Remote Code Execution in H2 Console JNDI – (CVE-2021-42392)
Update 1/11 - "What is the Status of Coverage" section updatedFortiGuard Labs is aware of newly discovered vulnerability in H2 Database software. The vulnerability is...
Wormable Windows Vulnerability (CVE-2022-21907) Patched by Microsoft
UPDATE January 13 2022: Protection section has been updated with a IPS signature information.FortiGuard Labs is aware that a total of 96 vulnerabilities were patched...
Meta May Quit Europe Over Data Regulations
Meta May Quit Europe Over Data Regulations Meta has said that it “will likely” stop Facebook and Instagram from operating in Europe unless the company...
News Corp Discloses Cyber-Attack
News Corp Discloses Cyber-Attack Publishing company News Corp has disclosed that it was the victim of a cyber-attack last month. Threat actors compromised email accounts...
Washington Warns of POLARIS Breach
Washington Warns of POLARIS Breach The Washington State Department of Licensing (DOL) has shuttered its Professional Online Licensing and Regulatory Information System (POLARIS) after detecting...
Who dropped the DB? Find out with Teleport Database Access
Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support! You’re woken up...
Twitter blackout for Vodafone customers
Vodafone customers in the UK are spitting tacks after an "issue" has left them unable to use Twitter properly for days, after the display of...
Argo CD flaw puts cloud infrastructure at risk
A high-risk vulnerability that could allow attackers to steal sensitive information secrets from software projects was found and fixed in Argo CD, a widely used...
Savvy cryptomining malware campaign targets Asian cloud service providers
Asian cloud service providers have been targeted by a sophisticated malware campaign designed to steal computing power for mining cryptocurrency. The attack techniques deployed by...
Information systems and cybersecurity: Connections in UX and beyond
Image source: Pexels This blog was written by an independent guest blogger. Information systems and cybersecurity go hand in hand. Understanding the relationship between the...