MSA-22-0018: Open redirect risk in mobile auto-login featureот Michael Hawkins. The mobile auto-login URL required additional sanitizing to prevent an open redirect risk.Severity/Risk:MinorVersions affected:4.0 to 4.0.1,...
Day: November 16, 2022
K80055530: NGINX NJS vulnerability CVE-2022-43286
K80055530: NGINX NJS vulnerability CVE-2022-43286NGINX NJS vulnerability CVE-2022-43286 Security Advisory Security Advisory Description Nginx NJS v0.7.2 was discovered to contain a heap-use-after-free bug caused by illegal...
Putting People first in the Modernized SOC: XDR and the Analyst Experience
Putting People first in the Modernized SOC: XDR and the Analyst ExperienceImagine walking into an ecstatic party pumping with great beats and the happy hum that...
K25401610: OpenJDK vulnerability CVE-2021-2161
K25401610: OpenJDK vulnerability CVE-2021-2161OpenJDK vulnerability CVE-2021-2161 Security Advisory Security Advisory Description Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle...
K35802610: Multiple MySQL vulnerabilities CVE-2022-21569, CVE-2022-21824, CVE-2022-22968, CVE-2022-27778
K35802610: Multiple MySQL vulnerabilities CVE-2022-21569, CVE-2022-21824, CVE-2022-22968, CVE-2022-27778Multiple MySQL vulnerabilities CVE-2022-21569, CVE-2022-21824, CVE-2022-22968, CVE-2022-27778 Security Advisory Security Advisory Description CVE-2022-21569 Vulnerability in the MySQL Server ......
Managing Cyber Risk in a Technology-Dependent World
Managing Cyber Risk in a Technology-Dependent WorldComplexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in...
Australian companies don’t value keeping our data safe because they have little to lose. Our laws need to change that | George Newhouse and Duncan Fine
Australian companies don’t value keeping our data safe because they have little to lose. Our laws need to change that | George Newhouse and Duncan FineOur...
Webinar | 5 Simple Tips to Secure Your Hybrid Workforce
Webinar | 5 Simple Tips to Secure Your Hybrid WorkforceContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Webinar | Looking Back, Moving Forward: 3 Cybercrime Predictions for the New Year
Webinar | Looking Back, Moving Forward: 3 Cybercrime Predictions for the New YearContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Qatar’s World Cup Apps Pose Privacy Concerns
Qatar's World Cup Apps Pose Privacy ConcernsEuropean Data Protection Authorities Advise Using Loaner PhonesSoccer fans watching the 2022 FIFA World Cup live from Doha should think...
Misconfigured Server Exposed PHI of 600,000 Inmates
Misconfigured Server Exposed PHI of 600,000 InmatesClaims Processing Firm Says Affected Data Is Up to a Decade or More OldA server misconfiguration at Kentucky-based CorrectCare Integrated...
ExtraHop Taps Ex-Check Point Exec Chris Scanlan as President
ExtraHop Taps Ex-Check Point Exec Chris Scanlan as PresidentScanlan Wants to Get NDR Vendor to $500M ARR by Revamping the Go-to-Market PlanExtraHop has snagged high-profile Check...
Iranian Hacker Group Uses Log4Shell to Cryptojack US Agency
Iranian Hacker Group Uses Log4Shell to Cryptojack US AgencyHackers Exploited an Unpatched VMWare Horizon Server to Gain AccessIranian hackers used Log4Shell to penetrate the network of...
European Orgs Targeted with DTrack by North Korean Hacking Group Lazarus
European Orgs Targeted with DTrack by North Korean Hacking Group LazarusEuropean and Latin American organizations are at risk. North Korean hacking group Lazarus is using a...
The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity
The Importance of Responsible E-Waste Disposal for Enterprise CybersecurityAn Outline of the Importance of Proper E-Waste Disposal for Enterprise Best Practices in terms of both CSR...
Why Cybersecurity Is Critical for ESG
Why Cybersecurity Is Critical for ESGCyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont, CEO, NINJIO One of the most important trends […] The post...
Pilfered Keys: Free App Infected by Malware Steals Keychain Data
Pilfered Keys: Free App Infected by Malware Steals Keychain DataOpen-source applications are a practical way to save money while keeping up with your productivity. However, this...
Electricity/Energy Cybersecurity: Trends & Survey Response
Electricity/Energy Cybersecurity: Trends & Survey ResponseBased on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into...
Windows Kerberos authentication breaks after November updates
Windows Kerberos authentication breaks after November updatesMicrosoft is investigating a new known issue causing enterprise domain controllers to experience Kerberos sign-in failures and other authentication problems...
42,000 sites used to trap users in brand impersonation scheme
42,000 sites used to trap users in brand impersonation schemeA malicious for-profit group named 'Fangxiao' has created a massive network of over 42,000 web domains that...
Microsoft fixes Windows DirectAccess connectivity issues
Microsoft fixes Windows DirectAccess connectivity issuesMicrosoft has resolved a known issue causing connectivity problems for Windows customers using the DirectAccess service to access their organizations remotely...
DuckDuckGo now lets all Android users block trackers in their apps
DuckDuckGo now lets all Android users block trackers in their appsDuckDuckGo for Android's 'App Tracking Protection' feature has reached open beta, allowing all Android users to...
‘Really poor form’: Medibank yet to contact hundreds of customers with leaked personal data
‘Really poor form’: Medibank yet to contact hundreds of customers with leaked personal dataCustomers whose personal details – but not medical information – were posted online...
Ransomware Attackers Don’t Take Holidays
Ransomware Attackers Don’t Take HolidaysCybereason's Sam Curry on the Financial and Business Impact of After-Hours StrikesCyber attackers love to strike on weekends and holidays - that's...
BSidesKC 2022 – Joshua Brown’s ‘So, You Want To Be A CISO…?’
BSidesKC 2022 – Joshua Brown’s ‘So, You Want To Be A CISO…?’Our sincere thanks to [BSidesKC 2022][1] for publishing their [outstanding conference videos][2] on the organization's...
Best Strategies For Stopping Business Email Compromise (BEC) Scams
Best Strategies For Stopping Business Email Compromise (BEC) ScamsAlso known as a 'man-in-the-email' attack, a BEC scam is intended to defraud companies, their customers, partners, and...
Stories from the Field: The Scare Factor Continues to Grow for Super Malicious Insiders
Stories from the Field: The Scare Factor Continues to Grow for Super Malicious InsidersOver the last few years, executive teams and board members have become increasingly...
This was 3rd Quarter 2022 — A Cybersecurity Look Back
This was 3rd Quarter 2022 — A Cybersecurity Look BackIn the third quarter of 2022, the four universal cyberattack drivers were accounted for: war, religion, politics...
Meta’s new kill chain model tackles online threats
Meta’s new kill chain model tackles online threatsIn April 2014, Lockheed Martin revolutionized the cyber defense business by publishing a seminal white paper Intelligence-Driven Computer Network...
New Updates for ESET’s Advanced Home Solutions
New Updates for ESET's Advanced Home SolutionsIt's no secret that antivirus software is as essential to your computer as a power cord. However, the threats don't...


















