article thumbnail

MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’

The Last Watchdog

Org overhaul As Todd reports, not only is Microsoft basing a portion of senior executive compensation on progress toward security goals, it also will install deputy chief information security officers (CISOs) in each product group,and bring together teams from its major platforms and product teams in “engineering waves” to overhaul security.

Security 100
article thumbnail

CISA adds 95 flaws to the Known Exploited Vulnerabilities Catalog

Security Affairs

The flaws added to the catalog impact several products, including Windows, Office, Cisco, Oracle, Adobe, Mozilla, Siemens, Apache, Exim, Linux, and Treck TCP/IP stack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The source code of the 2020 variant of HelloKitty ransomware was leaked on a cybercrime forum

Security Affairs

CVE-2021-20016 , CVE-2021-20021 , CVE-2021-20022 , CVE-2021-2002 ) or using compromised credentials. The group’s operators use several techniques to breach the targets’ networks, such as exploiting SonicWall flaws (e.g.,

article thumbnail

International Criminal Court hit with a cyber attack

Security Affairs

It was established by the Rome Statute, which entered into force on July 1, 2002. “At the end of last week, the International Criminal Court’s services detected anomalous activity affecting its information systems. The ICC is headquartered in The Hague, Netherlands.

article thumbnail

New TunnelVision technique can bypass the VPN encapsulation

Security Affairs

The researchers speculate that the vulnerability existed in DHCP since 2002, when option 121 was implemented. The researchers explained that during the attack, the victim cannot notice any disconnection to the VPN, they also remarked that the flaw isn’t tied to a specific VPN provider or implementation.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. . For those firms, bug bounty platforms have been a critical bridge to the global community of “white hat” security pros.

IoT 98
article thumbnail

HelloKitty ransomware gang also targets victims with DDoS attacks

Security Affairs

CVE-2021-20016 , CVE-2021-20021 , CVE-2021-20022 , CVE-2021-2002 ) or using compromised credentials. The group’s operators use several techniques to breach the targets’ networks, such as exploiting SonicWall flaws (e.g., ” continues the alert.