Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Trends, Reports, Analysis

BlackBerry published a European research exposing the cybersecurity risk created by cost-conscious homeworkers who prioritize security behind price, usability, and ease of setup in their purchase of domestic smart devices.

 Laws, Policy, Regulations

Smart devices connected to the internet such as fridges and TVs will have to comply with tough EU cybersecurity rules or risk being fined or banned from the bloc, according to a European Commission document seen by Reuters on Thursday.

 Trends, Reports, Analysis

In attacks on Linux systems, first, an attacker exploits a vulnerability (or a chain of vulnerabilities) to gain initial access to the environment. From there, an attacker may take different paths to move further inside the compromised environment.

 Expert Blogs and Opinion

Many people tend to use the same password in different programs and rarely change their passwords. When the time comes to modify their passwords, many people follow a predictable pattern which creates security risks.

 Malware and Vulnerabilities

Tracked as CVE-2022-20696, the issue exists because of insufficient protection mechanisms on messaging server container ports, allowing an unauthenticated attacker to connect to an affected system using these ports.

 Trends, Reports, Analysis

In recent years, cybercriminals have been actively spreading malicious WebSearch adware extensions. Members of this family are usually disguised as tools for Office files, for example, for Word-to-PDF conversion.

 Feed

Ubuntu Security Notice 5523-2 - USN-5523-1 fixed several vulnerabilities in LibTIFF. This update provides the fixes for CVE-2022-0907, CVE-2022-0908, CVE-2022-0909, CVE-2022-0924 and CVE-2022-22844 for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was discovered that LibTIFF was not properly performing checks to guarantee   show more ...

that allocated memory space existed, which could lead to a NULL pointer dereference via a specially crafted file. An attacker could possibly use this issue to cause a denial of service.

 Feed

A number of firmware security flaws uncovered in HP's business-oriented high-end notebooks continue to be left unpatched in some devices even months after public disclosure. Binarly, which first revealed details of the issues at the Black Hat USA conference in mid-August 2022, said the vulnerabilities "can't be detected by firmware integrity monitoring systems due to limitations of the Trusted

 Feed

A hacktivist collective called GhostSec has claimed credit for compromising as many as 55 Berghof programmable logic controllers (PLCs) used by Israeli organizations as part of a "Free Palestine" campaign. Industrial cybersecurity firm OTORIO, which dug deeper into the incident, said the breach was made possible owing to the fact that the PLCs were accessible through the Internet and were

 Feed

SOC 2 may be a voluntary standard, but for today's security-conscious business, it's a minimal requirement when considering a SaaS provider. Compliance can be a long and complicated process, but a scanner like Intruder makes it easy to tick the vulnerability management box. Security is critical for all organisations, including those that outsource key business operations to third parties like

 Feed

China has accused the U.S. National Security Agency (NSA) of conducting a string of cyberattacks aimed at aeronautical and military research-oriented Northwestern Polytechnical University in the city of Xi'an in June 2022. The National Computer Virus Emergency Response Centre (NCVERC) disclosed its findings last week, and accused the Office of Tailored Access Operations (TAO) at the USA's

2022-09
Aggregator history
Monday, September 12
THU
FRI
SAT
SUN
MON
TUE
WED
SeptemberOctoberNovember