CVE-2021-1522
CVE-2021-1522
Globally, 90 per cent of enterprises among those surveyed are yet to achieve their digital-first goals with 49 per cent admitting that cyber security is the top-most priority for their business, a report showed on Monday. While 45 per cent of enterprises lost productivity during the crisis due to problems of connectivity, 41 per cent…
McDonald’s, the world’s largest burger chain, said on Friday that a data breach in South Korea and Taiwan has exposed some customer and employee information, making it the latest global company to be targeted by cybercriminals. The attackers accessed e-mails, phone numbers, and delivery addresses, but the breach did not include customer payment information, the…
A serious vulnerability affecting the Linphone Session Initiation Protocol (SIP) client suite can allow malicious actors to remotely crash applications, industrial cybersecurity firm Claroty warned on Tuesday. SIP is a signaling protocol designed for initiating, maintaining and terminating communication sessions. The protocol is often used for voice, video, instant messaging, and other types of applications….
Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service Disruption of Meat Processing Giant JBS Exposes Sector’s Security Shortcomings Scott Ferguson (Ferguson_Writes) • June 4, 2021 Photo: US Department of Agriculture via Flickr/CC The ransomware attack that disrupted operations at meat processing giant JBS for nearly a week has exposed numerous cybersecurity shortcomings within…
Apple AirTag, the Bluetooth tracker that was unveiled last month to let people find their lost items, is claimed to have some security loopholes that could allow hackers to modify its firmware. A security researcher has demonstrated the loopholes by hacking the AirTag using reverse engineering. The researcher claimed on Twitter that he was able…
There is an out of bounds write vulnerability in Huawei Smartphone HUAWEI P30 versions 9.1.0.131(C00E130R1P21) when processing a message. An unauthenticated attacker can exploit this vulnerability by sending specific message to the target device. Due to insufficient validation of the input….