π’ UK safety tech sees another year of growth, amidst backlash π’
π Read
via "ITPro".
Record investment in the sector has led to widespread implementation of safety measures, but rights groups and some experts still aren't convincedπ Read
via "ITPro".
IT PRO
UK safety tech sees another year of growth, amidst backlash | IT PRO
Record investment in the sector has led to widespread implementation of safety measures, but rights groups and some experts still aren't convinced
π’ First Choice Community Healthcare hit by data breach π’
π Read
via "ITPro".
The Albuquerque-based firm first learned of the breach in March 2022π Read
via "ITPro".
IT PRO
First Choice Community Healthcare hit by data breach | IT PRO
The Albuquerque-based firm first learned of the breach in March 2022
π’ Tim Hortons 'offers free coffee and donut' to app users to settle data lawsuit π’
π Read
via "ITPro".
Canadian privacy commissioners found that the coffee giant had tracked and recorded the movements of its app users every few minutes of the day, even when the app wasnβt openπ Read
via "ITPro".
IT PRO
Tim Hortons 'offers free coffee and donut' to app users to settle data lawsuit | IT PRO
Canadian privacy commissioners found that the coffee giant had tracked and recorded the movements of its app users every few minutes of the day, even when the app wasnβt open
π’ European energy company and gas pipeline hacked by AlphV ransomware π’
π Read
via "ITPro".
The ransomware gang responsible is also linked with the group that took down Colonial Pipeline a year agoπ Read
via "ITPro".
IT PRO
European energy company and gas pipeline hacked by AlphV ransomware | IT PRO
The ransomware gang responsible is also linked with the group that took down Colonial Pipeline a year ago
π’ Nomad crypto bridge drained of $190 million through βchaoticβ exploit π’
π Read
via "ITPro".
The Nomad team has notified law enforcement and retained leading firms for blockchain intelligence and forensics, it said in a statement on Twitterπ Read
via "ITPro".
IT PRO
Nomad crypto bridge drained of $190 million through βchaoticβ exploit | IT PRO
The Nomad team has notified law enforcement and retained leading firms for blockchain intelligence and forensics, it said in a statement on Twitter
π’ Halborn warns of active MetaMask phishing campaign π’
π Read
via "ITPro".
The blockchain security firm deconstructs a pretentious email that attempted to steal users' passwordsπ Read
via "ITPro".
IT PRO
Halborn warns of active MetaMask phishing campaign | IT PRO
The blockchain security firm deconstructs a pretentious email that attempted to steal users' passwords
π’ Every leading UK university is compromising on email security, researchers say π’
π Read
via "ITPro".
Proofpoint said none of the top ten universities in the UK have implemented the recommended email security policies, leaving institutions open to cyber attacksπ Read
via "ITPro".
IT PRO
Every leading UK university is compromising on email security, researchers say | IT PRO
Proofpoint said none of the top ten universities in the UK have implemented the recommended email security policies, leaving institutions open to cyber attacks
π’ Young hacker faces 20-year prison sentence for creating prolific Imminent Monitor RAT π’
π Read
via "ITPro".
He created the RAT when he was aged just 15 and is estimated to have netted around $400,000 from the sale of it over six yearsπ Read
via "ITPro".
IT PRO
Young hacker faces 20-year prison sentence for creating prolific Imminent Monitor RAT | IT PRO
He created the RAT when he was aged just 15 and is estimated to have netted around $400,000 from the sale of it over six years
π’ Ransomware: Sometimes you need to pay to make it go away π’
π Read
via "ITPro".
The symptoms of this distraught data victim sounded an awful lot like ransomware, and it turned out the easiest way out was the most unpalatable optionπ Read
via "ITPro".
IT PRO
Ransomware: Sometimes you need to pay to make it go away | IT PRO
The symptoms of this distraught data victim sounded an awful lot like ransomware, and it turned out the easiest way out was the most unpalatable option
π’ T-Mobile partners with Homeland Security to prioritize first responder data π’
π Read
via "ITPro".
Eligible T-Mobile WPS subscribers are entitled to priority service at no additional chargeπ Read
via "ITPro".
IT PRO
T-Mobile partners with Homeland Security to prioritize first responder data | IT PRO
Eligible T-Mobile WPS subscribers are entitled to priority service at no additional charge
π’ Twitter API keys found leaked in over 3,200 apps, raising concerns for linked accounts π’
π Read
via "ITPro".
Business and verified Twitter accounts linked to affected apps are at risk of takeover, use in malicious campaignsπ Read
via "ITPro".
IT PRO
Twitter API keys found leaked in over 3,200 apps, raising concerns for linked accounts | IT PRO
Business and verified Twitter accounts linked to affected apps are at risk of takeover, use in malicious campaigns
βΌ CVE-2022-36197 βΌ
π Read
via "National Vulnerability Database".
BigTree CMS 4.4.16 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted PDF file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34927 βΌ
π Read
via "National Vulnerability Database".
MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27617 βΌ
π Read
via "National Vulnerability Database".
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to download arbitrary files via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34928 βΌ
π Read
via "National Vulnerability Database".
JFinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via /system/user.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27618 βΌ
π Read
via "National Vulnerability Database".
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Storage Analyzer before 2.1.0-0390 allows remote authenticated users to delete arbitrary files via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34968 βΌ
π Read
via "National Vulnerability Database".
An issue in the fetch_step function in Percona Server for MySQL v8.0.28-19 allows attackers to cause a Denial of Service (DoS) via a SQL query.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36800 βΌ
π Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Service Management Server and Data Center allow remote attackers without the "Browse Users" permission to view groups via an Information Disclosure vulnerability in the browsegroups.action endpoint. The affected versions are before version 4.22.2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34943 βΌ
π Read
via "National Vulnerability Database".
Laravel v5.1 was discovered to contain a remote code execution (RCE) vulnerability via the component ChanceGenerator in __call.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27619 βΌ
π Read
via "National Vulnerability Database".
Cleartext transmission of sensitive information vulnerability in authentication management in Synology Note Station Client before 2.2.2-609 allows man-in-the-middle attackers to obtain sensitive information via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2022-27616 βΌ
π Read
via "National Vulnerability Database".
Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 7.0.1-42218-3 allows remote authenticated users to execute arbitrary commands via unspecified vectors.π Read
via "National Vulnerability Database".