’ Medigate and CrowdStrike bolster IoT medical device security π’
π Read
via "ITPro".
CrowdStrike will integrate its Falcon software with Medigateβs device security platformπ Read
via "ITPro".
IT PRO
Medigate and CrowdStrike team to bolster IoT medical devicesβ security | IT PRO
CrowdStrike will integrate its Falcon software with Medigateβs device security platform
π’ Hackers develop Linux port of Cobalt Strike for new attacks π’
π Read
via "ITPro".
The modified version of the penetration testing toolkit can evade malware detectionπ Read
via "ITPro".
IT PRO
Hackers develop Linux port of Cobalt Strike for new attacks | IT PRO
The modified version of the penetration testing toolkit can evade malware detection
π’ BT conducts 'world's first' trial of quantum-secure communications π’
π Read
via "ITPro".
The achievement was made possible using hollow-core fibre cable provided by a Southampton Uni startupπ Read
via "ITPro".
IT PRO
BT conducts 'world's first' trial of quantum-secure communications | IT PRO
The achievement was made possible using hollow-core fibre cable provided by a Southampton Uni startup
π’ Robust password policies cut cyber attacks by 60% π’
π Read
via "ITPro".
Research shows that hackers most often use brute force password attacks and flaw exploitationπ Read
via "ITPro".
IT PRO
Better patch management and password policies cut cyber attacks by 60% | IT PRO
New research shows that hackers most often use brute force password attacks and flaw exploitation
π’ The most secure email services of 2021 π’
π Read
via "ITPro".
Email is not secure by design, but these email providers allow you to send emails with top-level securityπ Read
via "ITPro".
IT PRO
The most secure email services of 2021 | IT PRO
Email is not secure by design, but these email providers allow you to send emails with top-level security
π’ Smishing attacks increased 700% in first six months of 2021 π’
π Read
via "ITPro".
Which? has urged businesses to play their part to protect people from text message scamsπ Read
via "ITPro".
IT PRO
Smishing attacks increased 700% in first six months of 2021 | IT PRO
Which? has urged businesses to play their part to protect people from text message scams
π’ IoT devices are more vulnerable than ever π’
π Read
via "ITPro".
Ove a billion attacks recorded on IoT devices in the first six months of the yearπ Read
via "ITPro".
IT PRO
IoT devices are more vulnerable than ever | IT PRO
Ove a billion attacks recorded on IoT devices in the first six months of the year
ποΈ Credential leak fears raised following security breach at Travis CI ποΈ
π Read
via "The Daily Swig".
DevOps firm slammed for βabysmalβ incident responseπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Credential leak fears raised following security breach at Travis CI
DevOps firm slammed for βabysmalβ incident response
β Attackers Impersonate DoT in Two-Day Phishing Scam β
π Read
via "Threat Post".
Threat actors dangled the lure of receiving funds from the $1 trillion infrastructure bill and created new domains mimicking the real federal site.π Read
via "Threat Post".
Threat Post
Attackers Impersonate DoT in Two-Day Phishing Scam
Threat actors dangled the lure of receiving funds from the $1 trillion infrastructure bill and created new domains mimicking the real federal site.
ποΈ Supply chain attacks against the open source ecosystem soar by 650% β report ποΈ
π Read
via "The Daily Swig".
Dependency confusion has quickly become the attack technique of choiceπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Supply chain attacks against the open source ecosystem soar by 650% β report
Dependency confusion has quickly become the attack technique of choice
βΌ CVE-2021-38656 βΌ
π Read
via "National Vulnerability Database".
Microsoft Word Remote Code Execution Vulnerabilityπ Read
via "National Vulnerability Database".
βΌ CVE-2021-38647 βΌ
π Read
via "National Vulnerability Database".
Open Management Infrastructure Remote Code Execution Vulnerabilityπ Read
via "National Vulnerability Database".
βΌ CVE-2021-36965 βΌ
π Read
via "National Vulnerability Database".
Windows WLAN AutoConfig Service Remote Code Execution Vulnerabilityπ Read
via "National Vulnerability Database".
βΌ CVE-2021-38638 βΌ
π Read
via "National Vulnerability Database".
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38628.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38650 βΌ
π Read
via "National Vulnerability Database".
Microsoft Office Spoofing Vulnerabilityπ Read
via "National Vulnerability Database".