SecurityTicks

What would sustainable security even look like?

What would sustainable security even look like? 31/07/2023 at 11:34 By Rupert Goodwins Clue: Nothing like what’s on offer today Opinion  “There seems to be something wrong with our bloody ships today,” fumed Admiral David Beatty during 1916’s Battle of Jutland. Fair enough: three of the Royal Navy’s finest vessels had just blown up and […]

React to this headline:

Loading spinner

What would sustainable security even look like? Read More »

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable 31/07/2023 at 11:17 By Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors to escalate privileges and steal sensitive data. The flaws, tracked as CVE-2023-37979, CVE-2023-38386, and CVE-2023-38393, impact versions 3.6.25 and below,

React to this headline:

Loading spinner

Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable Read More »

Stremio vulnerability exposes millions to RCE and data theft

Stremio vulnerability exposes millions to RCE and data theft 31/07/2023 at 11:02 By Help Net Security CyFox has recently identified a critical hijacking vulnerability in Stremio 4.4, a popular software platform for streaming movies and TV shows. With over 5 million users relying on Stremio for their entertainment needs, this vulnerability poses a significant risk

React to this headline:

Loading spinner

Stremio vulnerability exposes millions to RCE and data theft Read More »

Avaya reseller pleads guilty to role in $88m licensing scam

Avaya reseller pleads guilty to role in $88m licensing scam 31/07/2023 at 10:02 By Simon Sharwood Comms vendor’s employee allegedly generated bogus licences and hijacked sysadmin accounts to make more A New Jersey man has plead guilty to selling pirated Avaya software licenses, allegedly generated and shopped by one of the vendor’s system administrators.… This

React to this headline:

Loading spinner

Avaya reseller pleads guilty to role in $88m licensing scam Read More »

NASA mistakenly severs communication to Voyager 2

NASA mistakenly severs communication to Voyager 2 31/07/2023 at 09:03 By Laura Dobberstein Thankfully the probe can phone home to fix this sort of mess NASA revealed on Friday that its venerable Voyager 2 probe is currently incommunicado, because the space agency pointed its antenna in the wrong direction.… This article is an excerpt from

React to this headline:

Loading spinner

NASA mistakenly severs communication to Voyager 2 Read More »

‘Weird numerological coincidence’ found during work on Linux kernel 6.5

‘Weird numerological coincidence’ found during work on Linux kernel 6.5 31/07/2023 at 08:02 By Simon Sharwood It might be the only non-boring thing about the release, which has Linus Torvalds celebrating Linus Torvalds has noticed a “weird numerological coincidence” during work on version 6.5 of the Linux kernel.… This article is an excerpt from The

React to this headline:

Loading spinner

‘Weird numerological coincidence’ found during work on Linux kernel 6.5 Read More »

How the best CISOs leverage people and technology to become superstars

How the best CISOs leverage people and technology to become superstars 31/07/2023 at 07:47 By Help Net Security What separates superstar CISOs from the rest of the pack is that they are keenly aware of the burgeoning threat landscape and the cybersecurity skills shortage, but they don’t give in to despair. Instead, they use their

React to this headline:

Loading spinner

How the best CISOs leverage people and technology to become superstars Read More »

Data privacy vault: Securing sensitive data while navigating regulatory demands

Data privacy vault: Securing sensitive data while navigating regulatory demands 31/07/2023 at 07:32 By Help Net Security In this Help Net Security interview, Jean-Charles Chemin, CEO of Legapass, provides insight into the correlation between maintaining customer trust and protecting sensitive customer data. He emphasizes how a data privacy vault can reinforce customer trust by offering

React to this headline:

Loading spinner

Data privacy vault: Securing sensitive data while navigating regulatory demands Read More »

Relying on CVSS alone is risky for vulnerability management

Relying on CVSS alone is risky for vulnerability management 31/07/2023 at 07:05 By Help Net Security A vulnerability management strategy that relies solely on CVSS for vulnerability prioritization is proving to be insufficient at best, according to Rezilion. In fact, relying solely on a CVSS severity score to assess the risk of individual vulnerabilities was

React to this headline:

Loading spinner

Relying on CVSS alone is risky for vulnerability management Read More »

Open-source security challenges and complexities

Open-source security challenges and complexities 31/07/2023 at 06:31 By Help Net Security Open source refers to software or technology that is made available to the public with its source code openly accessible, editable, and distributable. In other words, the source code contains the underlying programming instructions and is freely available for anyone to view, modify,

React to this headline:

Loading spinner

Open-source security challenges and complexities Read More »

Indonesia blocks Musk’s X.com over its X-rated past

Indonesia blocks Musk’s X.com over its X-rated past 31/07/2023 at 06:17 By Laura Dobberstein ALSO: Japan’s government to write docs with AI; 5G boom coming; India denies infosec issues Asia In Brief  Elon Musk’s rebadged Twitter, X.com, has been blocked in Indonesia as the domain was formerly used to for websites containing content deemed unsuitable,

React to this headline:

Loading spinner

Indonesia blocks Musk’s X.com over its X-rated past Read More »

The race against time in ransomware attacks

The race against time in ransomware attacks 31/07/2023 at 06:02 By Help Net Security Most organizations lack strong cyber resilience strategies or data security capabilities to address threats and maintain business continuity, according to BigID. Despite both the rise in threats and the high percentage of respondents whose organizations suffered recent attacks, there hasn’t been

React to this headline:

Loading spinner

The race against time in ransomware attacks Read More »

Week in review: Ivanti zero-day exploited, MikroTik vulnerability could compromise 900,000 routers

Week in review: Ivanti zero-day exploited, MikroTik vulnerability could compromise 900,000 routers 30/07/2023 at 11:02 By Help Net Security Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key factors for effective security automation In this Help Net Security interview, Oliver Rochford, Chief Futurist at Tenzir, discusses how automation

React to this headline:

Loading spinner

Week in review: Ivanti zero-day exploited, MikroTik vulnerability could compromise 900,000 routers Read More »

Microsoft co-founder Paul Allen’s pop artifact stash now heads to a museum

Microsoft co-founder Paul Allen’s pop artifact stash now heads to a museum 29/07/2023 at 16:19 By Brandon Vigliarolo Kurt Cobain and Jimi Hendrick’s guitars, Vader’s helmet, Captain Kirk’s chair, and more Paul Allen left more than just a tech legacy and billions of dollars behind when he died. The Microsoft co-founder amassed a sizable collection

React to this headline:

Loading spinner

Microsoft co-founder Paul Allen’s pop artifact stash now heads to a museum Read More »

Exclusive: Pentagon Investigates ‘Critical Compromise’ Of Air Force Communications Systems

Exclusive: Pentagon Investigates ‘Critical Compromise’ Of Air Force Communications Systems 29/07/2023 at 14:32 By Thomas Brewster, Forbes Staff FBI communications may also have been compromised by an engineer working on Tennessee Air Force base, search warrant reveals. This article is an excerpt from Forbes – Cybersecurity View Original Source React to this headline:

React to this headline:

Loading spinner

Exclusive: Pentagon Investigates ‘Critical Compromise’ Of Air Force Communications Systems Read More »

Apple demands app makers explain use of sensitive APIs

Apple demands app makers explain use of sensitive APIs 29/07/2023 at 12:24 By Thomas Claburn Privacy ritual aims to deter fingerprinting of the iFaithful Apple has told developers writing apps for its shiny stuff that they will soon have to explain why their programs use certain sensitive APIs.… This article is an excerpt from The

React to this headline:

Loading spinner

Apple demands app makers explain use of sensitive APIs Read More »

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data 29/07/2023 at 11:31 By A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather sensitive data stored in pictures. CherryBlos, per Trend Micro, is distributed via bogus posts on social media platforms and comes with capabilities to steal

React to this headline:

Loading spinner

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data Read More »

Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse

Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse 29/07/2023 at 09:21 By Apple has announced plans to require developers to submit reasons to use certain APIs in their apps starting later this year with the release of iOS 17, iPadOS 17, macOS Sonoma, tvOS 17, and watchOS 10 to prevent their

React to this headline:

Loading spinner

Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse Read More »

RFP Template for Browser Security

RFP Template for Browser Security 29/07/2023 at 09:21 By Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses of all sizes. A group of experts have recognized the pressing need for comprehensive browser security solutions and collaborated to develop “The Definitive Browser Security RFP Template.” This resource helps streamline the

React to this headline:

Loading spinner

RFP Template for Browser Security Read More »

Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks

Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks 29/07/2023 at 08:32 By The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a “novel persistent backdoor” called SUBMARINE deployed by threat actors in connection with the hack on Barracuda Email Security Gateway (ESG) appliances. “SUBMARINE comprises multiple artifacts — including a SQL

React to this headline:

Loading spinner

Hackers Deploy “SUBMARINE” Backdoor in Barracuda Email Security Gateway Attacks Read More »

Scroll to Top