Sat.Jul 02, 2022

article thumbnail

Weekly Update 302

Troy Hunt

In a complete departure from the norm, this week's video is the much-requested "cultural differences" one with Charlotte. No tech (other than my occasional plug for the virtues of JavaScript), but lots of experiences from both of us living and working in different parts of the world. Most of it is what Charlotte has learned being thrown into the deep end of Aussieness (without the option of even getting out of the country until very recently), which I thought made for some pretty fu

Passwords 203
article thumbnail

Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool

Security Affairs

Researchers shared technical details and proof-of-concept exploit code for the CVE-2022-28219 flaw in Zoho ManageEngine ADAudit Plus tool. Security researchers from Horizon3.ai have published technical details and proof-of-concept exploit code for a critical vulnerability, tracked as CVE-2022-28219 (CVSS 9.8 out of 10), in the Zoho ManageEngine ADAudit Plus tool.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security BSides Athens 2022 – Christina Skouloudi’s ‘Talk 2 – Team Europe & The International Cybersecurity Challenge’

Security Boulevard

Our sincere thanks to Security BSides Athens for publishing their Presenter’s Security BSides Athens 2022 Conference content on the organization’s’ YouTube channel. Permalink. The post Security BSides Athens 2022 – Christina Skouloudi’s ‘Talk 2 – Team Europe & The International Cybersecurity Challenge’ appeared first on Security Boulevard.

article thumbnail

Rogue HackerOne employee steals bug reports to sell on the side

Bleeping Computer

A HackerOne employee stole vulnerability reports submitted through the bug bounty platform and disclosed them to affected customers to claim financial rewards. [.].

98
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Gun Database Breach Leaks Details on Thousands of Owners

WIRED Threat Level

Plus: Indian hacker-for-hire groups, Chinese student espionage efforts, and more.

88
article thumbnail

Microsoft finds Raspberry Robin worm in hundreds of Windows networks

Bleeping Computer

Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors. [.].

98

More Trending

article thumbnail

Verified Twitter accounts hacked to send fake suspension notices

Bleeping Computer

[.].

article thumbnail

Security BSides Athens 2022 – Brian Contos’ ‘Talk 1 – Cameras, CACs & Clocks: Enterprise IoT Security Sucks – A Story of Two Million Interrogated Production IoT Devices’

Security Boulevard

Our sincere thanks to Security BSides Athens for publishing their Presenter’s Security BSides Athens 2022 Conference content on the organization’s’ YouTube channel. Permalink. The post Security BSides Athens 2022 – Brian Contos’ ‘Talk 1 – Cameras, CACs & Clocks: Enterprise IoT Security Sucks – A Story of Two Million Interrogated Production IoT Devices’ appeared first on Security Boulevard.

IoT 52
article thumbnail

The role of Social Media in modern society – Social Media Day 22 interview

Security Affairs

This is a transcription of an interview I had at Iran International broadcaster, I discussed about the role of social media in modern society. What’s the Middle East government’s role on Cyber bullying towards opposition activists? Middle East governments play a crucial role in cyberbullying against the opposition. Several independent organizations for the protection of human rights claim that governments in the area have used social media surveillance and law to silence expression o

Media 70