βΌ CVE-2022-26205 βΌ
π Read
via "National Vulnerability Database".
Marky commit 3686565726c65756e was discovered to contain a remote code execution (RCE) vulnerability via the Display text fields. This vulnerability allows attackers to execute arbitrary code via injection of a crafted payload.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27948 βΌ
π Read
via "National Vulnerability Database".
Certain Tesla vehicles through 2022-03-26 allow attackers to open the charging port via a 315 MHz RF signal containing a fixed sequence of approximately one hundred symbols.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26245 βΌ
π Read
via "National Vulnerability Database".
Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1106 βΌ
π Read
via "National Vulnerability Database".
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.π Read
via "National Vulnerability Database".
π’ F-Secure launches WithSecure, spinning off entire enterprise portfolio π’
π Read
via "ITPro".
After years of trying to integrate business and consumer streams, F-Secure signals a complete split will help both new entities focus on their customers and industry relevanceπ Read
via "ITPro".
IT PRO
F-Secure launches WithSecure, spinning off entire enterprise portfolio | IT PRO
After years of trying to integrate business and consumer streams, F-Secure signals a complete split will help both new entities focus on their customers and industry relevance
π’ The keys to catching a cyber crook π’
π Read
via "ITPro".
Why greed, carelessness and an itch for glory are highly exploitable chinks in a cyber criminal's armourπ Read
via "ITPro".
IT PRO
The keys to catching a cyber crook | IT PRO
Why greed, carelessness and an itch for glory are highly exploitable chinks in a cyber criminal's armour
π’ EU proposes new bloc-wide cyber security regulations π’
π Read
via "ITPro".
The Computer Emergency Response Team for the EU institutions, bodies, offices, and agencies (CERT-EU) will be renamed as the βCybersecurity Centre'π Read
via "ITPro".
IT PRO
EU proposes new bloc-wide cyber security regulations | IT PRO
The Computer Emergency Response Team for the EU institutions, bodies, offices, and agencies (CERT-EU) will be renamed as the βCybersecurity Centre'
π’ Linux botnet spreads using Log4Shell flaw π’
π Read
via "ITPro".
The malware uses DNS tunnelling to communicate with its C2 control serverπ Read
via "ITPro".
IT PRO
Linux botnet spreads using Log4Shell flaw | IT PRO
The malware uses DNS tunnelling to communicate with its C2 control server
π’ How a platform approach to security monitoring initiatives adds value π’
π Read
via "ITPro".
Integration, orchestration, analytics, automation, and the need for speedπ Read
via "ITPro".
IT PRO
How a platform approach to security monitoring initiatives adds value
Integration, orchestration, analytics, automation, and the need for speed
π’ Hackers spotted using CAPTCHAs to dodge email security scanners π’
π Read
via "ITPro".
The technique allows hackers to hide malicious links in HTML filesπ Read
via "ITPro".
IT PRO
Hackers spotted using CAPTCHAs to dodge email security scanners | IT PRO
The technique allows hackers to hide malicious links in HTML files
π’ Okta confirms investigation into alleged LAPSUS$ security breach π’
π Read
via "ITPro".
Businesses are now on high alert as the hackers claim to have had full admin access to the back-end of identity and authentication provider Okta for at least two monthsπ Read
via "ITPro".
IT PRO
Okta concludes investigation into alleged LAPSUS$ security breach | IT PRO
After security alarm bells rang following an undisclosed months-old breach, Okta's investigation concluded that the impact was less severe than first feared
π’ Ransomware strikes Scottish mental health charity π’
π Read
via "ITPro".
The RansomEXX cyber criminals have claimed responsibility for the hack which led to more than 12GB of sensitive data being leaked to the dark webπ Read
via "ITPro".
IT PRO
Ransomware strikes Scottish mental health charity | IT PRO
The RansomEXX cyber criminals have claimed responsibility for the hack which led to more than 12GB of sensitive data being leaked to the dark web
π’ EU and US reach agreement on Privacy Shield replacement π’
π Read
via "ITPro".
Privacy campaigner Max Schrems suggests the deal amounts to a "patchwork approach" that will ultimately failπ Read
via "ITPro".
IT PRO
EU and US reach agreement on Privacy Shield replacement | IT PRO
Privacy campaigner Max Schrems suggests the deal amounts to a "patchwork approach" that will ultimately fail
π’ McAfee Enterpriseβs SSE business rebrands to Skyhigh Security π’
π Read
via "ITPro".
The new organisation will provide a βcomprehensive and convergedβ approach to data security, Symphony Technology Group saysπ Read
via "ITPro".
IT PRO
McAfee Enterpriseβs SSE business rebrands to Skyhigh Security | IT PRO
The new organisation will provide a βcomprehensive and convergedβ approach to data security, Symphony Technology Group says
π’ Open source dev attacked for spreading data-wiping 'protestware' π’
π Read
via "ITPro".
Developer denies wiping users' drives in spite of detailed code analysisπ Read
via "ITPro".
IT PRO
Open source dev attacked for spreading data-wiping 'protestware' | IT PRO
Developer denies wiping users' drives in spite of detailed code analysis
π’ Biden urges US businesses to prepare for Russian cyber attacks π’
π Read
via "ITPro".
The president has urged critical infrastructure owners to accelerate efforts to lock their digital doorsπ Read
via "ITPro".
IT PRO
Biden urges US businesses to prepare for Russian cyber attacks | IT PRO
The president has urged critical infrastructure owners to accelerate efforts to lock their digital doors
π1
π’ How to secure business printers π’
π Read
via "ITPro".
Your office printer is a juicy target for hackers, so what can you do to secure it?π Read
via "ITPro".
IT PRO
How to secure business printers | IT PRO
Your office printer is a juicy target for hackers, so what can you do to secure it?
π’ Microsoft Defender drops "downpour" of false ransomware alerts on customers π’
π Read
via "ITPro".
System administrators made numerous reports of false-positive results being flagged for seemingly innocuous files and behaviours on Wednesdayπ Read
via "ITPro".
ITPro
Microsoft Defender drops "downpour" of false ransomware alerts on customers
System administrators made numerous reports of false-positive results being flagged for seemingly innocuous files and behaviours on Wednesday
π’ Avast to acquire identity services provider SecureKey π’
π Read
via "ITPro".
The acquisition will add to Avastβs privacy-focused identity product and services portfolioπ Read
via "ITPro".
IT PRO
Avast to acquire identity services provider SecureKey | IT PRO
The acquisition will add to Avastβs privacy-focused identity product and services portfolio
π’ Western Digital flaw allows hackers to access restricted files π’
π Read
via "ITPro".
The proprietary file explorer app contained directory traversal bug, says storage vendorπ Read
via "ITPro".
IT PRO
Western Digital flaw allows hackers to access restricted files | IT PRO
The proprietary file explorer app contained directory traversal bug, says storage vendor
π’ Google exposes 'uniquely personal' access broker behind worst Conti, FIN12 ransomware attacks π’
π Read
via "ITPro".
Investigation unveils the inner workings of one access broker that helped two of the most-hated ransomware gangs in historyπ Read
via "ITPro".
IT PRO
Google exposes 'uniquely personal' access broker behind worst Conti, FIN12 ransomware attacks | IT PRO
Investigation unveils the inner workings of one access broker that helped two of the most-hated ransomware gangs in history