CVE-2021-22349
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart.
Pegasus – possibly the most powerful piece of spyware ever developed – has been found on mobile phones around the world. A major investigation is alleging that the malware was used to hack the phones of politicians, activists and prominent news editors worldwide. The hacking software – or spyware – is marketed and licensed to…
Application Security , Endpoint Security , Fraud Management & Cybercrime Dell Issues Security Advisory to Address Flaws Rashmi Ramesh • June 28, 2021 Researchers at security firm Eclypsium report that they have identified four vulnerabilities that could affect 30 million users of computer technology company Dell’s laptops, desktops and tablets. See Also: Live…
Microsoft fixed 55 vulnerabilities yesterday including three zero-days not thought to have been exploited in the wild, one of which affected the under-fire Exchange Server. This month’s Patch Tuesday is lighter than many have been in recent months, but there were four critical CVEs for admins to address, alongside the three publicly disclosed bugs. Top…
Application Security , Biometrics , Encryption & Key Management Microsoft Promises Better ‘Zero Trust’ Capability, Passwordless Access Doug Olenick (DougOlenick) • June 25, 2021 Microsoft’s upcoming Windows 11 operating system will have new security capabilities and a new look. (Source: Microsoft) Security specialists are offering preliminary feedback on Microsoft’s sneak peek at the…
Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime IBM: Campaign Targeted Reformists Before Election Akshaya Asokan (asokan_akshaya) • August 9, 2021 Screenshot of ITG18’s hacking activities seen from its leaked videos in July 2020. (Source: IBM X-Force) A group dubbed “ITG18,” which apparently is linked to an Iranian advanced…
New guidance from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) provides information on the steps that administrators can take to minimize risks associated with Kubernetes deployments. An open source container orchestration system for deploying and managing applications in containers, Kubernetes is often deployed in cloud environments. Improperly…