π΄ 8 Security Dinosaurs and What Filled Their Footprints π΄
π Read
via "Dark Reading".
Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.π Read
via "Dark Reading".
Dark Reading
8 Security Dinosaurs and What Filled Their Footprints
Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.
π΄ Olympic Athletes Advised by FBI to Bring 'Burner' Phones to Beijing π΄
π Read
via "Dark Reading".
No specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.π Read
via "Dark Reading".
Dark Reading
Olympic Athletes Advised by FBI to Bring 'Burner' Phones to Beijing
No specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.
ποΈ Critical vulnerability in WordPress plugin Essential Addons for Elementor ποΈ
π Read
via "The Daily Swig".
Local file inclusion, remote code execution attacks π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Critical vulnerability in WordPress plugin Essential Addons for Elementor
Local file inclusion, remote code execution attacks
β Elementor WordPress plugin has a gaping security hole β update now β
π Read
via "Naked Security".
We shouldn't need to say, "Check your inputs!" these days, but we're saying it anyway.π Read
via "Naked Security".
Naked Security
Elementor WordPress plugin has a gaping security hole β update now
We shouldnβt need to say, βCheck your inputs!β these days, but weβre saying it anyway.
π΄ The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders π΄
π Read
via "Dark Reading".
The effect is nuanced β and fundamental to cyber defense for organizations and nations.π Read
via "Dark Reading".
Dark Reading
The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders
The effect is nuanced β and fundamental to cyber defense for organizations and nations.
βΌ CVE-2021-42633 βΌ
π Read
via "National Vulnerability Database".
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42641 βΌ
π Read
via "National Vulnerability Database".
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42639 βΌ
π Read
via "National Vulnerability Database".
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42637 βΌ
π Read
via "National Vulnerability Database".
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42640 βΌ
π Read
via "National Vulnerability Database".
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42642 βΌ
π Read
via "National Vulnerability Database".
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer.π Read
via "National Vulnerability Database".
π΄ Managing Detections is Not the Same as Stopping Breaches π΄
π Read
via "Dark Reading".
Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.π Read
via "Dark Reading".
Dark Reading
Managing Detections Is Not the Same as Stopping Breaches
Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.
β Supply-Chain Security Is Not a Problemβ¦Itβs a Predicament β
π Read
via "Threat Post".
Despite what security vendors might say, there is no way to comprehensively solve our supply-chain security challenges, posits JupiterOne CISO Sounil Yu. We can only manage them.π Read
via "Threat Post".
Threat Post
Supply-Chain Security Is Not a Problemβ¦Itβs a Predicament
Despite what security vendors might say, there is no way to comprehensively solve our supply-chain security challenges, posits JupiterOne CISO Sounil Yu. We can only manage them.
π Engineering Data Protection by Design π
π Read
via "".
Appropriate safeguards, both technical and organizational, must be integrated into data processing operations from the very early steps.π Read
via "".
Digital Guardian
Engineering Data Protection by Design
Appropriate safeguards, both technical and organizational, must be integrated into data processing operations from the very early steps.
βΌ CVE-2021-39021 βΌ
π Read
via "National Vulnerability Database".
IBM Guardium Data Encryption (GDE) 5.0.0.2 behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which could facilitate username enumeration. IBM X-Force ID: 213856.π Read
via "National Vulnerability Database".
π΄ WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm π΄
π Read
via "Dark Reading".
More than 1,300 malicious npm packages have been discovered for use in supply chain attacks, cryptojacking, data stealing, and more.π Read
via "Dark Reading".
Dark Reading
WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm
More than 1,300 malicious npm packages have been discovered for use in supply chain attacks, cryptojacking, data stealing, and more.
π΄ Foresite Cybersecurity Acquires Cyber Lantern π΄
π Read
via "Dark Reading".
Support for more than 160 important compliance standards have been integrated into SaaS solution for small and midsize enterprises.π Read
via "Dark Reading".
Dark Reading
Foresite Cybersecurity Acquires Cyber Lantern
Support for more than 160 important compliance standards have been integrated into SaaS solution for small and midsize enterprises.
π΄ Why Security Pros Are Frustrated With Cloud Security π΄
π Read
via "Dark Reading".
As companies shift more operations to the cloud, a shortfall in security talent and too much security data wastes more than half of the time spent on security issues, a survey finds.π Read
via "Dark Reading".
Dark Reading
Why Security Pros Are Frustrated With Cloud Security
As companies shift more operations to the cloud, a shortfall in security talent and too much security data wastes more than half of the time spent on security issues, a survey finds.
π΄ Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk π΄
π Read
via "Dark Reading".
CASB Cato converges a full CASB into its global SASE platform to defend enterprises against data breach and cloud-delivered threats.π Read
via "Dark Reading".
Dark Reading
Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk
CASB Cato converges a full CASB into its global SASE platform to defend enterprises against data breach and cloud-delivered threats.
π΄ INKY Completes Email Security Offering With Launch of Outbound Mail Protection π΄
π Read
via "Dark Reading".
INKY Outbound Mail Protection manages a multistep approval workflow providing enforcement within the email system itself.π Read
via "Dark Reading".
Dark Reading
INKY Completes Email Security Offering With Launch of Outbound Mail Protection
INKY Outbound Mail Protection manages a multistep approval workflow providing enforcement within the email system itself.
β KP Snacks Left with Crumbs After Ransomware Attack β
π Read
via "Threat Post".
The Conti gang strikes again, disrupting the nom-merchant's supply chain and threatening empty supermarket shelves lasting for weeks.π Read
via "Threat Post".
Threat Post
KP Snacks Left with Crumbs After Ransomware Attack
The Conti gang strikes again, disrupting the nom-merchant's supply chain and threatening supermarket shelves that could stay empty for weeks.