Sat.May 01, 2021

article thumbnail

Python also impacted by critical IP address validation vulnerability

Bleeping Computer

Python 3.3 standard library 'ipaddress' suffers from a critical IP address vulnerability (CVE-2021-29921) identical to the flaw that was reported in the "netmask" library earlier this year. [.].

142
142
article thumbnail

Babuk crew announced it will stop ransomware attacks

Security Affairs

Babuk ransomware operators shut down their affiliate program and announced to stop using ransomware, the group plans to move on data theft. Recently the Babuk ransomware operators made the headlines for the ransomware attack against the DC Police Department. Experts believe that the decision of the group to leave the ransomware practice could be the result of an operational error, it was a bad idea to threaten the US police department due to information that it manages.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Office 365 security baseline adds macro signing, JScript protection

Bleeping Computer

Microsoft has updated the security baseline for Microsoft 365 Apps for enterprise (formerly Office 365 Professional Plus) to include protection from JScript code execution attacks and unsigned macros. [.].

135
135
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Each year, a select pool of experts from the cybersecurity community sets hours aside to review hundreds of entries received for the SC Trust and Excellence Awards. For 2021, the judges took on a record number of submissions, identifying which products, people and companies stood out during a tumultuous year. Click here to see the full list of 2021 SC Award finalists.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Flaws in the BIND software expose DNS servers to attacks

Security Affairs

The Internet Systems Consortium (ISC) released updates for the BIND DNS software to patch several denial-of-service (DoS) and potential RCE flaws. The Internet Systems Consortium (ISC) has released security updates for the BIND DNS software to address several vulnerabilities that can be exploited by attackers to trigger denial-of-service (DoS) conditions and potentially to remotely execute arbitrary code.

DNS 119
article thumbnail

Windows 10 Device Manager update makes removing drivers easier

Bleeping Computer

?The Windows 10 Device Manager is getting a helpful upgrade that makes it easier to uninstall a specific driver by seeing what devices are using it [.].

127
127

More Trending

article thumbnail

Google Chrome is getting a new Progressive Web App feature

Bleeping Computer

In the latest effort to improve the web apps experience, Google appears to be working on a new API that will allow Chrome progressive web apps (PWAs) to 'handle' (read) files in the operating system's file system. [.].

Software 109
article thumbnail

Security News in Review: Emotet Uninstalled Worldwide; Babuk “Goes Dark”

Security Boulevard

In this week’s edition of Security News in Review, we have stories about the U.S. Department of Homeland Security calling for mandatory disclosure of ransom payments, reports about the Babuk ransomware shutting down, and the revelation that a German police operation uninstalled Emotet. . The post Security News in Review: Emotet Uninstalled Worldwide; Babuk “Goes Dark” appeared first on Security Boulevard.

article thumbnail

A Ransomware Group Hit DC Police—Then Pivoted to Extortion

WIRED Threat Level

Warrantless searches, tracking troops, and more of the week’s top security news.

article thumbnail

Multi-Factor Authentication is Not Foolproof Protection

Security Boulevard

Multi-Factor Authentication (MFA) has become increasingly common both in business and personal use. Yet, despite MFA providing increased security, threat actors are using the availability of sophisticated technology and even legitimate infrastructure to bypass this and access corporate networks and personal data. To the uninitiated, MFA is when a user is required to provide two […].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CPDP 2021 – Moderator: Arianna Rossi ‘Dark By Design: Regulating Manipulation In Online Environments’

Security Boulevard

Speakers: Frederik Zuiderveen Borgesius, Estelle Hary, Anne-Jel Hoelen, Ailo Ravna, Geoffrey. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Arianna Rossi ‘Dark By Design: Regulating Manipulation In Online Environments’ appeared first on Security Boulevard.

article thumbnail

CPDP 2021 – Moderator: Judith Rauhofer ‘An Expert Take On Schrems II – From The Experts From SCHREMS II’

Security Boulevard

Speakers: Alan Butler, Ashley Gorski, Neil Richards, Andrew Serwin. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Judith Rauhofer ‘An Expert Take On Schrems II – From The Experts From SCHREMS II’ appeared first on Security Boulevard.