CVE-2021-22349
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart.
Proofpoint to Be Acquired by Thoma Bravo for $12.3B | IT Security News 26. April 2021 The cybersecurity company will go private following the all-cash transaction. Like this: Like Loading… Related Tags: Dark Reading: Sponsors Endpoint Cybersecurity www.endpoint-cybersecurity.com – Consulting in building your security products– Employee awareness training– Security tests for applications and pentesting… and…
Cybercrime , Cybercrime as-a-service , Email Security & Protection Attackers Co-Opted Malware for Data Exfiltration and Ransom, Group-IB Finds Akshaya Asokan (asokan_akshaya) • May 8, 2021 Attackers co-opted the Hancitor malware downloader and recently used it to deliver Cuba ransomware as part of an email spam campaign for data exfiltration and ransom extortion,…
Endpoint Security , Hardware / Chip-level Security After Researchers Release Report, Chipmakers Assert That No New Defenses Are Needed Doug Olenick (DougOlenick) • May 6, 2021 Intel and AMD are disputing the findings of researchers from two universities who say they’ve discovered new attacks on Intel and AMD processors that can bypass most…
Cybercrime , Fraud Management & Cybercrime , Fraud Risk Management Affiliate-Driven Ransomware-as-a-Service Operations Keep Generating Big Profits Mathew J. Schwartz (euroinfosec) • May 11, 2021 Statements posted to DarkSide’s data leak site “It’s not personal, Sonny. It’s strictly business.” See Also: Live Webinar | Software Security: Prescriptive vs. Descriptive That immortal…
As India and China reaffirmed their commitment to ending the standoff in Ladakh late last month, a report in The New York Times has claimed China has been targeting Indian utilities and infrastructure using cyber attacks to possibly coerce New Delhi on the border issue. The New York Times on Sunday reported that a study…
Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Fraud Risk Management Suspicious Activity Detected; Investigation Continues Scott Ferguson (Ferguson_Writes) • April 30, 2021 The Cybersecurity and Infrastructure Security Agency is investigating whether five government agencies may have been breached when attackers exploited vulnerabilities in Pulse Connect Secure VPN products, according to…