সাইবার নিরাপত্তা

High-Severity Flaws in Juniper Junos OS Affect Enterprise Networking Devices

Juniper Junos OS suffered several security flaws, some of which could be exploited to achieve code execution. Chief among them is a remote pre-authenticated PHP archive file deserialization vulnerability (CVE-2022-22241, CVSS score: 8.1) in the J-Web component of Junos OS, according to Octagon Networks researcher Paulos Yibelo. “This vulnerability can be exploited by an unauthenticated […]

আরও পড়ুন
সাইবার নিরাপত্তা

Twilio Suffers Another Breach After The August Hack- Same Hackers are suspected behind both the breaches

Same Hackers are suspected behind the August and June security breaches. After the August hack resulted in unauthorized access of customer information, Communication services provider Twilio, this week disclosed that they had experienced a “brief security incident” in June 2022 , Twilio stated that the breach was perpetrated by the same threat actor behind the […]

আরও পড়ুন
সাইবার নিরাপত্তা

A possible data breach being reviewed by Bed Bath & Beyond

Bed Bath & Beyond said that there was a possible data breach in the company Bed Bath & Beyond Inc were of the view that there was a possible data breach in the company. The company on Friday said that a third party had improperly accessed its data through a phishing scam this month. The […]

আরও পড়ুন
সাইবার নিরাপত্তা প্রযুক্তি

LASTPASS – FACING SECURITY ISSUES AGAIN?

Lastpass- the password management solution which had the beliefs of thousands of users suddenly faced criticism on account of its security incident last month. Lastpass has a record of security incidents in 2011, 2015, 2016,2019,2021,2022.

আরও পড়ুন
সাইবার নিরাপত্তা প্রযুক্তি

HP Enterprise Computers were left vulnerable to cyberattacks because of unpatched high-severity security vulnerabilities.

Security researchers have found hidden vulnerabilities in several models of HP’s Business-oriented notebooks that continue to be unpatched, (Sic) Binarily told listeners at the Black Code conference.It said that these flaws are “difficult to detect with TPM measurements.” Firmware flaws can have serious implications as they allow an adversary to achieve long-term persistence on a […]

আরও পড়ুন