CVE-2021-25207 – Alert Detail – Security Database

CVE-2021-25207 – Alert Detail – Security Database

Executive Summary Informations Name CVE-2021-25207 First vendor Publication 2021-07-23 Vendor Cve Last vendor Modification 2021-07-23 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA   Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…

CVE-2021-26232 – Alert Detail – Security Database

CVE-2021-26232 – Alert Detail – Security Database

Executive Summary Informations Name CVE-2021-26232 First vendor Publication 2021-07-22 Vendor Cve Last vendor Modification 2021-07-22 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA   Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…

UK man arrested in connection to 2020 Twitter hack that affected Apple

UK man arrested in connection to 2020 Twitter hack that affected Apple

Joseph O’Connor, a 22-year-old citizen of the United Kingdom, has been arrested in connection with the 2020 Twitter hack that impacted multiple high-profile accounts like Apple. As reported by The Verge, the United States Department of Justice issued a press release announcing O’Connor’s arrest. The hacker was apparently apprehended in Estepona, Spain, by Spanish National…

House Passes Several Critical Infrastructure Cybersecurity Bills

House Passes Several Critical Infrastructure Cybersecurity Bills

The U.S. House of Representatives this week passed several cybersecurity bills, including ones related to critical infrastructure, industrial control systems (ICS), and grants for state and local governments. One of the bills focusing on critical infrastructure is the Cybersecurity Vulnerability Remediation Act, which aims to authorize the DHS’s Cybersecurity and Infrastructure Security Agency (CISA) to…

Oracle Weblogic Flaw Let Remote Attacker Take Control of The System

Oracle Weblogic Flaw Let Remote Attacker Take Control of The System

In the quarterly Critical Patch Update for July 2021, Oracle has released 342 fixes for several of its products range.  The security experts at Oracle have claimed that among those fixes there are some critical flaws, and a threat actor can easily exploit these flaws remotely. The most critical one is the deserialization flaw through…

Microsoft Disrupts Business Email Compromise Domains | #emailsecurity | #phishing | #ransomware | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Microsoft Disrupts Business Email Compromise Domains | #emailsecurity | #phishing | #ransomware | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Business Email Compromise (BEC),Fraud Management & Cybercrime,Fraud Risk Management West African Crime Group Used Homoglyph Techniques to Trick Victims, Company SaysDoug Olenick (DougOlenick) •July 21, 2021     Microsoft has announced the takedown of 17 domains that a threat group operating out of West Africa used to host fake Microsoft websites when conducting business email…

Cyber risk startup Safe Security lands $33M from UK telco BT – TechCrunch

Cyber risk startup Safe Security lands $33M from UK telco BT – TechCrunch

Safe Security, a Silicon Valley cyber risk management startup, has secured a $33 million investment from U.K. telco BT.  Founded in 2012, Safe Security — formerly known as Lucideus — helps organizations measure and mitigate enterprise-wide cyber risk using its security assessment framework for enterprises (SAFE) platform. The service, which is used by a number…

NVD – CVE-2021-2369

NVD – CVE-2021-2369

CVE-2021-2369 Detail Current Description Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple…

Kaseya gets master decryption key after July 4 global attack | #malware | #ransomware | #cybersecurity | #infosecurity | #hacker | National Cyber Security

Kaseya gets master decryption key after July 4 global attack | #malware | #ransomware | #cybersecurity | #infosecurity | #hacker | National Cyber Security

BOSTON — The Florida company whose software was exploited in the devastating Fourth of July weekend ransomware attack, Kaseya, has received a universal key that will decrypt all of the more than 1,000 businesses and public organizations crippled in the global incident. Kaseya spokeswoman Dana Liedholm would not say Thursday how the key was obtained…