ποΈ Respect in Security: Anti-harassment infosec industry group gains momentum with code of conduct campaign ποΈ
π Read
via "The Daily Swig".
Take the pledge, companies are urgedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Respect in Security: Anti-harassment infosec industry group gains momentum with code of conduct campaign
Take the pledge, companies are urged
β Conti Gang Suspected of Ransomware Attack on McMenamins β
π Read
via "Threat Post".
The incident occurred last weekend at the popular chain of restaurants, hotels and breweries, which is still facing disruptions.π Read
via "Threat Post".
Threat Post
Conti Gang Suspected of Ransomware Attack on McMenamins
The incident occurred last weekend at the popular chain of restaurants, hotels and breweries, which is still facing disruptions.
π Google OSS Fuzz π
π Read
via "Packet Storm Security".
Google's OSS Fuzz tool aims to make common open source software more secure and stable by combining modern fuzzing techniques with scalable, distributed execution.π Read
via "Packet Storm Security".
Packetstormsecurity
Google OSS Fuzz β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π TOR Virtual Network Tunneling Tool 0.4.6.9 π
π Read
via "Packet Storm Security".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.6.9 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Is Data Security Worthless if the Data Life Cycle Lacks Clarity? π΄
π Read
via "Dark Reading".
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.π Read
via "Dark Reading".
Dark Reading
Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
βΌ CVE-2021-4132 βΌ
π Read
via "National Vulnerability Database".
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')π Read
via "National Vulnerability Database".
βΌ CVE-2021-43678 βΌ
π Read
via "National Vulnerability Database".
Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45042 βΌ
π Read
via "National Vulnerability Database".
In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial of service of the storage backend. The earliest affected version is 1.4.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42584 βΌ
π Read
via "National Vulnerability Database".
A Stored Cross Site Scripting (XSS) issue exists in Convos-Chat before 6.32.π Read
via "National Vulnerability Database".
ποΈ Ukraine hosts large-scale simulation of cyber-attack against energy grid ποΈ
π Read
via "The Daily Swig".
SANS Instituteβs latest Grid NetWars competition involved 250 security pros from Ukraineπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Ukraine hosts large-scale simulation of cyber-attack against energy grid
SANS Instituteβs latest Grid NetWars competition involved 250 security pros from Ukraine
β Convergence Ahoy: Get Ready for Cloud-Based Ransomware β
π Read
via "Threat Post".
Oliver Tavakoli, CTO at Vectra AI, takes us inside the coming nexus of ransomware, supply-chain attacks and cloud deployments.π Read
via "Threat Post".
Threat Post
Convergence Ahoy: Get Ready for Cloud-Based Ransomware
Oliver Tavakoli, CTO at Vectra AI, takes us inside the coming nexus of ransomware, supply-chain attacks and cloud deployments.
β S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript] β
π Read
via "Naked Security".
Latest episode - listen now! (Yes, there are plenty of critical things to go along with Log4Shell.)π Read
via "Naked Security".
Naked Security
S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript]
Latest episode β listen now! (Yes, there are plenty of critical things to go along with Log4Shell.)
π¦Ώ How password troubles could cost your online business potential sales π¦Ώ
π Read
via "Tech Republic".
One in four online shoppers surveyed by Beyond Identity said they'd abandon a shopping cart of $100 or more if they had to reset their password to check out.π Read
via "Tech Republic".
TechRepublic
How password troubles could cost your online business potential sales
One in four online shoppers surveyed by Beyond Identity said they'd abandon a shopping cart of $100 or more if they had to reset their password to check out.
π΄ CISA Issues Emergency Directive on Log4j π΄
π Read
via "Dark Reading".
The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.π Read
via "Dark Reading".
Dark Reading
CISA Issues Emergency Directive on Log4j
The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.
π΄ Time to Reset the Idea of Zero Trust π΄
π Read
via "Dark Reading".
CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.π Read
via "Dark Reading".
Dark Reading
Time to Reset the Idea of Zero Trust
CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.
π΄ PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021 π΄
π Read
via "Dark Reading".
The "PseudoManuscrypt" operation infected some 35,000 computers with cyber-espionage malware and targeted computers in both government and private industry.π Read
via "Dark Reading".
Dark Reading
PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021
The "PseudoManuscrypt" operation infected some 35,000 computers with cyber-espionage malware and targeted computers in both government and private industry.
βΌ CVE-2021-41451 βΌ
π Read
via "National Vulnerability Database".
An HTTP/1.1 misconfiguration in web interface of TP-Link AX10v1 before V1_211117 could allow an attacker to send a specially crafted HTTP/0.9 packet that could cause a cache poisoning attack.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44035 βΌ
π Read
via "National Vulnerability Database".
Wolters Kluwer TeamMate AM 12.4 Update 1 mishandles attachment uploads, such that an authenticated user may download and execute malicious files.π Read
via "National Vulnerability Database".
π΄ Timely Questions for Log4j Response Now β And for the Future π΄
π Read
via "Dark Reading".
EXPERT INSIGHT: How to assess your exposure to the vulnerability with a combination of asset inventory, testing, solid information sources, and software bills of materials (SBOMs).π Read
via "Dark Reading".
Dark Reading
Timely Questions for Log4j Response Now β And for the Future
EXPERT INSIGHT: How to assess your exposure to the vulnerability with a combination of asset inventory, testing, solid information sources, and software bills of materials (SBOMs).
β Brand-New Log4Shell Attack Vector Threatens Local Hosts β
π Read
via "Threat Post".
The discovery, which affects services running as localhost that aren't exposed to any network or the internet, vastly widens the scope of attack possibilities.π Read
via "Threat Post".
Threat Post
Brand-New Log4Shell Attack Vector Threatens Local Hosts
The discovery, which affects services running as localhost that aren't exposed to any network or the internet, vastly widens the scope of attack possibilities.
β Serious Security: OpenSSL fixes βerror conflationβ bugs β how mixing up mistakes can lead to trouble β
π Read
via "Naked Security".
Have you ever seen the message "An error occurred"? Even worse, the message "This error cannot occur"? Facts matter!π Read
via "Naked Security".
Naked Security
Serious Security: OpenSSL fixes βerror conflationβ bugs β how mixing up mistakes can lead to trouble
Have you ever seen the message βAn error occurredβ? Even worse, the message βThis error cannot occurβ? Facts matter!