βΌ CVE-2022-42044 βΌ
π Read
via "National Vulnerability Database".
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-html package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41382 βΌ
π Read
via "National Vulnerability Database".
The d8s-json package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41387 βΌ
π Read
via "National Vulnerability Database".
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41383 βΌ
π Read
via "National Vulnerability Database".
The d8s-archives package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41381 βΌ
π Read
via "National Vulnerability Database".
The d8s-utility package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42717 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Hashicorp Packer before 2.3.1. The recommended sudoers configuration for Vagrant on Linux is insecure. If the host has been configured according to this documentation, non-privileged users on the host can leverage a wildcard in the sudoers configuration to execute arbitrary commands as root.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42043 βΌ
π Read
via "National Vulnerability Database".
The d8s-xml package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-html package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41386 βΌ
π Read
via "National Vulnerability Database".
The d8s-utility package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41550 βΌ
π Read
via "National Vulnerability Database".
GNU oSIP v5.3.0 was discovered to contain an integer overflow via the component osip_body_parse_header.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37617 βΌ
π Read
via "National Vulnerability Database".
Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the k variable in resolve-shims.js.π Read
via "National Vulnerability Database".
π’ The best TeamViewer alternatives π’
π Read
via "ITPro".
These remote desktop software tools are feature-packed TeamViewer alternatives that can help you save moneyπ Read
via "ITPro".
IT PRO
The best TeamViewer alternatives | IT PRO
These remote desktop software tools are feature-packed TeamViewer alternatives that can help you save money
π’ Boeing 737 MAX: You can no longer escape liability due to poor code π’
π Read
via "ITPro".
Known vulnerabilities in Boeingβs flight software led to two fatal crashes, as well as a landmark decision with major ramifications for software developmentπ Read
via "ITPro".
IT PRO
The Boeing 737 MAX debacle shows you can no longer escape liability due to poorly configured code | IT PRO
Known vulnerabilities in Boeingβs flight software led to two fatal crashes, as well as a landmark decision with major ramifications for software development
π’ Second Singtel subsidiary breach in a month sees customer and client data leaked π’
π Read
via "ITPro".
The incident at Singtel subsidiary Dialog follows the earlier breach at Singtel-owned Optus, Australia's second-largest telcoπ Read
via "ITPro".
IT PRO
Second Singtel subsidiary breach in a month sees customer and client data leaked | IT PRO
The incident at Singtel subsidiary Dialog follows the earlier breach at Singtel-owned Optus, Australia's second-largest telco
π’ Toyota discovers five-year-old email leak, customers at risk of phishing attacks π’
π Read
via "ITPro".
Security experts have said the company has no way of knowing whether the emails were accessedπ Read
via "ITPro".
IT PRO
Toyota discovers five-year-old email leak, customers at risk of phishing attacks | IT PRO
Security experts have said the company has no way of knowing whether the emails were accessed
π’ GCHQ chief calls for greater quantum investment, warns of looming Chinese tech dominance π’
π Read
via "ITPro".
Jeremy Fleming said that when it comes to technology, the politically motivated actions of the Chinese state are an increasingly urgent problem that must be acknowledged and addressedπ Read
via "ITPro".
IT PRO
GCHQ chief calls for greater quantum investment, warns of looming Chinese tech dominance | IT PRO
Jeremy Fleming said that when it comes to technology, the politically motivated actions of the Chinese state are an increasingly urgent problem that must be acknowledged and addressed
π’ Hacker steals $566 million from Binance Bridge using proof-forgery exploit π’
π Read
via "ITPro".
An exploit discovered in the exchange platform's proof verifier let the hacker take 2m BNB without raising alarm bellsπ Read
via "ITPro".
IT PRO
Hacker steals $566 million from Binance Bridge using proof-forgery exploit | IT PRO
An exploit discovered in the exchange platform's proof verifier let the hacker take 2m BNB without raising alarm bells
π’ Papa John's faces class-action lawsuit for alleged misuse of session tracking scripts π’
π Read
via "ITPro".
Session replay tools are used on a variety of websites for analytics purposes, but the pizza retailer faces claims it is engaged in unreasonable profilingπ Read
via "ITPro".
IT PRO
Papa John's faces class-action lawsuit for alleged misuse of session tracking scripts | IT PRO
Session replay tools are used on a variety of websites for analytics purposes, but the pizza retailer faces claims it is engaged in unreasonable profiling
π’ Intel Alder Lake chips safe from novel exploits following source code leak, experts say π’
π Read
via "ITPro".
The mystery surrounding how the code was leaked is a more interesting story, experts told IT Pro, despite others branding the incident "scary"π Read
via "ITPro".
IT PRO
Intel Alder Lake chips safe from novel exploits following source code leak, experts say | IT PRO
The mystery surrounding how the code was leaked is a more interesting story, experts told IT Pro, despite others branding the incident "scary"
π’ NCSC: Businesses are too often 'seduced' by the attractive lure of phishing tests π’
π Read
via "ITPro".
The debate around the importance of phishing tests in cyber security rages on but businesses need to be careful if they decide to embrace them, the UK's cyber authority has warnedπ Read
via "ITPro".
IT PRO
NCSC: Businesses are too often 'seduced' by the attractive lure of phishing tests | IT PRO
The debate around the importance of phishing tests in cyber security rages on but businesses need to be careful if they decide to embrace them, the UK's cyber authority has warned
π’ Meta notifies around 1 million Facebook users of potential compromise through malicious apps π’
π Read
via "ITPro".
The vast majority of apps targeting iOS users appeared to be genuine apps for managing business functions such as advertising and analyticsπ Read
via "ITPro".
IT PRO
Meta notifies around 1 million Facebook users of potential compromise through malicious apps | IT PRO
The vast majority of apps targeting iOS users appeared to be genuine apps for managing business functions such as advertising and analytics
π’ Microsoft's third mitigation update for Exchange Server zero-day exploit bypassed within hours π’
π Read
via "ITPro".
The string of problematic temporary fixes for βProxyNotShellβ grows longer after a 'confusing' and 'atypical' week-long vulnerability disclosure processπ Read
via "ITPro".
ITPro
Microsoft's third mitigation update for Exchange Server zero-day exploit bypassed within hours
The string of problematic temporary fixes for βProxyNotShellβ grows longer after a 'confusing' and 'atypical' week-long vulnerability disclosure process