In a report to lawmakers, privacy commissioner Daniel Therrien said Clearview AI‘s collection of images without consent and the Royal Canadian Mounted Police (RCMP)’s use of that database were illegal. The software startup has stockpiled more than three billion images grabbed from popular social media platforms including Facebook, Instagram, Twitter and YouTube, as well as millions…

Ten of the issues were reported by external security researchers: one rated critical severity, seven high severity, and two medium severity. All are patched in Chrome 91.0.4472.101 for Windows, Mac and Linux. The most severe of these is CVE-2021-30544, a critical use-after-free bug that impacts BFCache, a browser optimization meant to enable instant back and…

The new service, named Advanced Monitoring and Incident Response (AMIR), is part of Honeywell’s Forge managed security services offering. It’s designed to help security teams detect and respond to attacks targeting industrial control systems (ICS) and operational technology (OT) networks. Honeywell says AMIR is designed to continuously monitor OT environments for suspicious events. It collects…

Cisco describes Smart Install as a plug-and-play configuration and image-management feature that provides zero-touch deployment for new switches. Smart Install can be very useful for organizations, but it can also pose a serious security risk. Once a device has been set up through Smart Install, the feature remains enabled and it can be accessed without…

Working in collaboration with bug bounty platform Bugcrowd and government technology contractor Endyna, CISA introduced its VDP platform to help Federal Civilian Executive Branch (FCEB) agencies identify and address vulnerabilities in critical systems. The platform was launched in support of Binding Operational Directive (BOD) 20-01, through which the Department of Homeland Security (DHS) instructed all…

Active since at least 2007 and also tracked as Fancy Bear, Pawn Storm, Sednit, Strontium, and Tsar Team, APT28 is well known for its cyber-espionage operations targeting the 2016 Presidential elections in the United States, but is also associated with attacks on NATO countries and with activities against organizations in the energy and transportation sectors….