βΌ CVE-2022-34059 βΌ
π Read
via "National Vulnerability Database".
The Sixfab-Tool in PyPI v0.0.2 to v0.0.3 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34054 βΌ
π Read
via "National Vulnerability Database".
The Perdido package in PyPI v0.0.1 to v0.0.2 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32999 βΌ
π Read
via "National Vulnerability Database".
The cloudlabeling package in PyPI v0.0.1 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32997 βΌ
π Read
via "National Vulnerability Database".
The RootInteractive package in PyPI v0.0.5 to v0.0.19b0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33001 βΌ
π Read
via "National Vulnerability Database".
The AAmiles package in PyPI v0.1.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.π Read
via "National Vulnerability Database".
π΄ Threat Intelligence Services Are Universally Valued by IT Staff π΄
π Read
via "Dark Reading".
Most of those surveyed are concerned about AI-based attacks and deepfakes, but suggest that their organization is ready.π Read
via "Dark Reading".
Dark Reading
Threat Intelligence Services Are Universally Valued by IT Staff
Most of those surveyed are concerned about AI-based attacks and deepfakes but suggest that their organizations are ready.
π€―1
π’ 'Embrace PowerShell for better security', say UK, US, NZ cyber authorities π’
π Read
via "ITPro".
The powerful automation and IT administrative tool has been used by hackers as an attack tool, but proper configuration can take the power out of their handsπ Read
via "ITPro".
ITPro
'Embrace PowerShell for better security', say UK, US, NZ cyber authorities
The powerful automation and IT administrative tool has been used by hackers as an attack tool, but proper configuration can take the power out of their hands
π’ Delivery firm Yodel disrupted by cyber attack π’
π Read
via "ITPro".
The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknownπ Read
via "ITPro".
IT PRO
Delivery firm Yodel disrupted by cyber attack | IT PRO
The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown
π’ UK government opts against regulation for cyber security standards π’
π Read
via "ITPro".
UK Cyber Security Council will move ahead with its planned chartered standards, with the government to monitor its adoptionπ Read
via "ITPro".
IT PRO
UK Government opts against regulation for cyber security standards | IT PRO
UK Cyber Security Council will move ahead with its planned chartered standards, with the Government to monitor its adoption
π’ Best free malware removal tools 2022 π’
π Read
via "ITPro".
Worried your device is infected? Here are the tools you need to get rid of malicious softwareπ Read
via "ITPro".
ITPro
6 of the best free malware removal tools in 2023
Worried your device is infected? Here are some of the best free malware removal tools at your disposal in 2023
π’ Security BSides commits to greater conference diversity after speaker backlash π’
π Read
via "ITPro".
A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Clevelandπ Read
via "ITPro".
IT PRO
Security BSides commits to greater conference diversity after speaker backlash | IT PRO
A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Cleveland
π’ Cloudflare fixes outage that knocked major web services offline π’
π Read
via "ITPro".
Online services such as Nord VPN, Shopify, and Steam were all inaccessible by users in most regionsπ Read
via "ITPro".
IT PRO
Cloudflare fixes outage that knocked major web services offline | IT PRO
Online services such as Nord VPN, Shopify, and Steam were all inaccessible by users in most regions
π’ How to react to a data breach π’
π Read
via "ITPro".
Would you know what to do if an online attacker got their hands on your data? We outline the first steps you should take following a security breachπ Read
via "ITPro".
ITPro
Data breach response: How to react when your business gets hit
Every business should have a data breach response plan, but when building one it can be difficult to know where to start
π’ IT Pro News in Review: UK tech raises $16bn, Microsoft acquires Miburo, largest DDoS attack mitigated π’
π Read
via "ITPro".
Catch up on the biggest headlines of the week in just two minutesπ Read
via "ITPro".
ITPro
IT Pro News in Review: UK tech raises $16bn, Microsoft acquires Miburo, largest DDoS attack mitigated
Catch up on the biggest headlines of the week in just two minutes
π’ SolarWinds details 'next generation' software development process π’
π Read
via "ITPro".
The open source approach, which will be shared with the wider community, is a direct response to the SUNBURST cyber attack in 2020π Read
via "ITPro".
IT PRO
SolarWinds details 'next generation' software development process | IT PRO
The open source approach, which will be shared with the wider community, is a direct response to the SUNBURST cyber attack in 2020
π’ Avira Free Security review: An effective antimalware suite, but heavy on the marketing π’
π Read
via "ITPro".
Itβs hard to fully appreciate Aviraβs malware protection when the packaging feels so manipulativeπ Read
via "ITPro".
IT PRO
Avira Free Security review: An effective antimalware suite, but heavy on the marketing | IT PRO
Itβs hard to fully appreciate Aviraβs malware protection when the packaging feels so manipulative
π’ BRATA malware has evolved to target online banking across Europe, researchers warn π’
π Read
via "ITPro".
The new variant can now access SMS, GPS, and device control to better steal financial dataπ Read
via "ITPro".
IT PRO
BRATA malware has evolved to target online banking across Europe, researchers warn | IT PRO
The new variant can now access SMS, GPS, and device control to better steal financial data
π’ Okta sets aside $1 million to support cyber security training for non-profits π’
π Read
via "ITPro".
One of the projects receiving a grant will help civil society organisations in Ukraine to strengthen their cyber securityπ Read
via "ITPro".
IT PRO
Okta sets aside $1 million to support cyber security training for non-profits | IT PRO
One of the projects receiving a grant will help civil society organisations in Ukraine to strengthen their cyber security
π’ Quantum is 'the future of AWS system security', Amazon claims π’
π Read
via "ITPro".
With third major quantum investment, AWS sets stage for next decade of network infrastructureπ Read
via "ITPro".
IT PRO
Quantum is 'the future of AWS system security', Amazon claims | IT PRO
With third major quantum investment, AWS sets stage for next decade of network infrastructure
π’ How secure is Gmail? π’
π Read
via "ITPro".
The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkupsπ Read
via "ITPro".
IT PRO
How secure is Gmail? | IT PRO
The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkups
βΌ CVE-2020-27509 βΌ
π Read
via "National Vulnerability Database".
Persistent XSS in Galaxkey Secure Mail Client in Galaxkey up to 5.6.11.5 allows an attacker to perform an account takeover by intercepting the HTTP Post request when sending an email and injecting a specially crafted XSS payload in the 'subject' field. The payload executes when the recipient logs into their mailbox.π Read
via "National Vulnerability Database".