β Breaching airgap security: using your phoneβs compass as a microphone! β
π Read
via "Naked Security".
One bit per second makes the Voyager probe data rate seem blindingly fast. But it's enough to break your security assumptions...π Read
via "Naked Security".
Naked Security
Breaching airgap security: using your phoneβs gyroscope as a microphone
One bit per second makes the Voyager probe data rate seem blindingly fast. But itβs enough to break your security assumptionsβ¦
π΄ Cyberstarts Closes $60M in Seed Fund III π΄
π Read
via "Dark Reading".
Venture firm hires former Splunk CEO to spearhead new GTM advisory board and help portfolio companies scale up.π Read
via "Dark Reading".
Dark Reading
Cyberstarts Closes $60M in Seed Fund III
Venture firm hires former Splunk CEO to spearhead new GTM advisory board and help portfolio companies scale up.
π΄ The (Nation) State of Cyber: 64% of Businesses Suspect They've Been Targeted or Impacted by Nation-State Attacks π΄
π Read
via "Dark Reading".
According to new Venafi research, two-thirds of organizations have changed cyber strategy in response to war in Ukraine.π Read
via "Dark Reading".
Dark Reading
The (Nation) State of Cyber: 64% of Businesses Suspect They've Been Targeted or Impacted by Nation-State Attacks
According to new Venafi research, two-thirds of organizations have changed cyber strategy in response to war in Ukraine.
π΄ Wyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign Governments π΄
π Read
via "Dark Reading".
Following whistleblower complaint, Oregon senator renews commitment to passing bipartisan legislation to address the national security risks.π Read
via "Dark Reading".
Dark Reading
Wyden Renews Call to Encrypt Twitter DMs, Secure Americans' Data From Unfriendly Foreign Governments
Following whistleblower complaint, Oregon senator renews commitment to passing bipartisan legislation to address the national security risks.
π How to Form a Data Recovery Plan: Your Five Step Guide π
π Read
via "".
Creating a detailed disaster recovery plan (DRP) can be a daunting and complicated task. Begin forming your plan by including the following five essential steps.
π Read
via "".
Digital Guardian
How to Form a Data Recovery Plan: Your Five Step Guide
Creating a detailed disaster recovery plan (DRP) can be a daunting and complicated task. Begin forming your plan by including the following five essential steps.
π GNU Privacy Guard 2.2.37 π
π Read
via "Packet Storm Security".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.π Read
via "Packet Storm Security".
Packetstormsecurity
GNU Privacy Guard 2.2.37 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β S3 Ep97: Did your iPhone get pwned? How would you know? [Audio + Text] β
π Read
via "Naked Security".
Latest episode - listen now! (Or read the transcript if you prefer the text version.)π Read
via "Naked Security".
Naked Security
S3 Ep97: Did your iPhone get pwned? How would you know? [Audio + Text]
Latest episode β listen now! (Or read the transcript if you prefer the text version.)
π΄ More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem π΄
π Read
via "Dark Reading".
As cryptocurrency valuations make strikes less lucrative, ransomware gangs like the new RedAlert and Monster groups are modifying their tools to attack across platforms.π Read
via "Dark Reading".
Dark Reading
More Bang for the Buck: Cross-Platform Ransomware Is the Next Problem
As cryptocurrency valuations make strikes less lucrative, ransomware gangs like the new RedAlert and Monster groups are modifying their tools to attack across platforms.
βΌ CVE-2022-36471 βΌ
π Read
via "National Vulnerability Database".
H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetMacAccessMode.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36465 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the pppoeUser parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36464 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a stack overflow via the sPort parameter in the function setIpPortFilterRules.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36508 βΌ
π Read
via "National Vulnerability Database".
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetAPInfoById.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36495 βΌ
π Read
via "National Vulnerability Database".
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function addactionlist.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36504 βΌ
π Read
via "National Vulnerability Database".
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function Edit_BasicSSID.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37823 βΌ
π Read
via "National Vulnerability Database".
Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function formSetVirtualSer.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36455 βΌ
π Read
via "National Vulnerability Database".
TOTOLink A3600R V4.1.2cu.5182_B20201102 was discovered to contain a command injection vulnerability via the username parameter in /cstecgi.cgi.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36502 βΌ
π Read
via "National Vulnerability Database".
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateWanParams.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36459 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the host_time parameter in the function NTPSyncWithHost.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36513 βΌ
π Read
via "National Vulnerability Database".
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function edditactionlist.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36472 βΌ
π Read
via "National Vulnerability Database".
H3C B5 Mini B5MiniV100R005 was discovered to contain a stack overflow via the function SetMobileAPInfoById.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36496 βΌ
π Read
via "National Vulnerability Database".
H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetMobileAPInfoById.π Read
via "National Vulnerability Database".