βΌ CVE-2022-34055 βΌ
π Read
via "National Vulnerability Database".
The drxhello package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33122 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in eyoucms v1.5.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL field under the login page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32998 βΌ
π Read
via "National Vulnerability Database".
The cryptoasset-data-downloader package in PyPI v1.0.0 to v1.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34059 βΌ
π Read
via "National Vulnerability Database".
The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34054 βΌ
π Read
via "National Vulnerability Database".
The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32999 βΌ
π Read
via "National Vulnerability Database".
The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32997 βΌ
π Read
via "National Vulnerability Database".
The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33001 βΌ
π Read
via "National Vulnerability Database".
The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
π΄ Threat Intelligence Services Are Universally Valued by IT Staff π΄
π Read
via "Dark Reading".
Most of those surveyed are concerned about AI-based attacks and deepfakes, but suggest that their organization is ready.π Read
via "Dark Reading".
Dark Reading
Threat Intelligence Services Are Universally Valued by IT Staff
Most of those surveyed are concerned about AI-based attacks and deepfakes but suggest that their organizations are ready.
π€―1
π’ 'Embrace PowerShell for better security', say UK, US, NZ cyber authorities π’
π Read
via "ITPro".
The powerful automation and IT administrative tool has been used by hackers as an attack tool, but proper configuration can take the power out of their handsπ Read
via "ITPro".
ITPro
'Embrace PowerShell for better security', say UK, US, NZ cyber authorities
The powerful automation and IT administrative tool has been used by hackers as an attack tool, but proper configuration can take the power out of their hands
π’ Delivery firm Yodel disrupted by cyber attack π’
π Read
via "ITPro".
The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknownπ Read
via "ITPro".
IT PRO
Delivery firm Yodel disrupted by cyber attack | IT PRO
The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown
π’ UK government opts against regulation for cyber security standards π’
π Read
via "ITPro".
UK Cyber Security Council will move ahead with its planned chartered standards, with the government to monitor its adoptionπ Read
via "ITPro".
IT PRO
UK Government opts against regulation for cyber security standards | IT PRO
UK Cyber Security Council will move ahead with its planned chartered standards, with the Government to monitor its adoption
π’ Best free malware removal tools 2022 π’
π Read
via "ITPro".
Worried your device is infected? Here are the tools you need to get rid of malicious softwareπ Read
via "ITPro".
ITPro
6 of the best free malware removal tools in 2023
Worried your device is infected? Here are some of the best free malware removal tools at your disposal in 2023
π’ Security BSides commits to greater conference diversity after speaker backlash π’
π Read
via "ITPro".
A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Clevelandπ Read
via "ITPro".
IT PRO
Security BSides commits to greater conference diversity after speaker backlash | IT PRO
A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Cleveland
π’ Cloudflare fixes outage that knocked major web services offline π’
π Read
via "ITPro".
Online services such as Nord VPN, Shopify, and Steam were all inaccessible by users in most regionsπ Read
via "ITPro".
IT PRO
Cloudflare fixes outage that knocked major web services offline | IT PRO
Online services such as Nord VPN, Shopify, and Steam were all inaccessible by users in most regions
π’ How to react to a data breach π’
π Read
via "ITPro".
Would you know what to do if an online attacker got their hands on your data? We outline the first steps you should take following a security breachπ Read
via "ITPro".
ITPro
Data breach response: How to react when your business gets hit
Every business should have a data breach response plan, but when building one it can be difficult to know where to start
π’ IT Pro News in Review: UK tech raises $16bn, Microsoft acquires Miburo, largest DDoS attack mitigated π’
π Read
via "ITPro".
Catch up on the biggest headlines of the week in just two minutesπ Read
via "ITPro".
ITPro
IT Pro News in Review: UK tech raises $16bn, Microsoft acquires Miburo, largest DDoS attack mitigated
Catch up on the biggest headlines of the week in just two minutes
π’ SolarWinds details 'next generation' software development process π’
π Read
via "ITPro".
The open source approach, which will be shared with the wider community, is a direct response to the SUNBURST cyber attack in 2020π Read
via "ITPro".
IT PRO
SolarWinds details 'next generation' software development process | IT PRO
The open source approach, which will be shared with the wider community, is a direct response to the SUNBURST cyber attack in 2020
π’ Avira Free Security review: An effective antimalware suite, but heavy on the marketing π’
π Read
via "ITPro".
Itβs hard to fully appreciate Aviraβs malware protection when the packaging feels so manipulativeπ Read
via "ITPro".
IT PRO
Avira Free Security review: An effective antimalware suite, but heavy on the marketing | IT PRO
Itβs hard to fully appreciate Aviraβs malware protection when the packaging feels so manipulative
π’ BRATA malware has evolved to target online banking across Europe, researchers warn π’
π Read
via "ITPro".
The new variant can now access SMS, GPS, and device control to better steal financial dataπ Read
via "ITPro".
IT PRO
BRATA malware has evolved to target online banking across Europe, researchers warn | IT PRO
The new variant can now access SMS, GPS, and device control to better steal financial data
π’ Okta sets aside $1 million to support cyber security training for non-profits π’
π Read
via "ITPro".
One of the projects receiving a grant will help civil society organisations in Ukraine to strengthen their cyber securityπ Read
via "ITPro".
IT PRO
Okta sets aside $1 million to support cyber security training for non-profits | IT PRO
One of the projects receiving a grant will help civil society organisations in Ukraine to strengthen their cyber security