๐ด Privacy4Cars Secures Fourth Patent to Remove Privacy Information From Vehicles and Create Compliance Logs ๐ด
๐ Read
via "Dark Reading".
Data-deletion service's patent covers removing personal information such as geolocation, biometrics, and phone records from a vehicle by using a user-computing device๐ Read
via "Dark Reading".
Dark Reading
Privacy4Cars Secures Fourth Patent to Remove Privacy Information From Vehicles and Create Compliance Logs
Data-deletion service's patent covers removing personal information such as geolocation, biometrics, and phone records from a vehicle by using a user-computing device
๐1
๐๏ธ All Day DevOps: Third of Log4j downloads still pull vulnerable version despite threat of supply chain attacks ๐๏ธ
๐ Read
via "The Daily Swig".
AppSec engineer keynote says Log4j revealed lessons were not learned from the Equifax breach๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
All Day DevOps: Third of Log4j downloads still pull vulnerable version despite threat of supply chain attacks
AppSec engineer keynote says Log4j revealed lessons were not learned from the Equifax breach
โ โGucci Masterโ business email scammer Hushpuppi gets 11 years โ
๐ Read
via "Naked Security".
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the world...๐ Read
via "Naked Security".
Naked Security
โGucci Masterโ business email scammer Hushpuppi gets 11 years
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the worldโฆ
๐ด Unpatched Zimbra Platforms Are Probably Compromised, CISA Says ๐ด
๐ Read
via "Dark Reading".
Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.๐ Read
via "Dark Reading".
Dark Reading
Unpatched Zimbra Platforms Are Probably Compromised, CISA Says
Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.
๐1
๐ด Australia Declares War on Cybercrime Syndicates ๐ด
๐ Read
via "Dark Reading".
An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.๐ Read
via "Dark Reading".
Dark Reading
Australia Declares War on Cybercrime Syndicates
An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.
๐คฏ2๐1
๐ด Researchers Sound Alarm on Dangerous BatLoader Malware Dropper ๐ด
๐ Read
via "Dark Reading".
BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.๐ Read
via "Dark Reading".
Dark Reading
Researchers Sound Alarm on Dangerous BatLoader Malware Dropper
BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.
๐1๐ค1
๐ด Evolving Security for Government Multiclouds ๐ด
๐ Read
via "Dark Reading".
As the threat landscape increases, public cloud security needs to evolve.๐ Read
via "Dark Reading".
Dark Reading
Evolving Security for Government Multiclouds
As the threat landscape increases, public cloud security needs to evolve.
๐๏ธ Mastodon users vulnerable to password-stealing attacks ๐๏ธ
๐ Read
via "The Daily Swig".
Patched bug could have leaked credentials๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Mastodon users vulnerable to password-stealing attacks
Patched bug could have leaked credentials
๐ด Nasty SQL Injection Bug in Zendesk Endangers Sensitive Customer Data ๐ด
๐ Read
via "Dark Reading".
The API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.๐ Read
via "Dark Reading".
Dark Reading
Nasty SQL Injection Bug in Zendesk Endangers Sensitive Customer Data
The API-related vulnerabilities put conversations, email addresses, tickets, and more in danger of exposure via the Zendesk Explore reporting service.
๐ด Yakima Neighborhood Health Services Notice of Data Security Incident ๐ด
๐ Read
via "Dark Reading".
.๐ Read
via "Dark Reading".
Dark Reading
Yakima Neighborhood Health Services Notice of Data Security Incident
.
๐ด Red Canary Provides First-Ever MITRE Engenuityโข ATT&CKยฎ Evaluations for Managed Services ๐ด
๐ Read
via "Dark Reading".
.๐ Read
via "Dark Reading".
Dark Reading
Red Canary Provides First-Ever MITRE Engenuityโข ATT&CKยฎ Evaluations for Managed Services
.
โ๏ธ Top Zeus Botnet Suspect โTankโ Arrested in Geneva โ๏ธ
๐ Read
via "Krebs on Security".
Vyacheslav โTankโ Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, according to multiple sources.๐ Read
via "Krebs on Security".
Krebs on Security
Top Zeus Botnet Suspect โTankโ Arrested in Geneva
Vyacheslav โTankโ Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, accordingโฆ
๐๏ธ Zendesk Explore flaws opened the door to account pillage ๐๏ธ
๐ Read
via "The Daily Swig".
Patched SQLi and logical access vulnerabilities posed serious risk๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Zendesk Explore flaws opened the door to account pillage
Patched SQLi and logical access vulnerabilities posed serious risk
๐ด Google Forks Over $391.5M in Record-Setting US Consumer Privacy Settlement ๐ด
๐ Read
via "Dark Reading".
A misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.๐ Read
via "Dark Reading".
Dark Reading
Google Forks Over $391.5M in Record-Setting US Consumer Privacy Settlement
A misleading location-tracking practice ensnared the search-engine giant in massive privacy case spanning 40 states.
โ โGucci Masterโ business email scammer Hushpuppi gets 11 years โ
๐ Read
via "Naked Security".
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the world...๐ Read
via "Naked Security".
Naked Security
โGucci Masterโ business email scammer Hushpuppi gets 11 years
Learn how to protect yourself from big-money tricksters like the Hushpuppis of the worldโฆ
๐ด How Routine Pen Testing Can Reveal the Unseen Flaws in Your Cybersecurity Posture ๐ด
๐ Read
via "Dark Reading".
Testing is an ongoing mission, not a one-and-done fix.๐ Read
via "Dark Reading".
Dark Reading
How Routine Pen Testing Can Reveal the Unseen Flaws in Your Cybersecurity Posture
Testing is an ongoing mission, not a one-and-done fix.
โ Log4Shell-like code execution hole in popular Backstage dev tool โ
๐ Read
via "Naked Security".
Researchers at cloud coding security company Oxeye have written up a critical bug that they recently discovered in the popular cloud development toolkit Backstage. Their report includes an explanation of how the bug works, plus proof-of-concept (PoC) code showing how to exploit it. Backstage is whatโs known as a cloud developer portal โ a sort [โฆ]๐ Read
via "Naked Security".
Naked Security
Log4Shell-like code execution hole in popular Backstage dev tool
Good old โstring templatingโ, also known as โstring interpolationโ, in the spotlight againโฆ
๐ด Where Can Third-Party Governance and Risk Management Take Us? ๐ด
๐ Read
via "Dark Reading".
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?๐ Read
via "Dark Reading".
Dark Reading
Where Can Third-Party Governance and Risk Management Take Us?
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
๐ด Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon' ๐ด
๐ Read
via "Dark Reading".
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.๐ Read
via "Dark Reading".
Dark Reading
Wipermania: Malware Remains a Potent Threat, 10 Years Since 'Shamoon'
An in-depth analysis of system-destroying malware families presented at Black Hat Middle East & Africa shows a growing nuance in terms of how they're deployed.
๐2
โผ CVE-2022-34313 โผ
๐ Read
via "National Vulnerability Database".
IBM CICS TX 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. X-Force ID: 229449.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-2450 โผ
๐ Read
via "National Vulnerability Database".
The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them.๐ Read
via "National Vulnerability Database".