ποΈ How to become a penetration tester: Part 2 β βMr hackingβ John Jackson on the virtue of βendless curiosityβ ποΈ
π Read
via "The Daily Swig".
Marine Corps engineer-turned offensive security expert offers careers advice and his best and worst experiencesπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
How to become a penetration tester: Part 2 β βMr Hackingβ John Jackson on the virtue of βendless curiosityβ
Marine Corps engineer-turned offensive security expert offers careers advice and his best and worst experiences
β OneCoin scammer Sebastian Greenwood pleads guilty, βCryptoqueenβ still missing β
π Read
via "Naked Security".
The Cryptoqueen herself is still missing, but her co-conspirator, who is said to have pocketed over $20m a month, has been convicted.π Read
via "Naked Security".
Naked Security
OneCoin scammer Sebastian Greenwood pleads guilty, βCryptoqueenβ still missing
The Cryptoqueen herself is still missing, but her co-conspirator, who is said to have pocketed over $20m a month, has been convicted.
π΄ Cybersecurity VMRay Extends Series B Investment to a Total of $34 million USD to Drive Growth Into New Markets π΄
π Read
via "Dark Reading".
VMRay announces the closing of a Series B led by global alternative asset manager Tikehau Capital, which will fuel further expansion of the product portfolio to target a broader set of market segments.π Read
via "Dark Reading".
Dark Reading
Cybersecurity Company VMRay Extends Series B Investment to a Total of $34M USD to Drive Growth into New Markets
VMRay announces the closing of a Series B led by global alternative asset manager Tikehau Capital, which will fuel further expansion of the product portfolio to target a broader set of market segments.
π΄ Coming to a SOC Near You: New Browsers, 'Posture' Management, Virtual Assistants π΄
π Read
via "Dark Reading".
Startups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI automation.π Read
via "Dark Reading".
Dark Reading
Coming to a SOC Near You: New Browsers, 'Posture' Management, Virtual Assistants
Startups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI automation.
β Microsoft dishes the dirt on Appleβs βAchilles heelβ shortly after fixing similar Windows bug β
π Read
via "Naked Security".
It happens to the best of us: Microsoft highlights a security bypass bug on Macs that is curiously similar to a recent Windows 0-day.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2022-46076 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR-869 DIR869Ax_FW102B15 is vulnerable to Authentication Bypass via phpcgi.π Read
via "National Vulnerability Database".
π΄ Searchlight Security Changes Name to Searchlight Cyber and Launches New Brand π΄
π Read
via "Dark Reading".
Searchlight Cyber announces rebrand that reflects its status as a fast-growing cybersecurity business.π Read
via "Dark Reading".
Dark Reading
Searchlight Security Changes Name to Searchlight Cyber and Launches New Brand
Searchlight Cyber announces rebrand that reflects its status as a fast-growing cybersecurity business.
π1
π΄ How AI/ML Can Thwart DDoS Attacks π΄
π Read
via "Dark Reading".
When properly designed and trained, artificial intelligence and machine learning can help improve the accuracy of DDoS detection and mitigation.π Read
via "Dark Reading".
Dark Reading
How AI/ML Can Thwart DDoS Attacks
When properly designed and trained, artificial intelligence and machine learning can help improve the accuracy of distributed denial-of-service detection and mitigation.
π1
βοΈ The Equifax Breach Settlement Offer is Real, For Now βοΈ
π Read
via "Krebs on Security".
Millions of people likely just received an email or snail mail notice saying they're eligible to claim a class action payment in connection with the 2017 megabreach at consumer credit bureau Equifax. Given the high volume of reader inquiries about this, it seemed worth pointing out that while this particular offer is legit (if paltry), scammers are likely to soon capitalize on public attention to the settlement money.π Read
via "Krebs on Security".
Krebs on Security
The Equifax Breach Settlement Offer is Real, For Now
Millions of people likely just received an email or snail mail notice saying they're eligible to claim a class action payment in connection with the 2017 megabreach at consumer credit bureau Equifax. Given the high volume of reader inquiries aboutβ¦
π΄ NATO-Member Oil Refinery Targeted in Russian APT Blitz Against Ukraine π΄
π Read
via "Dark Reading".
Security Service-backed Trident Ursa APT group shakes up tactics in its relentless cyberattacks against Ukraine.π Read
via "Dark Reading".
Dark Reading
NATO-Member Oil Refinery Targeted in Russian APT Blitz Against Ukraine
Security Service-backed Trident Ursa APT group shakes up tactics in its relentless cyberattacks against Ukraine.
π΄ Raspberry Robin Worm Targets Telcos & Governments π΄
π Read
via "Dark Reading".
With 10 layers of obfuscation and fake payloads, the Raspberry Robin worm is nesting its way deep into organizations.π Read
via "Dark Reading".
Dark Reading
Raspberry Robin Worm Targets Telcos & Governments
With 10 layers of obfuscation and fake payloads, the Raspberry Robin worm is nesting its way deep into organizations.
βΌ CVE-2022-43875 βΌ
π Read
via "National Vulnerability Database".
IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow an authenticated user to lock additional RM authorizations, resulting in a denial of service on displaying or managing these authorizations. IBM X-Force ID: 240034.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46424 βΌ
π Read
via "National Vulnerability Database".
An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23537 βΌ
π Read
via "National Vulnerability Database".
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. Buffer overread is possible when parsing a specially crafted STUN message with unknown attribute. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as a commit in the master branch (2.13.1).π Read
via "National Vulnerability Database".
βΌ CVE-2022-46912 βΌ
π Read
via "National Vulnerability Database".
An issue in the firmware update process of TP-Link TL-WR841N / TL-WA841ND V7 3.13.9 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46771 βΌ
π Read
via "National Vulnerability Database".
IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.18, 7.0.5.0 through 7.0.5.13, 7.1.0.0 through 7.1.2.9, 7.2.0.0 through 7.2.3.2 and 7.3.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 242273.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46430 βΌ
π Read
via "National Vulnerability Database".
TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46434 βΌ
π Read
via "National Vulnerability Database".
An issue in the firmware update process of TP-Link TL-WA7510N v1 v3.12.6 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46432 βΌ
π Read
via "National Vulnerability Database".
An exploitable firmware modification vulnerability was discovered on TP-Link TL-WR743ND V1. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v3.12.20 and earlier.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38873 βΌ
π Read
via "National Vulnerability Database".
D-Link devices DAP-2310 v2.10rc036 and earlier, DAP-2330 v1.06rc020 and earlier, DAP-2360 v2.10rc050 and earlier, DAP-2553 v3.10rc031 and earlier, DAP-2660 v1.15rc093 and earlier, DAP-2690 v3.20rc106 and earlier, DAP-2695 v1.20rc119_beta31 and earlier, DAP-3320 v1.05rc027 beta and earlier, DAP-3662 v1.05rc047 and earlier allows attackers to cause a Denial of Service (DoS) via uploading a crafted firmware after modifying the firmware header.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46422 βΌ
π Read
via "National Vulnerability Database".
An issue in Netgear WNR2000 v1 1.2.3.7 and earlier allows authenticated attackers to cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.π Read
via "National Vulnerability Database".