βΌ CVE-2022-1139 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in Background Fetch API in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1136 βΌ
π Read
via "National Vulnerability Database".
Use after free in Tab Strip in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific set of user gestures.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1127 βΌ
π Read
via "National Vulnerability Database".
Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1133 βΌ
π Read
via "National Vulnerability Database".
Use after free in WebRTC Perf in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
π’ Russian cyber attacks on Ukraine: What we know so far π’
π Read
via "ITPro".
The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on handling simultaneous cyber and kinetic warfareπ Read
via "ITPro".
IT Pro
Russian cyber attacks on Ukraine: What we know so far
The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on handling simultaneous cyber and kinetic warfare
π’ Mysterious MacOS spyware discovered using public cloud storage as its control server π’
π Read
via "ITPro".
Researchers have warned that little is known about the 'CloudMensis' malware, including how it is distributed and who is behind itπ Read
via "ITPro".
IT PRO
Mysterious MacOS spyware discovered using public cloud storage as its control server | IT PRO
Researchers have warned that little is known about the 'CloudMensis' malware, including how it is distributed and who is behind it
π’ Hackers hiding malicious links in top Google search results, researchers warn π’
π Read
via "ITPro".
Malicious adverts made to resemble links to websites are targeting some of the worldβs most popular websitesπ Read
via "ITPro".
IT PRO
Hackers hiding malicious links in top Google search results, researchers warn | IT PRO
Malicious adverts made to resemble links to websites are targeting some of the worldβs most popular websites
π’ (ISC)2 offers free cyber security certifications to one million people π’
π Read
via "ITPro".
The scheme builds on the earlier efforts to provide 100,000 people in the UK with free cyber security trainingπ Read
via "ITPro".
IT PRO
(ISC)2 offers free cyber security certifications to one million people | IT PRO
The scheme builds on the earlier efforts to provide 100,000 people in the UK with free cyber security training
π’ GPS tracker exploit puts the world's most high-value individuals in real-world danger π’
π Read
via "ITPro".
Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets and disable emergency service vehiclesπ Read
via "ITPro".
IT PRO
GPS tracker exploit puts the world's most high-value individuals in real-world danger | IT PRO
Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets and disable emergency service vehicles
π’ Sophos announces new X-Ops unit to streamline defence against cyber attacks π’
π Read
via "ITPro".
New team unifies vendorβs threat response, labs, and AI teams of cybersecurity expertsπ Read
via "ITPro".
IT PRO
Sophos announces new X-Ops unit to streamline defence against cyber attacks | IT PRO
New team unifies vendorβs threat response, labs, and AI teams of cybersecurity experts
π’ Romanian man extradited to US over Gozi virus hacking charges π’
π Read
via "ITPro".
The man allegedly ran a service that helped cyber criminals distribute the Gozi virus which ended up infecting over one million computers worldwide, including some which belonged to NASAπ Read
via "ITPro".
IT PRO
Romanian man extradited to US over Gozi virus hacking charges | IT PRO
The man allegedly ran a service that helped cyber criminals distribute the Gozi virus which ended up infecting over one million computers worldwide, including some which belonged to NASA
π’ Data on 69 million Neopets users stolen and listed for sale on hacker forum π’
π Read
via "ITPro".
Email addresses, passwords, and zip codes are all thought to have been stolen by the hackerπ Read
via "ITPro".
IT PRO
Data on 69 million Neopets users stolen and listed for sale on hacker forum | IT PRO
Email addresses, passwords, and zip codes are all thought to have been stolen by the hacker
π1
π’ Pax8 teams up with Nord Security to bolster security offering π’
π Read
via "ITPro".
Pax8βs cloud marketplace now offers SASE solution NordLayer and the NordPass password managerπ Read
via "ITPro".
IT PRO
Pax8 teams up with Nord Security to bolster security offering | IT PRO
Pax8βs cloud marketplace now offers SASE solution NordLayer and the NordPass password manager
π’ Zoom adds end-to-end encryption to Zoom Phone and Breakout Rooms π’
π Read
via "ITPro".
Users will need to be on the same Zoom account for E2EE for Zoom Calls to workπ Read
via "ITPro".
IT PRO
Zoom adds end-to-end encryption to Zoom Phone and Breakout Rooms | IT PRO
Users will need to be on the same Zoom account for E2EE for Zoom Calls to work
π’ HTTP vs HTTPS: What difference does it make to security? π’
π Read
via "ITPro".
We look at the difference between HTTPS and HTTP and tell you how to switch between themπ Read
via "ITPro".
IT PRO
HTTP vs HTTPS: What difference does it make to security? | IT PRO
We look at the difference between HTTPS and HTTP and tell you how to switch between them
βΌ CVE-2022-24294 βΌ
π Read
via "National Vulnerability Database".
A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1.π Read
via "National Vulnerability Database".
π€1
βΌ CVE-2021-46829 βΌ
π Read
via "National Vulnerability Database".
GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems.π Read
via "National Vulnerability Database".
βΌ CVE-2017-20145 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in Tecrail Responsive Filemanger up to 9.10.x and classified as critical. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 9.11.0 is able to address this issue. It is recommended to upgrade the affected component.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36450 βΌ
π Read
via "National Vulnerability Database".
Obsidian 0.14.x and 0.15.x before 0.15.5 allows obsidian://hook-get-address remote code execution because window.open is used without checking the URL.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36446 βΌ
π Read
via "National Vulnerability Database".
software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36444 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Atos Unify OpenScape SBC 9 and 10 before 10R2.2.1, Atos Unify OpenScape Branch 9 and 10 before version 10R2.1.1, and Atos Unify OpenScape BCF 10 before 10R9.12.1. A remote code execution vulnerability may allow an unauthenticated attacker (with network access to the admin interface) to disrupt system availability or potentially compromise the confidentiality and integrity of the system.π Read
via "National Vulnerability Database".