βΌ CVE-2021-43194 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2021.1.2, user enumeration was possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43199 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2021.1.2, permission checks in the Create Patch functionality are insufficient.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43192 βΌ
π Read
via "National Vulnerability Database".
In JetBrains YouTrack Mobile before 2021.2, iOS URL scheme hijacking is possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43196 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2021.1, information disclosure via the Docker Registry connection dialog is possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43198 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2021.1.2, stored XSS is possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43184 βΌ
π Read
via "National Vulnerability Database".
In JetBrains YouTrack before 2021.3.21051, stored XSS is possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43200 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2021.1.2, permission checks in the Agent Push functionality were insufficient.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43188 βΌ
π Read
via "National Vulnerability Database".
In JetBrains YouTrack Mobile before 2021.2, access token protection on iOS is incomplete.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43195 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2021.1.2, some HTTP security headers were missing.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43181 βΌ
π Read
via "National Vulnerability Database".
In JetBrains Hub before 2021.1.13690, stored XSS is possible.π Read
via "National Vulnerability Database".
π’ Avast Antivirus Free review: Our free favourite for older Windows PCs π’
π Read
via "ITPro".
Effective free antivirus thatβll work on operating systems all the way back to Windows 7π Read
via "ITPro".
IT PRO
Avast Antivirus Free review: Our free favourite for older Windows PCs | IT PRO
Effective free antivirus thatβll work on operating systems all the way back to Windows 7
π’ Sitecore XP RCE vulnerability actively exploited, ACSC warns π’
π Read
via "ITPro".
Flaw was fixed last month but hackers now moving against patching laggardsπ Read
via "ITPro".
IT PRO
Sitecore XP RCE flaw is being actively exploited, ACSC warns | IT PRO
The vulnerability was fixed last month but hackers are now moving against patching laggards
π’ Investor group snaps up McAfee for $14 billion π’
π Read
via "ITPro".
The cyber security firm is to be taken private just a year after it returned to the stock marketπ Read
via "ITPro".
IT PRO
Investor group snaps up McAfee for $14 billion | IT PRO
The cyber security firm is to be taken private just a year after it returned to the stock market
π’ Expired certificate to blame for broken Windows 11 apps π’
π Read
via "ITPro".
Microsoft has released a patch but users are still unable to access the Snipping Toolπ Read
via "ITPro".
ITPro
Expired certificate to blame for broken Windows 11 apps
Microsoft has released a patch but users are still unable to access the Snipping Tool
π’ A guide to cyber security certification and training π’
π Read
via "ITPro".
Cyber security skills are in demand from every organisation, but what training and certification is needed?π Read
via "ITPro".
IT PRO
A guide to cyber security certification and training | IT PRO
Cyber security skills are in demand from every organisation, but what training and certification is needed?
π’ Vulnerability in Linux kernel could let hackers remotely take over systems π’
π Read
via "ITPro".
Heap overflow attacks can exploit TIPC module in all common Linux distributionsπ Read
via "ITPro".
IT PRO
Vulnerability in Linux kernel could let hackers remotely take over systems | IT PRO
Heap overflow attacks can exploit TIPC module in all common Linux distributions
π’ What is Maze ransomware? π’
π Read
via "ITPro".
This Windows ransomware has targeted many organisations worldwideπ Read
via "ITPro".
IT PRO
What is Maze ransomware? | IT PRO
This Windows ransomware has targeted many organisations worldwide
π’ US government sanctions crypto-exchange Chatex over ransomware allegations π’
π Read
via "ITPro".
Treasury department moves to sanction another exchange following restriction of Suex in Septemberπ Read
via "ITPro".
IT PRO
US Treasury sanctions crypto exchange Chatex over ransomware ties | IT PRO
The move comes after the US government sanctioned the Suex exchange in September
π’ Proofpoint impersonator steal Microsoft, Google logins in phishing campaign π’
π Read
via "ITPro".
Clever hackers dodged Microsoft security by pretending to be a cyber security firmπ Read
via "ITPro".
ITPro
Proofpoint impersonator steal Microsoft, Google logins in phishing campaign
Clever hackers dodged Microsoft security by pretending to be a cyber security firm
π’ Researcher awarded $50,000 for discovering Samsung Galaxy S21 hack π’
π Read
via "ITPro".
UK researcher Sam Thomas won the Pwn2Own bounty using a "unique three-bug chain"π Read
via "ITPro".
IT PRO
Researcher awarded $50,000 for discovering Samsung Galaxy S21 hack | IT PRO
UK researcher Sam Thomas won the Pwn2Own bounty using a "unique three-bug chain"
π’ Counting the consequences of cyber attacks π’
π Read
via "ITPro".
How can governments respond to the growing risk of online attacks by hostile nations?π Read
via "ITPro".
IT PRO
Counting the consequences of cyber attacks | IT PRO
How can governments respond to the growing risk of online attacks by hostile nations?