βΌ CVE-2021-46830 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability exists within GoAnywhere MFT before 6.8.3 that utilize self-registration for the GoAnywhere Web Client. This vulnerability could potentially allow an external user who self-registers with a specific username and/or profile information to gain access to files at a higher directory level than intended.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1871 βΌ
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass file system policy via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1876 βΌ
π Read
via "National Vulnerability Database".
Heap buffer overflow in DevTools in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1870 βΌ
π Read
via "National Vulnerability Database".
Use after free in App Service in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1863 βΌ
π Read
via "National Vulnerability Database".
Use after free in Tab Groups in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1875 βΌ
π Read
via "National Vulnerability Database".
Inappropriate implementation in PDF in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to leak cross-origin data via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1869 βΌ
π Read
via "National Vulnerability Database".
Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1856 βΌ
π Read
via "National Vulnerability Database".
Use after free in User Education in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension or specific user interaction.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1854 βΌ
π Read
via "National Vulnerability Database".
Use after free in ANGLE in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1872 βΌ
π Read
via "National Vulnerability Database".
Insufficient policy enforcement in Extensions API in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.π Read
via "National Vulnerability Database".
π΄ When Human Security Meets PerimeterX π΄
π Read
via "Dark Reading".
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.π Read
via "Dark Reading".
Dark Reading
When Human Security Meets PerimeterX
Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.
π€―1
π’ Researchers uncover 'mysterious' Windows rootkit being actively exploited since 2016 π’
π Read
via "ITPro".
Experts at Kaspersky say the rootkit was found embedded inside the firmware image of legacy Asus and Gigabyte motherboardsπ Read
via "ITPro".
IT PRO
Researchers uncover 'mysterious' Windows rootkit being actively exploited since 2016 | IT PRO
Experts at Kaspersky say the rootkit was found embedded inside the firmware image of legacy Asus and Gigabyte motherboards
π’ Clinivate notifies customers of data breach π’
π Read
via "ITPro".
The hack exposed patientsβ protected health information stored in Clinivate's electronic health record archiveπ Read
via "ITPro".
IT PRO
Clinivate notifies customers of data breach | IT PRO
The hack exposed patientsβ protected health information stored in Clinivate's electronic health record archive
π’ Southern co-operative faces legal complaint for facial recognition CCTV π’
π Read
via "ITPro".
Rights group Big Brother Watch has written to the Information Commissioner to βstop unlawful processingβπ Read
via "ITPro".
IT PRO
Southern co-operative faces legal complaint for facial recognition CCTV | IT PRO
Rights group Big Brother Watch has written to the Information Commissioner to βstop unlawful processingβ
π’ DataGrail hires former Shopify VP Cathy Polinsky as CTO π’
π Read
via "ITPro".
The new hire stressed that data privacy is a human right as DataGrail looks to boost customer controlπ Read
via "ITPro".
IT PRO
DataGrail hires former Shopify VP Cathy Polinsky as CTO | IT PRO
The new hire stressed that data privacy is a human right as DataGrail looks to boost customer control
π’ TSA amends cyber security requirements for pipeline operators π’
π Read
via "ITPro".
The revised directive provides operators with greater flexibility over security management and incident responseπ Read
via "ITPro".
IT PRO
TSA amends cyber security requirements for pipeline operators | IT PRO
The revised directive provides operators with greater flexibility over security management and incident response
π’ Facebook business accounts hijacked by infostealer malware campaign π’
π Read
via "ITPro".
Threat actors are using LinkedIn phishing to seize business, ad accounts for financial gainπ Read
via "ITPro".
IT PRO
Facebook business accounts hijacked by infostealer malware campaign | IT PRO
Threat actors are using LinkedIn phishing to seize business, ad accounts for financial gain
π’ T-Mobile to pay $350m to settle class action lawsuit π’
π Read
via "ITPro".
The news follows a breach that exposed the personal data of over 40 million customers in 2021π Read
via "ITPro".
IT PRO
T-Mobile to pay $350m to settle class action lawsuit | IT PRO
The news follows a breach that exposed the personal data of over 40 million customers in 2021
π’ IT Pro News In Review: Slack ups subscription fees, ransomware attacks rise, Microsoft expands CRM capabilities π’
π Read
via "ITPro".
Catch up on the biggest headlines of the week in just two minutesπ Read
via "ITPro".
ITPro
IT Pro News In Review: Slack ups subscription fees, ransomware attacks rise, Microsoft expands CRM capabilities
Catch up on the biggest headlines of the week in just two minutes
π’ Best Linux distros 2022 π’
π Read
via "ITPro".
Whether it's for desktop, server or security, there's bound to be a Linux distro for youπ Read
via "ITPro".
IT PRO
Best Linux distros 2023: The finest open source operating systems around | IT PRO
Bringing together the best Linux distros on the market today, including specialist versions for enterprise users
π’ Ransomware now strikes one in 40 organisations per week, Check Point finds π’
π Read
via "ITPro".
VARs, systems integrators, and distributors saw a 143% year-on-year increase in attacks during Q2π Read
via "ITPro".
IT PRO
Ransomware now strikes one in 40 organisations per week, Check Point finds | IT PRO
VARs, systems integrators, and distributors saw a 143% year-on-year increase in attacks during Q2