βΌ CVE-2021-4130 βΌ
π Read
via "National Vulnerability Database".
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
βΌ CVE-2021-4131 βΌ
π Read
via "National Vulnerability Database".
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
βΌ CVE-2021-45105 βΌ
π Read
via "National Vulnerability Database".
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.π Read
via "National Vulnerability Database".
π’ Industry working group aims to standardize blockchain 'Identity of Things' π’
π Read
via "ITPro".
Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devicesπ Read
via "ITPro".
IT PRO
Industry working group aims to standardize blockchain 'Identity of Things' | IT PRO
Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devices
π’ Sennheiser exposed personal data of 28,000 customers with leaky S3 bucket π’
π Read
via "ITPro".
Server containing full names, email addresses, phone numbers, and supplier information was left open to the public for three yearsπ Read
via "ITPro".
IT PRO
Sennheiser exposed personal data of 28,000 customers with leaky S3 bucket | IT PRO
Server containing full names, email addresses, phone numbers, and supplier information was left open to the public for three years
π’ Kronos services knocked offline by ransomware attack π’
π Read
via "ITPro".
The popular human resources solutions provider has admitted that it may take "several weeks" to recoverπ Read
via "ITPro".
IT PRO
Kronos services knocked offline by ransomware attack | IT PRO
The popular human resources solutions provider has admitted that it may take "several weeks" to recover
π’ Gumtree site code made personal data of users and sellers publicly accessible π’
π Read
via "ITPro".
Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts websiteπ Read
via "ITPro".
IT PRO
Gumtree site code made personal data of users and sellers publicly accessible | IT PRO
Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website
π1
π’ Ransomware groups will target smaller businesses in 2022 - report π’
π Read
via "ITPro".
Scrutiny from law enforcement is causing groups to change tack, says analystπ Read
via "ITPro".
IT PRO
Ransomware groups will target smaller businesses in 2022 - report | IT PRO
Scrutiny from law enforcement is causing groups to change tack, says analyst
π’ Meta expands bug bounty programme to cover data scraping π’
π Read
via "ITPro".
The move comes two years after a massive scraping incident on Facebook that resulted in data leaking onlineπ Read
via "ITPro".
IT PRO
Meta expands bug bounty programme to cover data scraping | IT PRO
The move comes two years after a massive scraping incident on Facebook that resulted in data leaking online
π’ What is the Log4Shell vulnerability? π’
π Read
via "ITPro".
The critical flaw affecting products built using Java is set to cause headaches in the enterprise for months to comeπ Read
via "ITPro".
ITPro
What is the Log4Shell vulnerability?
The critical flaw affecting products built using Java is set to cause headaches in the enterprise for months to come
π’ Australia and US sign CLOUD Act data-sharing deal to support criminal investigations π’
π Read
via "ITPro".
The legislation allows law enforcement to simplify the process of obtaining electronic data from another countryπ Read
via "ITPro".
IT PRO
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations | IT PRO
The legislation allows law enforcement to simplify the process of obtaining electronic data from another country
π’ Google to rollout AI-based security across three UK airports π’
π Read
via "ITPro".
Airports in Aberdeen, Glasgow, and Southampton will test a tool designed to make it easier to spot suspicious packagesπ Read
via "ITPro".
IT PRO
Google to rollout AI-based security across three UK airports | IT PRO
Airports in Aberdeen, Glasgow, and Southampton will test a tool designed to make it easier to spot suspicious packages
π’ Lenovo ThinkPads vulnerable to privilege escalation exploit, researchers warn π’
π Read
via "ITPro".
A component running on the popular business computers is vulnerable to a chained exploit that grants full access to attackersπ Read
via "ITPro".
IT PRO
Lenovo ThinkPads vulnerable to privilege escalation exploit, researchers warn | IT PRO
A component running on the popular business computers is vulnerable to a chained exploit that grants full access to attackers
π’ HMRC suffered 17 data breaches over 15 months π’
π Read
via "ITPro".
According to a recent report, the breaches affected more than 3,000 individualsπ Read
via "ITPro".
IT PRO
HMRC suffered 17 data breaches over 15 months | IT PRO
According to a recent report, the breaches affected more than 3,000 individuals
π’ UK joint committee calls for tougher rules for tech giants π’
π Read
via "ITPro".
However, IT industry experts suggest Online Safety Bill proposals aren't clear enough for everyday usersπ Read
via "ITPro".
IT PRO
UK joint committee calls for tougher rules for tech giants | IT PRO
However, IT industry experts suggest Online Safety Bill proposals aren't clear enough for everyday users
π’ Egyptian exiles targeted with Predator spyware resembling NSO Group's Pegasus π’
π Read
via "ITPro".
A high-profile politician and journalist have been targeted with spyware likely spread using WhatsApp messagesπ Read
via "ITPro".
IT PRO
Egyptian exiles targeted with Predator spyware resembling NSO Group's Pegasus | IT PRO
A high-profile politician and journalist have been targeted with spyware likely spread using WhatsApp messages
π’ How to turn on Windows Defender π’
π Read
via "ITPro".
Find out how to switch on Windows Defender in Windows 10 and older versions of the OSπ Read
via "ITPro".
ITPro
How to turn on Windows Defender
A simple guide on how to turn on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary
π’ How do hackers choose their targets? π’
π Read
via "ITPro".
We explore what goes on in the minds of cyber criminalsπ Read
via "ITPro".
IT PRO
How do hackers choose their targets? | IT PRO
We explore what goes on in the minds of cyber criminals
π’ Skip the three words thing, go straight for the βuse a password manager, dammitβ jugular π’
π Read
via "ITPro".
Why you can do so much better than the three-random-word rule thatβs still being churned out by the NCSCπ Read
via "ITPro".
IT PRO
Skip the three words thing, go straight for the βuse a password manager, dammitβ jugular | IT PRO
Why you can do so much better than the three-random-word rule thatβs still being churned out by the NCSC
π’ Five things to consider before choosing an MFA solution π’
π Read
via "ITPro".
Because we all should move on from using βpasswordβ as a password!π Read
via "ITPro".
IT PRO
Five things to consider before choosing an MFA solution | IT PRO
Because we all should move on from using βpasswordβ as a password!
π’ UK unveils Β£2.6 billion National Cyber Strategy π’
π Read
via "ITPro".
The strategy prioritises investing in the UK's cyber skills, improving cyber security responses, and disrupting state-backed cyber attacksπ Read
via "ITPro".
IT PRO
UK unveils Β£2.6 billion National Cyber Strategy | IT PRO
The strategy prioritises investing in the UK's cyber skills, improving cyber security responses, and disrupting state-backed cyber attacks