CVE-2021-22350
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart.
BEIJING/HONG KONG -Ride-hailing giant Didi Global Inc said a regulatory order that its app be removed from app stores in China could hurt revenue, while other newly U.S.-listed Chinese firms also found themselves the subject of cybersecurity investigations. Sunday’s takedown order from the Cyberspace Administration of China (CAC) comes just two days after the regulator…
The Czech Republic on Saturday blamed a series of mysterious 2014 explosions at Czech ammunition depots on an elite unit of Russia’s military intelligence service — a group that Britain has linked to a 2018 attack with a nerve agent on a former Russian spy in Salisbury, England. Prime Minister Andrej Babis said at a…
Facial recognition tech: Not just for IDing criminals By Susan Miller Aug 25, 2021 Federal agencies are expanding their use of facial recognition technology, especially for authenticating users before granting them digital access to devices. According to an Aug. 24 Government Accountability Office report, 18 of the 24 agencies surveyed used FRT for…
Biden Opposes Conditional Handover of Cyber-criminals The possibility of a deal allowing for the conditional handover of cyber-criminals between the United States and Russia has been extinguished by American president Joseph Biden. Russian president Vladimir Putin said on June 13 that he would be willing to make an arrangement with the United States whereby the two…
The Czech Republic has blamed a series of mysterious 2014 explosions at Czech ammunition depots on an elite unit of Russia’s military intelligence service — a group that Britain has linked to a 2018 attack with a nerve agent on a former Russian spy in Salisbury, England. Prime Minister Andrej Babis said at a Prague…
HolesWarm crypto malware hits unpatched Linux, Windows servers | IT Security News Android App Android App with push notifications Sponsors Endpoint Cybersecurity www.endpoint-cybersecurity.com – Consulting in building your security products– Employee awareness training– Security tests for applications and pentesting… and more. Daily Summary Categories CategoriesSelect Category(ISC)2 Blog (323)(ISC)2 Blog infosec (13)(ISC)² Blog (409)2020-12-08 – Files for an ISC…