βΌ CVE-2022-23985 βΌ
π Read
via "National Vulnerability Database".
The affected product is vulnerable to an out-of-bounds write while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22430 βΌ
π Read
via "National Vulnerability Database".
There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44132 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in the function formImportOMCIShell of C-DATA ONU4FERW V2.1.13_X139 allows attackers to execute arbitrary commands via a crafted file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21209 βΌ
π Read
via "National Vulnerability Database".
The affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25062 βΌ
π Read
via "National Vulnerability Database".
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain an integer overflow via the function dm_checkString. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22448 βΌ
π Read
via "National Vulnerability Database".
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22437 βΌ
π Read
via "National Vulnerability Database".
There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37103 βΌ
π Read
via "National Vulnerability Database".
There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22395 βΌ
π Read
via "National Vulnerability Database".
There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.π Read
via "National Vulnerability Database".
β TrickBot Takes a Break, Leaving Researchers Scratching Their Heads β
π Read
via "Threat Post".
The infamous trojan is likely making some major operational changes, researchers believe.π Read
via "Threat Post".
Threat Post
TrickBot Takes a Break, Leaving Researchers Scratching Their Heads
The infamous trojan is likely making some major operational changes, researchers believe.
βΌ CVE-2022-24710 βΌ
π Read
via "National Vulnerability Database".
Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.π Read
via "National Vulnerability Database".
π1
π΄ 7 Steps to Take Right Now to Prepare for Cyberattacks by Russia π΄
π Read
via "Dark Reading".
A lot of the recommended preparation involves measures organizations should have in place already.π Read
via "Dark Reading".
Dark Reading
7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
A lot of the recommended preparation involves measures organizations should have in place already.
π1
π’ IBM launches security hub to help APAC firms prepare for cyber attacks π’
π Read
via "ITPro".
The tech giant also announced the opening of a second IBM Security Operation Center (SOC) in Bengaluruπ Read
via "ITPro".
IT PRO
IBM launches security hub to help APAC firms prepare for cyber attacks | IT PRO
The tech giant also announced the opening of a second IBM Security Operation Center (SOC) in Bengaluru
π’ Cloudflare acquires Area 1 Security for $162 million π’
π Read
via "ITPro".
The deal comes five months after the web infrastructure and website security company announced its foray into the email security marketπ Read
via "ITPro".
IT Pro
Cloudflare acquires Area 1 Security for $162 million
The deal comes five months after the web infrastructure and website security company announced its foray into the email security market
π’ Organisations urged to boost cyber defences in wake of Ukraine cyber attacks π’
π Read
via "ITPro".
Australiaβs Cyber Security Centre warns that there has been a historical pattern of cyber attacks against Ukraine that have had international consequencesπ Read
via "ITPro".
IT PRO
Organisations urged to boost cyber defences in wake of Ukraine cyber attacks | IT PRO
Australiaβs Cyber Security Centre warns that there has been a historical pattern of cyber attacks against Ukraine that have had international consequences
π’ Russian cyber attacks on Ukraine: What we know so far π’
π Read
via "ITPro".
A score of additional attacks on the Ukrainian government and other critical services have been reported this week, as Russia officially declares war on the countryπ Read
via "ITPro".
IT Pro
Russian cyber attacks on Ukraine: What we know so far
The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on handling simultaneous cyber and kinetic warfare
π’ Darktrace acquires attack surface management startup Cybersprint π’
π Read
via "ITPro".
The β¬47.5 million deal marks Darktraceβs first acquisition in its nine-year historyπ Read
via "ITPro".
IT PRO
Darktrace acquires attack surface management startup Cybersprint | IT PRO
The β¬47.5 million deal marks Darktraceβs first acquisition in its nine-year history
π1
π’ WatchGuard Firebox M290 review: Stiff security at a great price π’
π Read
via "ITPro".
The Firebox M290 delivers an incredible range of gateway security measures priced right for SMBsπ Read
via "ITPro".
IT PRO
WatchGuard Firebox M290 review: Stiff security at a great price | IT PRO
The Firebox M290 delivers an incredible range of gateway security measures priced right for SMBs
π’ IT Pro 20/20: The new frontier of innovation π’
π Read
via "ITPro".
Businesses are putting green tech at their heart of their buying decisions, and manufacturers and paying attentionπ Read
via "ITPro".
IT PRO
IT Pro 20/20: The new frontier of innovation | IT PRO
Businesses are putting green tech at their heart of their buying decisions, and manufacturers and paying attention
π’ Benefits of AI and machine learning for cloud security π’
π Read
via "ITPro".
AI and machine learning may not be a silver bullet, but they can still play an important part in cloud security strategiesπ Read
via "ITPro".
IT PRO
Benefits of AI and machine learning for cloud security | IT PRO
AI and machine learning may not be a silver bullet, but they can still play an important part in cloud security strategies
π’ Microsoft releases new security controls for multi-cloud customers π’
π Read
via "ITPro".
Tech giant adds Google Cloud protections for Defender for Cloud and CloudKnox Permission managementπ Read
via "ITPro".
ITPro
Microsoft releases new security controls for multi-cloud customers
Tech giant adds Google Cloud protections for Defender for Cloud and CloudKnox Permission management