[1] Today,
Google's Privacy Sandbox initiative, which is designed to improve web privacy for users, announced the launch of the Topics API for interest-based advertising. The API enables a user's web browser to analyze their browsing history and determine what topics represent their top interests.
Then, once the user visits a website, the
Topics API will select three of those topics to share with the site and its advertising partners. The web browser can only store topics for a maximum of three weeks, and Google Chrome users will have the option to view the topics associated with them, remove them, or to disable the feature completely.
The announcement comes ahead of Google's plan to phase out third-party cookies on Chrome. It will give consumers greater control over their data by storing it on their local device, while still ensuring that advertisers have access to sufficient information to deliver a relevant experience.
>> Read more. The company shared with VentureBeat that it now has more than 130 incident response (IR) partners in total, up from 29 at the beginning of 2021. The
cybersecurity firm — which went public last June and has a market capitalization above $11 billion — began providing technology to enable IR partners in 2020.
SentinelOne's Scalyr XDR technology brings capabilities for rapidly ingesting and correlating data from endpoints, making it possible for IR investigators to more easily search and query the data, according to the company.
>> Read more. The memory corruption vulnerability (CVE-2021-4034) — which affects polkit's pkexec — isn't remotely exploitable. However, it can be "quickly" exploited to acquire root privileges, the researchers said in a blog post. "This easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration," the Qualys researchers said in the post.
In Unix-like operating systems, polkit is used to control system-wide privileges. Polkit's pkexec is a program that enables an authorized user to execute commands as a different user.
>> Read more.
No comments:
Post a Comment