βΌ CVE-2020-22617 βΌ
π Read
via "National Vulnerability Database".
Ardour v5.12 contains a use-after-free vulnerability in the component ardour/libs/pbd/xml++.cc when using xmlFreeDoc and xmlXPathFreeContext.π Read
via "National Vulnerability Database".
βΌ CVE-2021-30630 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2021-30628 βΌ
π Read
via "National Vulnerability Database".
Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2021-30633 βΌ
π Read
via "National Vulnerability Database".
Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.π Read
via "National Vulnerability Database".
π’ The IT Pro Podcast: Behind the scenes of the Solarwinds hack π’
π Read
via "ITPro".
We speak to the companyβs top execs to find out what really happenedπ Read
via "ITPro".
IT PRO
The IT Pro Podcast: Behind the scenes of the Solarwinds hack | IT PRO
We speak to the companyβs top execs to find out what really happened
π’ Maverick fast-attack ransomware group FIN12 is quickly expanding π’
π Read
via "ITPro".
FIN12 hits hospitals even during pandemicπ Read
via "ITPro".
IT PRO
Maverick fast-attack ransomware group FIN12 is quickly expanding | IT PRO
FIN12 hits hospitals even during pandemic
π’ What is NotPetya? π’
π Read
via "ITPro".
We take a look at the malware that first came to prominence in 2016 and targets Windows-based machinesπ Read
via "ITPro".
IT PRO
What is NotPetya? | IT PRO
We take a look at the malware that first came to prominence in 2016 and targets Windows-based machines
π’ 2021 Thales access management index: Global edition π’
π Read
via "ITPro".
The challenges of trusted access in a cloud-first worldπ Read
via "ITPro".
IT PRO
2021 Thales access management index: Global edition
The challenges of trusted access in a cloud-first world
π’ Twitch confirms data breach after server configuration error π’
π Read
via "ITPro".
The popular streaming service says there's no indication that login information has been exposedπ Read
via "ITPro".
IT PRO
Twitch confirms data breach after server configuration error | IT PRO
The popular streaming service says there's no indication that login information has been exposed
π’ Why is the energy sector so vulnerable to hacking? π’
π Read
via "ITPro".
Highly-targeted energy companies often struggle to attract the right cyber security skills and rely on dated systemsπ Read
via "ITPro".
IT PRO
Why is the energy sector so vulnerable to hacking? | IT PRO
Highly-targeted energy companies often struggle to attract the right cyber security skills and rely on dated systems
π’ SolarWinds hackers stole US sanctions policy data, Microsoft confirms π’
π Read
via "ITPro".
Unconfirmed reports also suggest data on threat hunting techniques, assessments of Russian threat actors, and source codes were also accessedπ Read
via "ITPro".
ITPro
SolarWinds hackers stole US sanctions policy data, Microsoft confirms
Unconfirmed reports also suggest data on threat hunting techniques, assessments of Russian threat actors, and source codes were also accessed
π’ Google will auto-enrol 150 million users in 2FA by end of 2021 π’
π Read
via "ITPro".
An additional two million YouTube creators will also be required to switch it on the 2SV feature by the end of the yearπ Read
via "ITPro".
IT PRO
Google will auto-enrol 150 million users in 2FA by end of 2021 | IT PRO
An additional two million YouTube creators will also be required to switch it on the 2SV feature by the end of the year
π’ How to become a cyber security expert π’
π Read
via "ITPro".
With cyber security professionals in high demand, we explore the steps people need to take to pursue a successful career in this industryπ Read
via "ITPro".
IT PRO
How to become a cyber security expert | IT PRO
With cyber security professionals in high demand, we explore the steps people need to take to pursue a successful career in this industry
π’ Best free malware removal tools 2021 π’
π Read
via "ITPro".
Worried your device is infected? Here are the tools you need to get rid of malicious softwareπ Read
via "ITPro".
ITPro
6 of the best free malware removal tools in 2023
Worried your device is infected? Here are some of the best free malware removal tools at your disposal in 2023
π’ Senator to introduce new bill to force ransomware payment disclosures π’
π Read
via "ITPro".
Organizations would have 48 hours to inform DHSπ Read
via "ITPro".
IT PRO
Senator to introduce new bill to force ransomware payment disclosures | IT PRO
Organizations would have 48 hours to inform DHS
π’ Swimlane unveils its low-code security automation platform π’
π Read
via "ITPro".
Swimlane Cloud is available as an on-premises, air-gapped, cloud, or hybrid solutionπ Read
via "ITPro".
IT PRO
Swimlane unveils its low-code security automation platform | IT PRO
Swimlane Cloud is available as an on-premises, air-gapped, cloud, or hybrid solution
π’ Identity Automation launches credential breach monitoring service π’
π Read
via "ITPro".
New monitoring solution adds to the firmβs flagship RapidIdentity platformπ Read
via "ITPro".
IT PRO
Identity Automation launches credential breach monitoring service | IT PRO
New monitoring solution adds to the firmβs flagship RapidIdentity platform
π’ What is HTTP error 503 and how do you fix it? π’
π Read
via "ITPro".
It may not always be obvious what's causing the issue, but there are steps you can take to get back onlineπ Read
via "ITPro".
ITPro
What is HTTP error 503 and how do you fix it?
The cause of HTTP error 503 might be hard to find, but there are steps you can take to resume website access
π’ BrewDog app flaw exposed data on 200,000 shareholders and customers, researchers claim π’
π Read
via "ITPro".
Researchers at Pen Test Partners say API token exploit could have allowed hackers to access personal information and account detailsπ Read
via "ITPro".
IT PRO
BrewDog app flaw exposed data on 200,000 shareholders and customers, researchers claim | IT PRO
Researchers at Pen Test Partners say API token exploit could have allowed hackers to access personal information and account details
π’ Only a third of businesses have taken out insurance against ransomware attacks π’
π Read
via "ITPro".
Almost one in six also reported having no disaster recovery plan in placeπ Read
via "ITPro".
IT PRO
Only a third of businesses have taken out insurance against ransomware attacks | IT PRO
Almost one in six also reported having no disaster recovery plan in place