βΌ CVE-2023-30450 βΌ
π Read
via "National Vulnerability Database".
rpk in Redpanda before 23.1.2 mishandles the redpanda.rpc_server_tls field, leading to (for example) situations in which there is a data type mismatch that cannot be automatically fixed by rpk, and instead a user must reconfigure (while a cluster is turned off) in order to have TLS on broker RPC ports. NOTE: the fix was also backported to the 22.2 and 22.3 branches.π Read
via "National Vulnerability Database".
β Popular server-side JavaScript security sandbox βvm2β patches remote execution hole β
π Read
via "Naked Security".
The security error was in the error handling system that was supposed to catch potential security errors...π Read
via "Naked Security".
Naked Security
Popular server-side JavaScript security sandbox βvm2β patches remote execution hole
The security error was in the error handling system that was supposed to catch potential security errorsβ¦
π’ New Rorschach ransomware almost twice as fast as LockBit π’
π Read
via "ITPro".
The sophisticated strain is made of cherry-picked code from other leading lockers and operated by an unknown groupπ Read
via "ITPro".
ITPro
New Rorschach ransomware almost twice as fast as LockBit
The sophisticated strain is made of cherry-picked code from other leading lockers and operated by an unknown group
π’ Novel social engineering attacks soar 135% amid uptake of generative AI π’
π Read
via "ITPro".
82% of employees are worried about hackers using generative AI to create scam emailsπ Read
via "ITPro".
ITPro
Novel social engineering attacks soar 135% amid uptake of generative AI
82% of employees are worried about hackers using generative AI to create scam emails
π₯1
π’ Storage's role in addressing the challenges of ensuring cyber resilience π’
π Read
via "ITPro".
Understanding the role of data storage in cyber resiliencyπ Read
via "ITPro".
ITPro
Storage's role in addressing the challenges of ensuring cyber resilience
Understanding the role of data storage in cyber resiliency
π’ UKβs offensive hacking force plans to scale operations to meet government's demands π’
π Read
via "ITPro".
The NCF conducts cyber operations "on a daily basis" to protect UK national security and counter growing cyber threatsπ Read
via "ITPro".
ITPro
UKβs offensive hacking force plans to scale operations to meet government's demands
The NCF conducts cyber operations "on a daily basis" to protect UK national security and counter growing cyber threats
π1
π’ IDC MarketScape: Worldwide unified endpoint management services π’
π Read
via "ITPro".
2022 vendor assessmentπ Read
via "ITPro".
ITPro
IDC MarketScape: Worldwide unified endpoint management services
2022 vendor assessment
β€1
π’ The GoAnywhere data breach explained π’
π Read
via "ITPro".
How a zero-day vulnerability in Fortraβs GoAnywhere MFT product led to an array of high-profile cyber attacks around the worldπ Read
via "ITPro".
ITPro
The GoAnywhere data breach explained
How a zero-day vulnerability in Fortraβs GoAnywhere MFT product led to breaches of high-profile firms across the globe
π’ Using APIs to rewire supply chains in 2023 π’
π Read
via "ITPro".
Supply chains are on the mend after breaking down recently, and APIs are helping stakeholders get a better handle on dataπ Read
via "ITPro".
channelpro
Using APIs to rewire supply chains in 2023
Supply chains are on the mend after breaking down recently, and APIs are helping stakeholders get a better handle on data
π’ UK criminal records office suffers two-month "cyber security incident" π’
π Read
via "ITPro".
ACRO was forced to shut its systems offline and security experts are suggesting ransomware may be involvedπ Read
via "ITPro".
ITPro
UK criminal records office suffers two-month "cyber security incident"
ACRO was forced to shut its systems offline and security experts are suggesting ransomware may be involved
π’ Unified Endpoint Management and Security in a work-from-anywhere world π’
π Read
via "ITPro".
Management and security activities are deeply intertwined, requiring integrated workflows between IT and security teamsπ Read
via "ITPro".
ITPro
Unified Endpoint Management and Security in a work-from-anywhere world
New ways to mitigate vulnerabilities and support threat detection & response
π’ An EDR buyer's guide π’
π Read
via "ITPro".
How to pick the best endpoint detection and response solution for your businessπ Read
via "ITPro".
ITPro
An EDR buyer's guide
How to pick the best endpoint detection and response solution for your business
π’ Western Digital suffers cyber attack, shuts down systems π’
π Read
via "ITPro".
Customers are taking to Twitter to report theyβre unable to log into their storage products through Western Digitalβs online portalπ Read
via "ITPro".
ITPro
Western Digital suffers cyber attack, shuts down systems
Customers are taking to Twitter to report theyβre unable to log into their storage products through Western Digitalβs online portal
π’ 2022 Magic quadrant for Security Information and Event Management (SIEM) π’
π Read
via "ITPro".
SIEM is evolving into a security platform with multiple features and deployment modelsπ Read
via "ITPro".
ITPro
2022 Magic quadrant for Security Information and Event Management (SIEM)
SIEM is evolving into a security platform with multiple features and deployment models
π’ Nearly half of security practitioners told to βkeep data breaches under wrapsβ π’
π Read
via "ITPro".
Security professionals are increasingly worried about legal action due to a mismanaged data breach responseπ Read
via "ITPro".
ITPro
Nearly half of security practitioners told to βkeep data breaches under wrapsβ
Security professionals are increasingly worried about legal action due to a mismanaged data breach response
βΌ CVE-2023-27730 βΌ
π Read
via "National Vulnerability Database".
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27727 βΌ
π Read
via "National Vulnerability Database".
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27728 βΌ
π Read
via "National Vulnerability Database".
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27719 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_478360 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27720 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_48d630 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27718 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_498308 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.π Read
via "National Vulnerability Database".