What is Shadow IT and why is it so risky?

2022-06-30 - Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users may resort to using shadow IT practices when they feel that existing IT policies are too restrictive or get in the way of them being able to do their jobs effectively. An old school phenomenon  Shadow IT is not new. There have been countless examples of

Source: Tweakers.net, The Hacker News

New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators

2022-06-30 - Cybersecurity researchers have documented a new information-stealing malware that targets YouTube content creators by plundering their authentication cookies. Dubbed "YTStealer" by Intezer, the malicious tool is likely believed to be sold as a service on the dark web, with it distributed using fake installers that also drop RedLine Stealer and Vidar. "What sets YTStealer aside from other

Source: Tweakers.net, Ravie Lakshmanan

CISA Warns of Active Exploitation of 'PwnKit' Linux Vulnerability in the Wild

2022-06-30 - The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue, tracked as CVE-2021-4034 (CVSS score: 7.8), came to light in January 2022 and concerns a case of local privilege escalation in polkit's pkexec utility, which allows an

Source: Tweakers.net, Ravie Lakshmanan

New 'FabricScape' Bug in Microsoft Azure Service Fabric Impacts Linux Workloads

2022-06-30 - Cybersecurity researchers from Palo Alto Networks Unit 42 disclosed details of a new security flaw affecting Microsoft's Service Fabric that could be exploited to obtain elevated permissions and seize control of all nodes in a cluster. The issue, which has been dubbed FabricScape (CVE-2022-30137), could only be weaponized on containers that are configured to have runtime access. It has been 

Source: Tweakers.net, Ravie Lakshmanan

New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers

2022-06-29 - A new security vulnerability has been disclosed in RARlab's UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333, relates to a path traversal vulnerability in the Unix versions of UnRAR that can be triggered upon extracting a maliciously crafted RAR archive.

Source: Tweakers.net, Ravie Lakshmanan

Ett stort företag börjar från små.
Grundades 2015
Hi,
let's talk about your project

Innehållet i detta e-postmeddelande är konfidentiellt och avsett endast för den mottagare som anges i meddelandet.