π’ Google, Facebook fined β¬210 million for making it difficult for users to reject cookies π’
π Read
via "ITPro".
Data regulator CNIL gives companies three months to provide a system for refusing cookies that is as easy as single click consentπ Read
via "ITPro".
IT PRO
Google, Facebook fined β¬210 million for making it difficult for users to reject cookies | IT PRO
Data regulator CNIL gives companies three months to provide a system for refusing cookies that is as easy as single click consent
π΄ IT/OT Convergence Is More Than a Catchy Phrase π΄
π Read
via "Dark Reading".
The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.π Read
via "Dark Reading".
Dark Reading
IT/OT Convergence Is More Than a Catchy Phrase
The most successful strategies for protecting IT and OT from growing threats will include use of both the ISO 27000 series and ISA/IEC 62443 family of standards.
π΄ Cerberus Sentinel Acquires True Digital Security π΄
π Read
via "Dark Reading".
US cybersecurity services firm expands security services and network monitoring capabilities.π Read
via "Dark Reading".
Dark Reading
Cerberus Sentinel Acquires True Digital Security
US cybersecurity services firm expands security services and network monitoring capabilities.
π΄ MSP Thrive Acquires InCare Technologies π΄
π Read
via "Dark Reading".
Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States.π Read
via "Dark Reading".
Dark Reading
MSP Thrive Acquires InCare Technologies
Partnership extends Thrive's cloud and cybersecurity managed services platform to clients in the southern United States.
β Cyberattackers Hit Data of 80K Fertility Patients β
π Read
via "Threat Post".
Fertility Centers of Illinois' security measures protected electronic medical records, but the attackers still got at extremely intimate data in admin files.π Read
via "Threat Post".
Threat Post
Cyberattackers Hit Data of 80K Fertility Patients
FCI's security measures protected its electronic medical record system, but the attackers still got at extremely intimate data found in administrative files.
π΄ NHS Warns of Attackers Targeting Log4j Flaws in VMware Horizon π΄
π Read
via "Dark Reading".
An unknown threat group has been observed attacking VMware Horizon servers running versions with Log4j vulnerabilities.π Read
via "Dark Reading".
Dark Reading
NHS Warns of Attackers Targeting Log4j Flaws in VMware Horizon
An unknown threat group has been observed attacking VMware Horizon servers running versions with Log4j vulnerabilities.
β EoL Systems Stonewalling Log4j Fixes for Fed Agencies β
π Read
via "Threat Post".
End of life, end of support, pandemic-induced shipping delays and remote work, scanning failures: Itβs a recipe for a patching nightmare, federal cyberserurity CTO Matt Keller says.π Read
via "Threat Post".
Threat Post
EoL Systems Stonewalling Log4j Fixes for Fed Agencies
End of life, end of support, pandemic-induced shipping delays and remote work, scanning failures: Itβs a recipe for a patching nightmare, federal cybersecurity CTO Matt Keller says.
β Honda cars in flashback to 2002 β βCanβt Get You Out Of My Headβ β
π Read
via "Naked Security".
Where were YOU on the night of 17 May 2002? And what about the day after that?π Read
via "Naked Security".
Naked Security
Honda cars in flashback to 2002 β βCanβt Get You Out Of My Headβ
Where were YOU on the night of 17 May 2002? And what about the day after that?
βοΈ Norton 360 Now Comes With a Cryptominer βοΈ
π Read
via "Krebs on Security".
Norton 360, one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers' computers. Norton's parent firm says the cloud-based service that activates the program and enables customers to profit from the scheme -- in which the company keeps 15 percent of any currencies mined -- is "opt-in," meaning users have to agree to enable it. But many Norton users complain the mining program is difficult to remove, and reactions from longtime customers have ranged from unease and disbelief to, "Dude, where's my crypto?"π Read
via "Krebs on Security".
Krebsonsecurity
Norton 360 Now Comes With a Cryptominer
Norton 360, one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers' computers. Norton's parent firm says the cloud-based service that activates the program and enables customers to profitβ¦
π’ Simple Active Directory tweak helps block BlackMatter ransomware attacks π’
π Read
via "ITPro".
Security researchers reverse engineer the infamous ransomware strain and discover a way to stymie its file encryption process, even if it reaches a corporate networkπ Read
via "ITPro".
IT PRO
Simple Active Directory tweak helps block BlackMatter ransomware attacks | IT PRO
Security researchers reverse engineer the infamous ransomware strain and discover a way to stymie its file encryption process, even if it reaches a corporate network
ποΈ The blame game: EU criticized for βfragmented and slowβ approach to cyber-attack attribution ποΈ
π Read
via "The Daily Swig".
Cyber sanctions can send a powerful message β why arenβt they being used more widely?π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
The blame game: EU criticized for βfragmented and slowβ approach to cyber-attack attribution
Cyber sanctions can send a powerful message β why arenβt they being used more widely?
π¦Ώ URL parsing: A ticking time bomb of security exploits π¦Ώ
π Read
via "Tech Republic".
The modern world would grind to a halt without URLs, but years of inconsistent parsing specifications have created an environment ripe for exploitation that puts countless businesses at risk.π Read
via "Tech Republic".
TechRepublic
URL parsing: A ticking time bomb of security exploits
The modern world would grind to a halt without URLs, but years of inconsistent parsing specifications have created an environment ripe for exploitation that puts countless businesses at risk.
ποΈ City of Grass Valley, California, suffers data breach β employee and citizen information exposed ποΈ
π Read
via "The Daily Swig".
Social Security numbers and medical information has been accessed, city confirmsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
City of Grass Valley, California, suffers data breach β employee and citizen information exposed
Social Security numbers and medical information has been accessed, city confirms
βΌ CVE-2022-22270 βΌ
π Read
via "National Vulnerability Database".
An implicit Intent hijacking vulnerability in Dialer prior to SMR Jan-2022 Release 1 allows unprivileged applications to access contact information.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40026 βΌ
π Read
via "National Vulnerability Database".
There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22268 βΌ
π Read
via "National Vulnerability Database".
Incorrect implementation of Knox Guard prior to SMR Jan-2022 Release 1 allows physically proximate attackers to temporary unlock the Knox Guard via Samsung DeX mode.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45231 βΌ
π Read
via "National Vulnerability Database".
A link following privilege escalation vulnerability in Trend Micro Apex One (on-prem and SaaS) and Trend Micro Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to create a specially crafted file with arbitrary content which could grant local privilege escalation on the affected system. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22287 βΌ
π Read
via "National Vulnerability Database".
Abitrary file access vulnerability in Samsung Email prior to 6.1.60.16 allows attacker to read isolated data in sandbox.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40004 βΌ
π Read
via "National Vulnerability Database".
The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46054 βΌ
π Read
via "National Vulnerability Database".
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).π Read
via "National Vulnerability Database".
βΌ CVE-2022-22272 βΌ
π Read
via "National Vulnerability Database".
Improper authorization in TelephonyManager prior to SMR Jan-2022 Release 1 allows attackers to get IMSI without READ_PRIVILEGED_PHONE_STATE permissionπ Read
via "National Vulnerability Database".