Author: DEFENDEDGE
-
Microsoft Warns: Another Unpatched PrintNightmare Zero-Day
The out-of-band warning pairs with a working proof-of-concept exploit for the issue, circulating since mid-July. Read more
-
Accenture Confirms LockBit Ransomware Attack
LockBit offered Accenture’s purported databases and made a requisite jab at its purportedly sad security. Accenture says it recovered just fine from backups. Read more
-
SAP Patches Nine Critical & High-Severity Bugs
Experts urged enterprises to patch fast: SAP vulnerabilities are being weaponized in a matter of hours. Read more
-
Connected Farms Easy Pickings for Global Food Supply-Chain Hack
John Deere security bugs could allow cyberattackers to damage crops, surrounding property or even people; impact harvests; or destroy farmland for years. Read more
-
Actively Exploited Windows Zero-Day Gets a Patch
Microsoft’s August 2021 Patch Tuesday addressed a smaller set of bugs than usual, including more Print Spooler problems, a zero-day and seven critical vulnerabilities. Read more
-
Citrix Releases Security Update for ShareFile Storage Zones Controller
Original release date: August 10, 2021 Citrix has released a security update to address a vulnerability affecting Citrix ShareFile storage zones controller. An attacker can exploit this vulnerability to obtain access to sensitive information. CISA recommends users and administrators review Citrix Security Bulletin CTX322787 and apply the necessary update. This product is provided subject to… Read more
-
Microsoft Releases August 2021 Security Updates
Original release date: August 10, 2021 Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review Microsoft’s August 2021 Security Update Summary and Deployment Information and apply the necessary updates. This product is provided… Read more
-
eCh0raix Ransomware Variant Targets QNAP, Synology NAS Devices
Some bad actors are honing tools to go after small fry: This variant was refined to target not one, but two vendors’ devices that are common in SOHO setups. Read more
-
Fuzz Off: How to Shake Up Code to Get It Right – Podcast
Is fuzzing for the cybersec elite, or should it be accessible to all software developers? FuzzCon panelists say join the party as they share fuzzing wins & fails. Read more
-
‘Glowworm’ Attack Turns Power Light Flickers into Audio
Researchers have found an entirely new attack vector for eavesdropping on Zoom and other virtual meetings. Read more