π’ Report: UK businesses are less secure when using police-endorsed cyber security tool π’
π Read
via "ITPro".
The cyber security researcher found the developer of the free software to be "incompetent" and the myriad flaws in the cyber crime-fighting monitoring tool left businesses more at risk of cyber attacksπ Read
via "ITPro".
IT PRO
Report: UK businesses are less secure when using police-endorsed cyber security tool | IT PRO
The cyber security researcher found the developer of the free software to be "incompetent" and the myriad flaws in the cyber crime-fighting monitoring tool left businesses more at risk of cyber attacks
βΌ CVE-2022-25762 βΌ
π Read
via "National Vulnerability Database".
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors.π Read
via "National Vulnerability Database".
π’ SMBs expected to suffer as cyber security salaries equalise across the UK π’
π Read
via "ITPro".
Smaller businesses stand to lose out on top talent as post-pandemic hybrid and remote working setups drive salaries closer to London levelsπ Read
via "ITPro".
IT PRO
SMBs expected to suffer as cyber security salaries equalise across the UK | IT PRO
Smaller businesses stand to lose out on top talent as post-pandemic hybrid and remote working setups drive salaries closer to London levels
π’ Australian state transport agency hit by cyber attack π’
π Read
via "ITPro".
It warned that scammers might try to capitalise on the incident and told customers not to respond to unsolicited contact from anyone claiming to be from the agencyπ Read
via "ITPro".
ITPro
Australian state transport agency hit by cyber attack
It warned that scammers might try to capitalise on the incident and told customers not to respond to unsolicited contact from anyone claiming to be from the agency
π’ Rental car company Sixt confirms cyber attack, leaves scores of UK customers in the dark π’
π Read
via "ITPro".
The rental car giant announced a cyber attack on Sunday and has been largely uncontactable for days, but insists disruption is temporary and minimalπ Read
via "ITPro".
IT PRO
Rental car company Sixt confirms cyber attack, leaves scores of UK customers in the dark | IT PRO
The rental car giant announced a cyber attack on Sunday and has been largely uncontactable for days, but insists disruption is temporary and minimal
π’ Securing endpoints amid new threats π’
π Read
via "ITPro".
Ensuring employees have the flexibility and security to work remotelyπ Read
via "ITPro".
IT PRO
Securing endpoints amid new threats
Ensuring employees have the flexibility and security to work remotely
π’ Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack π’
π Read
via "ITPro".
The joint advisory published today said MSPs and customers need more vigilant in the wake of Russia's invasion of Ukraineπ Read
via "ITPro".
IT PRO
Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack | IT PRO
The joint advisory published today said MSPs and customers need more vigilant in the wake of Russia's invasion of Ukraine
π’ Dell calls time on the age-old on-prem vs cloud rivalry π’
π Read
via "ITPro".
The tech giant champions multi-cloud at one of the best conferences out there, unless youβre immunosuppressed, that is β our Dell Technologies World 2022 view from the airportπ Read
via "ITPro".
IT PRO
Dell calls time on the age-old on-prem vs cloud rivalry | IT PRO
The tech giant champions multi-cloud at one of the best conferences out there, unless youβre immunosuppressed, that is β our Dell Technologies World 2022 view from the airport
π’ Apple, Google, Microsoft expand their support for password-less sign-ins π’
π Read
via "ITPro".
New approach promises to offer βsimpler, stronger authenticationβ across leading platforms to help protect users from malicious activityπ Read
via "ITPro".
ITPro
Apple, Google, Microsoft expand their support for password-less sign-ins
New approach promises to offer βsimpler, stronger authenticationβ across leading platforms to help protect users from malicious activity
π’ Landmark amendments to international cyber crime treaty set to be signed next week π’
π Read
via "ITPro".
It's only the second amendment to the historically significant Budapest Convention since it was introduced in 2001π Read
via "ITPro".
IT PRO
Landmark amendments to international cyber crime treaty set to be signed next week | IT PRO
It's only the second amendment to the historically significant Budapest Convention since it was introduced in 2001
π’ National security leaders fear Ukraine conflict could inform a 'blueprint' for cyber war π’
π Read
via "ITPro".
Learning from the successes and failures of the ongoing conflict could help foreign adversaries carry out more effective cyber attacks in the future, according to one national cyber security chiefπ Read
via "ITPro".
IT PRO
National security leaders fear Ukraine conflict could inform a 'blueprint' for cyber war | IT PRO
Learning from the successes and failures of the ongoing conflict could help foreign adversaries carry out more effective cyber attacks in the future, according to one national cyber security chief
π’ Red Hat reveals new software supply chain security pattern π’
π Read
via "ITPro".
New cross-portfolio capabilities aim to help customers improve security posture and enable DevSecOpsπ Read
via "ITPro".
IT PRO
Red Hat reveals new software supply chain security pattern | IT PRO
New cross-portfolio capabilities aim to help customers improve security posture and enable DevSecOps
π’ Actively exploited Windows vulnerability reaches peak severity when paired with popular attack π’
π Read
via "ITPro".
May 2022's routine Patch Tuesday fixes seven 'critical' issues, including a familiar headache for IT administratorsπ Read
via "ITPro".
IT PRO
Actively exploited Windows vulnerability reaches peak severity when paired with popular attack | IT PRO
May 2022's routine Patch Tuesday fixes seven 'critical' issues, including a familiar headache for IT administrators
π’ Microsoft announces new business security services led by in-house experts π’
π Read
via "ITPro".
The new services will see Microsoft's security experts providing hands-on, proactive threat hunting for businesses unable to fully build out a SOC due to the industry's skills shortageπ Read
via "ITPro".
ITPro
Microsoft announces new business security services led by in-house experts
The new services will see Microsoft's security experts providing hands-on, proactive threat hunting for businesses unable to fully build out a SOC due to the industry's skills shortage
π’ WannaCry showed the world how not to write ransomware π’
π Read
via "ITPro".
Despite its devastating impact, cyber security researchers reflect on how much worse the attacks could have beenπ Read
via "ITPro".
IT PRO
WannaCry showed the world how not to write ransomware | IT PRO
Despite its devastating impact, cyber security researchers reflect on how much worse the attacks could have been
π’ NCSC unveils email security-checking tool for private sector organisations at CYBERUK π’
π Read
via "ITPro".
The free service will focus on checking for TLS and DMARC compliance to protect against anti-spoofing and email hijackingπ Read
via "ITPro".
IT PRO
NCSC unveils email security-checking tool for private sector organisations at CYBERUK | IT PRO
The free service will focus on checking for TLS and DMARC compliance to protect against anti-spoofing and email hijacking
π’ Costa Rica declares state of emergency following Conti ransomware attack π’
π Read
via "ITPro".
The US has released a $10 million bug bounty for information on the attackersπ Read
via "ITPro".
IT PRO
Costa Rica declares state of emergency following Conti ransomware attack | IT PRO
The US has released a $10 million bug bounty for knowledge of the attackers
π’ Microsoft makes Defender for Business generally available π’
π Read
via "ITPro".
Small businesses can look forward to enterprise-grade endpoint security as well as automated investigation and remediation capabilitiesπ Read
via "ITPro".
ITPro
Microsoft makes Defender for Business generally available
Small businesses can look forward to enterprise-grade endpoint security as well as automated investigation and remediation capabilities
π’ GitHub to introduce two-factor authentication by 2023 π’
π Read
via "ITPro".
GitHub.com will require 2FA by the end of 2023, as the company works to secure the software ecosystem through improved account securityπ Read
via "ITPro".
IT PRO
GitHub to introduce two-factor authentication by 2023 | IT PRO
GitHub.com will require 2FA by the end of 2023, as the company works to secure the software ecosystem through improved account security
π’ Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks π’
π Read
via "ITPro".
This one trick can stop ransomware executing file encryptionπ Read
via "ITPro".
IT PRO
Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks | IT PRO
This one trick can stop ransomware executing file encryption
π’ Five Eyes and US governments finally confirm Russia was behind Ukrainian government, Viasat cyber attacks π’
π Read
via "ITPro".
NCSC detailed the government-level attribution process at CYBERUK 2022 and why it took so much longer to assign blame compared to the private sectorπ Read
via "ITPro".
IT PRO
Five Eyes and US governments finally confirm Russia was behind Ukrainian government, Viasat cyber attacks | IT PRO
NCSC detailed the government-level attribution process at CYBERUK 2022 and why it took so much longer to assign blame compared to the private sector