CVE-2021-35392
CVE-2021-35392
It has been reported that data from over 500 million LinkedIn users are being sold online to hackers, marking the second major cybersecurity incident to be revealed in the past week, following news of a similar occurrence involving Facebook. The trove of scraped LinkedIn data includes user IDs, full names, email addresses, phone numbers, professional…
WhatsApp image filter function had a potential security flaw that could allow hackers to get hold of sensitive data. The major security vulnerability was discovered by security research firm Check Point Research (CPR). The research firm pointed out that the flaw rooted in the image filter function of WhatsApp for Android could be triggered when…
In a novel approach to ransom demands, a new ransomware calling itself ‘NitroRansomware’ encrypts victim’s files and then demands a Discord Nitro gift code to decrypt files. While Discord is free, they offer a Nitro subscription add-on for $9.99 per month that provides additional perks, such as larger uploads, HD video streaming, enhanced emojis, and…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday announced that it has appointed Kiersten Todt as its new chief of staff. Before joining CISA as chief of staff, Todt served as managing director of the non-profit Cyber Readiness Institute (CRI). She also served as president and managing partner at risk management consulting firm…
The flaw, disclosed Monday by Citizen Lab, allowed a hacker using NSO’s malware Pegasus to gain access to a device owned by a Saudi activist, according to security researchers. By Kartikay Mehrotra and Davide Scigliuzzo and William TurtonBloomberg Apple Inc. said it patched a security flaw in the Messages app after security researchers determined that Israel-based NSO Group…
Breach Notification , Governance & Risk Management , Incident & Breach Response Firm Pays $1 Million Settlement After Regulator Says It Misled Investors and Victims Mathew J. Schwartz (euroinfosec) • August 17, 2021 When is a data exposure not just a data exposure? See Also: Forrester Consulting: Strained Relationship Between Security and IT…