Security Researcher Released PoC Exploit for High-severity Vulnerability in Microsoft Exchange

Security Researcher Released PoC Exploit for High-severity Vulnerability in Microsoft Exchange

Security Researcher Released PoC Exploit for High-severity Vulnerability in Microsoft Exchange | IT Security News 4. May 2021 Last week, security specialist Nguyen Jang has released technical information and proof-of-concept exploit (PoC) code for the severe flaw CVE-2021-28482 in Microsoft Exchange Server that could be used by hackers to perform code on vulnerable systems. The…

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection

New Pingback Malware Using ICMP Tunneling to Evade C&C Detection | IT Security News 4. May 2021 Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected systems.Called ‘Pingback,’ the Windows malware leverages Internet Control…

Attackers’ Dwell Time Plummets as Ransomware Hits Continue

Attackers’ Dwell Time Plummets as Ransomware Hits Continue

Fraud Management & Cybercrime , Fraud Risk Management , Incident & Breach Response Faster Detection Is Good News, But More Speed Still Needed, Mandiant Reports Mathew J. Schwartz (euroinfosec) • May 3, 2021     Source: FireEye Mandiant “Dwell time,” which refers to how long hackers hang out in an organization’s network before being discovered,…

How can we avoid coded bias in facial recognition tech?

How can we avoid coded bias in facial recognition tech?

Artificial intelligence (AI) researcher, Joy Buolamwini, has spent the last four years raising awareness of the social implications and possible harm of the technology. Inspired by her own experiences of facial recognition tech she founded the Algorithmic Justice League and recently became the star of the Netflix documentary Coded Bias. BBC Click’s Spencer Kelly finds…

Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack

Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack

Ivanti, the company behind Pulse Secure VPN appliances, has released a security patch to remediate a critical security vulnerability that was found being actively exploited in the wild by at least two different threat actors. Tracked as CVE-2021-22893 (CVSS score 10), the flaw concerns “multiple use after free” issues in Pulse Connect Secure that could…

Discovered New Vulnerability Affecting Computers Globally – Eurasia Review

Discovered New Vulnerability Affecting Computers Globally – Eurasia Review

In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack. Researchers named the vulnerability Spectre because the flaw was built into modern computer processors that get their speed from a technique called “speculative execution,” in which the processor predicts instructions it might end up executing…

Australia proposes teaching cyber-security to five-year-old kids

Australia proposes teaching cyber-security to five-year-old kids

Australia has decided that six-year-old children need education on cyber-security, even as it removes other material from the national curriculum. A newly revised draft of the national curriculum for children aged five to sixteen, launched yesterday, added a new strand titled “Considering privacy and security” that “involves students developing appropriate techniques for managing data, which…