βΌ CVE-2022-39286 βΌ
π Read
via "National Vulnerability Database".
Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds.π Read
via "National Vulnerability Database".
π’ Hive ransomware group claims cyber attack on Indiaβs Tata Power π’
π Read
via "ITPro".
The Indian energy company reported last week that its IT systems were down, with customers reporting difficulties in paying their billsπ Read
via "ITPro".
ITPro
Hive ransomware group claims cyber attack on Indiaβs Tata Power
The Indian energy company reported last week that its IT systems were down, with customers reporting difficulties in paying their bills
π’ The ultimate guide to deleting yourself from social media π’
π Read
via "ITPro".
Worried about oversharing β or just want to kick the social media habit? Weβve outlined concrete steps you can take to delete your identity from the most popular sites and servicesπ Read
via "ITPro".
ITPro
The ultimate guide to deleting yourself from social media
Worried about oversharing β or just want to kick the social media habit? Weβve outlined concrete steps you can take to delete your identity from the most popular sites and services
π’ ExtraHop partners with Splunk SOAR to offer visibility into encrypted network traffic π’
π Read
via "ITPro".
The new platform integration aims to reduce the amount of time security professionals spend on low-level analysis tasksπ Read
via "ITPro".
channelpro
ExtraHop partners with Splunk SOAR to offer visibility into encrypted network traffic
The new platform integration aims to reduce the amount of time security professionals spend on low-level analysis tasks
π’ Palo Alto Networks expands NextWave partner network π’
π Read
via "ITPro".
The revamped initiative aims to help partners deliver incident response services built on Cortex XDRπ Read
via "ITPro".
channelpro
Palo Alto Networks expands NextWave partner network
The revamped initiative aims to help partners deliver incident response services built on Cortex XDR
π’ A strategic guide for controlling and securing your data π’
π Read
via "ITPro".
Forrester's data security control frameworkπ Read
via "ITPro".
ITPro
A strategic guide for controlling and securing your data
Forrester's data security control framework
π’ FTC orders Uber-owned Drizly to improve "lax" data protection approach following 2020 breach π’
π Read
via "ITPro".
The Uber subsidiary has been hit with an FTC complaint, as the agency looks to send a message to the wider industryπ Read
via "ITPro".
ITPro
FTC orders Uber-owned Drizly to improve "lax" data protection approach following 2020 breach
The Uber subsidiary has been hit with an FTC complaint, as the agency looks to send a message to the wider industry
π’ What is secure deletion? π’
π Read
via "ITPro".
Want to ensure your deleted data canβt be recovered and abused? We explore how secure deletion works, and how you can best protect your informationπ Read
via "ITPro".
ITPro
What is secure deletion?
Want to ensure your deleted data canβt be recovered and abused? We explore how secure deletion works, and how you can best protect your information
π’ Database and big data security π’
π Read
via "ITPro".
KuppingerCole 2021 Leadership Compass Reportπ Read
via "ITPro".
ITPro
Database and big data security
KuppingerCole 2021 Leadership Compass Report
π’ Apple patches actively exploited iPhone, iPad zero-day and 18 other security flaws π’
π Read
via "ITPro".
The out-of-bounds write error is the eighth actively exploited zero-day impacting Apple hardware this year and could facilitate kernel-level code executionπ Read
via "ITPro".
ITPro
Apple patches actively exploited iPhone, iPad zero-day and 18 other security flaws
The out-of-bounds write error is the eighth actively exploited zero-day impacting Apple hardware this year and could facilitate kernel-level code execution
π’ Building a better password strategy for your business π’
π Read
via "ITPro".
Exploring the strategies and exploits that hackers are using to circumvent password security measuresπ Read
via "ITPro".
ITPro
Building a better password strategy for your business
Exploring the strategies and exploits that hackers are using to circumvent password security measures
π’ Medibank reveals damning extent of hack that could cost $35 million π’
π Read
via "ITPro".
The company disclosed that the attackers also had access to all of its circa 3.9 million customers' records, equivalent to 15% of the nationβs populationπ Read
via "ITPro".
ITPro
Medibank reveals damning extent of hack that could cost $35 million
The company disclosed that the attackers also had access to all of its circa 3.9 million customers' records, equivalent to 15% of the nationβs population
β Online ticketing company βSeeβ pwned for 2.5 years by attackers β
π Read
via "Naked Security".
Don't be a cybersecurity slowcoach - you need to spot possible attacks as soon as you can.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2022-3719 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in Exiv2 and classified as critical. This vulnerability affects the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The name of the patch is a38e124076138e529774d5ec9890d0731058115a. It is recommended to apply a patch to fix this issue. VDB-212350 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3716 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in SourceCodester Online Medicine Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /omos/admin/?page=user/list. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-212347.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25918 βΌ
π Read
via "National Vulnerability Database".
The package shescape from 1.5.10 and before 1.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the escape function in index.js, due to the usage of insecure regex in the escapeArgBash function.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3714 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in SourceCodester Online Medicine Ordering System 1.0. Affected is an unknown function of the file admin/?page=orders/view_order. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-212346 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3717 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in Exiv2. Affected by this issue is the function BmffImage::boxHandler of the file bmffimage.cpp. The manipulation leads to memory corruption. The attack may be launched remotely. The name of the patch is a58e52ed702d3bc7b8bab7ec1d70a4849eebece3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212348.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45476 βΌ
π Read
via "National Vulnerability Database".
Yordam Library Information Document Automation product before version 19.02 has an unauthenticated reflected XSS vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45475 βΌ
π Read
via "National Vulnerability Database".
Yordam Library Information Document Automation product before version 19.02 has an unauthenticated Information disclosure vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3718 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in Exiv2. This affects the function QuickTimeVideo::decodeBlock of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The name of the patch is 459910c36a21369c09b75bcfa82f287c9da56abf. It is recommended to apply a patch to fix this issue. The identifier VDB-212349 was assigned to this vulnerability.π Read
via "National Vulnerability Database".