π’ What getting hacked taught me about cyber empathy π’
π Read
via "ITPro".
The industry needs a little less βI told you soβ when it comes to dealing with victimsπ Read
via "ITPro".
IT PRO
What getting hacked taught me about cyber empathy | IT PRO
The industry needs a little less βI told you soβ when it comes to dealing with victims
π’ CrowdStrike adds invite-only tier to new partner program π’
π Read
via "ITPro".
New βEliteβ tier aims to incentivise partners with new value-added bundles, discounts, and moreπ Read
via "ITPro".
IT PRO
CrowdStrike adds invite-only tier to new partner program | IT PRO
New βEliteβ tier aims to incentivise partners with new value-added bundles, discounts, and more
π’ Anonymous hacks Iranian government and state broadcasters π’
π Read
via "ITPro".
The hacktivists announced a targeted hacking campaign against the Iranian government, supporting the recent human rights protests in the regionπ Read
via "ITPro".
IT PRO
Anonymous hacks Iran government and state broadcasters following nationwide internet shutdown | IT PRO
The hacktivists announced a targeted hacking campaign against the Iranian government, supporting the recent human rights protests in the region
π’ US lawmakers warn Apple against using Chinese chips in next iPhone π’
π Read
via "ITPro".
Senators ask the US director of national intelligence to investigate a Chinese chipmakerβs military tiesπ Read
via "ITPro".
IT PRO
US lawmakers warn Apple against using Chinese chips in next iPhone | IT PRO
Senators ask the US director of national intelligence to investigate a Chinese chipmakerβs military ties
π’ Uber launches infosec hiring spree after attributing breach to LAPSUS$ π’
π Read
via "ITPro".
The company also hinted at the belief that LAPSUS$ was also behind the attack on Rockstar Games over the weekend in a revealing update detailing the inner workings of the attackπ Read
via "ITPro".
IT PRO
Uber launches infosec hiring spree after attributing breach to LAPSUS$ | IT PRO
The company also hinted at the belief that LAPSUS$ was also behind the attack on Rockstar Games over the weekend in a revealing update detailing the inner workings of the attack
π’ How to secure your hybrid workforce π’
π Read
via "ITPro".
IT teams need to rethink their approach to security under our new working modelsπ Read
via "ITPro".
IT PRO
How to secure your hybrid workforce | IT PRO
IT teams need to rethink their approach to security under our new working models
π’ Inside the password arms race π’
π Read
via "ITPro".
To keep your partnerβs business protected, you always need to stay one step aheadπ Read
via "ITPro".
IT PRO
Inside the password arms race | IT PRO
To keep your partnerβs business protected, you always need to stay one step ahead
π’ Wintermute loses $162 million in DeFi hack π’
π Read
via "ITPro".
A vulnerability in the vanity address generator Profanity led to the attackπ Read
via "ITPro".
IT PRO
Wintermute loses $162 million in DeFi hack | IT PRO
A vulnerability in the vanity address generator Profanity led to the attack
π’ 15-year-old vulnerability found in Python module π’
π Read
via "ITPro".
Hundreds of thousands of repositories have been found to be exposed to the vulnerabilityπ Read
via "ITPro".
ITPro
15-year-old vulnerability found in Python module
Hundreds of thousands of repositories have been found to be exposed to the vulnerability
π’ Phishing attacks targeting US government have evolved in sophistication, Cofense reports π’
π Read
via "ITPro".
The scams are aimed at stealing federal employees' Microsoft 365 credentialsπ Read
via "ITPro".
ITPro
Phishing attacks targeting US government have evolved in sophistication, Cofense reports
The scams are aimed at stealing federal employees' Microsoft 365 credentials
π’ WatchGuard Firebox T20-W review π’
π Read
via "ITPro".
This affordable desktop appliance is a great choice for protecting small offices and home workersπ Read
via "ITPro".
IT PRO
WatchGuard Firebox T20-W review: Enterprise-grade protection for remote staff | IT PRO
This affordable desktop appliance is a great choice for protecting small offices and home workers
π’ Australian telco Optus confirms cyber attack involving potential leak of sensitive customer data π’
π Read
via "ITPro".
Investigations are ongoing but early signs indicate that some customers may have had identity documents and other identifying information exposed to hackersπ Read
via "ITPro".
IT PRO
Australian telco Optus confirms cyber attack involving potential leak of sensitive customer data | IT PRO
Investigations are ongoing but early signs indicate that some customers may have had identity documents and other identifying information exposed to hackers
β Uber and Rockstar β has a LAPSUS$ linchpin just been busted (again)? β
π Read
via "Naked Security".
Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?π Read
via "Naked Security".
Naked Security
Uber and Rockstar β has a LAPSUS$ linchpin just been busted (again)?
Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?
β Morgan Stanley fined millions for selling off devices full of customer PII β
π Read
via "Naked Security".
Critical data on old disks always seems inaccessible if you really need it. But when you DON''T want it back, guess what happens...π Read
via "Naked Security".
Naked Security
Morgan Stanley fined millions for selling off devices full of customer PII
Critical data on old disks always seems inaccessible if you really need it. But when you DONβT want it back, guess what happensβ¦
βΌ CVE-2022-3296 βΌ
π Read
via "National Vulnerability Database".
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3297 βΌ
π Read
via "National Vulnerability Database".
Use After Free in GitHub repository vim/vim prior to 9.0.0579.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41343 βΌ
π Read
via "National Vulnerability Database".
registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41347 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41352 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36159 βΌ
π Read
via "National Vulnerability Database".
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36158 βΌ
π Read
via "National Vulnerability Database".
Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi).π Read
via "National Vulnerability Database".